Vertical Industries  >  

Security Products Industry

RSS Feed    Add to Google    Add to My Yahoo!
Security Products IndustryReports
 
Windows 2012 Server Network Security
sponsored by ComputerWeekly.com
BOOK: This book chapter offers an introduction to Windows 8 and Windows Server 2012 network security and  IPv6. It includes a 30% discount code for Computer Weekly readers.
Posted: 02 Sep 2013 | Published: 02 Sep 2013

ComputerWeekly.com

The Global State of Information Security Survey 2013: Key Findings
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This global study examines the state of cyber-security and the impact of cyber crime and offers advice to businesses on reducing the risks.
Posted: 09 Nov 2012 | Published: 02 Nov 2012

ComputerWeekly.com

Planning a Career Path in Cybersecurity
sponsored by Global Knowledge
WHITE PAPER: The need for personnel knowledgeable and experienced in security implementation and management has never been greater, and the need is growing.
Posted: 01 Nov 2013 | Published: 01 Nov 2013

Global Knowledge

A Manager’s Guide to Unified Threat Management and Next-Gen Firewalls
sponsored by Sophos, Inc.
WHITE PAPER: Unified Threat Management (UTM) is a common tool for most security professionals because of its ability to integrate multiple security technologies onto one platform. This brief guide explores the various questions you should ask when deciding your UTM system.
Posted: 20 Dec 2013 | Published: 30 Nov 2013

Sophos, Inc.

Controlling and Managing Security with Performance Tools
sponsored by Ipswitch WhatsUp Gold
WHITE PAPER: This article examines what management tools are needed to provide functionality to your IT security needs with no additional overhead or expenditure. These tools are often already in place to provide performance management and monitoring.
Posted: 01 Mar 2011 | Published: 01 Mar 2011

Ipswitch WhatsUp Gold

Online Enemy #1: Blackhole Exploit Kit
sponsored by Threat Track
WHITE PAPER: This short white paper offers key insight and advice for combatting Blackhole malware attacks on your organization's machines. Learn how to successfully thwart these types of threats with automated, centralized software patching.
Posted: 29 Apr 2013 | Published: 29 Apr 2013

Threat Track

Products of the Year 2006
sponsored by Information Security Magazine
JOURNAL ARTICLE: As spyware becomes increasingly prevalent, antispyware tools are becoming more a necessity than a luxury.
Posted: 10 Aug 2006 | Published: 01 Feb 2006

Information Security Magazine

Case Study - System One
sponsored by Webroot
CASE STUDY: This brief case study demonstrates how System One Services, a provider of technical outsourcing solutions for clients in the energy, discovered an endpoint protection system that enhanced mobile user protection and reduced network bandwidth while providing vastly improved endpoint security.
Posted: 17 May 2013 | Published: 17 May 2013

Webroot

Controlling and Managing Security with Performance Tools
sponsored by Ipswitch WhatsUp Gold
WHITE PAPER: This article examines what management tools are needed to provide functionality to your IT security needs with no additional overhead or expenditure. These tools are often already in place to provide performance management and monitoring.
Posted: 01 Mar 2011 | Published: 01 Mar 2011

Ipswitch WhatsUp Gold

How Can Content-Aware IAM give me the Security I need to Confidently Move My Business Forward
sponsored by CA Technologies.
WHITE PAPER: This white paper explores a comprehensive and scalable solution for managing user identities, access and information use.
Posted: 11 Jul 2013 | Published: 31 Oct 2012

CA Technologies.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement