Software  >   Systems Software  >  

Security Software

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Auditing Software (Security), Infrastructure Software, Security Tools
DEFINITION: Software installed on a computer network or an individual computer that protects it from attack.
Security Software Reports
1 - 25 of 396 Matches Previous Page  |  Next Page
Cyber Security: How to Know What You Don't Know
sponsored by Presidio Networked Solutions
WHITE PAPER: Learn how to figure out and mitigate your vulnerabilities so that your organization stays secure and your cyber security strategy keeps your data safe for whatever the future throws at it.
Posted: 18 Jan 2017 | Published: 18 Jan 2017

Presidio Networked Solutions

Managing Risks and Mitigating Threats in Today's IT Environment
sponsored by TechData - HPE
WHITE PAPER: In this white paper, learn about a complete security platform that takes a risk-based, adversary-centric approach to threat protection to ensure your IT environment remains protected.
Posted: 17 Jan 2017 | Published: 31 Mar 2016

TechData - HPE

How to Build a Robust Application Security Governance Framework
sponsored by Veracode, Inc.
WHITE PAPER: Discover not only how to simply, but also streamline application security. Learn how to ensure that everyone is in-sync, and that the organization is maximizing its investments, interpreting test results effectively, and setting expectations for everyone.
Posted: 17 Jan 2017 | Published: 17 Jan 2017

Veracode, Inc.

How SAP Ensured Secure Application Production
sponsored by TechData - HPE
CASE STUDY: In this case study, learn how SAP was able to use a security platform to always ensure the production of secure applications.
Posted: 17 Jan 2017 | Published: 29 Feb 2016

TechData - HPE

Unified Insights on One Unified Threat Management Market Product
sponsored by WatchGuard Technologies, Inc.
EGUIDE: This e-guide looks at one market leader in the UTM category. Learn what experts are saying about WatchGuard's features, product specs, and more.
Posted: 16 Jan 2017 | Published: 13 Jan 2017

WatchGuard Technologies, Inc.

Tackle Email Fraud with Comprehensive Targeted Threat Protection
sponsored by Mimecast
WHITE PAPER: This research report from 451 Research highlights Mimecast's expansion into the targeted threat protection market. Access now to compare various vendors and what they can do for your enterprise and uncover the analysis of Mimecast's strengths, weaknesses, threats and more.
Posted: 14 Jan 2017 | Published: 14 Jan 2017

Mimecast

Secure Wi-Fi Helped The Museum of Flight Soar to New Heights
sponsored by WatchGuard Technologies, Inc.
CASE STUDY: In this case study, find out how The Museum of Flight was able to easily block inappropriate and malicious web content, swiftly deploy new access points, scale up or out their Wi-Fi at any given moment, and more.
Posted: 11 Jan 2017 | Published: 11 Jan 2017

WatchGuard Technologies, Inc.

Why Digital Business Needs a New Approach to Information Security
sponsored by Entrust, Inc.
WHITE PAPER: Access this white paper to learn how companies are turning to new identity-centric, security technologies like PKI in order to extend the reach of their digital businesses and remain secure.
Posted: 10 Jan 2017 | Published: 10 Jan 2017

Entrust, Inc.

What Trust Can Mean to Your Enterprise's Cloud Policy
sponsored by Entrust, Inc.
ANALYST REPORT: Uncover the changing nature of trust in business, how it will affect your enterprise, and how to create business value using identity. Learn how to manage identity and access more effectively, saving your team's time, effort, and resources.
Posted: 10 Jan 2017 | Published: 10 Jan 2017

Entrust, Inc.

Network Security: How Miller Paint Saved $150k a Year
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: Learn how Miller Paint managed to save itself over $150k a year on their network security, improve service, and make the upgrade quickly with minimal fuss. Read on to learn what steps were taken to ensure this smooth changeover and what their next steps were.
Posted: 10 Jan 2017 | Published: 10 Jan 2017

WatchGuard Technologies, Inc.

Nine Types of Cyber Threats and How to Stop Them
sponsored by Solarwinds MSP
WHITE PAPER: Learn how to create an effective IT strategy against all unknown and known threats, how to improve security by viewing customers' networks as targets, and more.
Posted: 09 Jan 2017 | Published: 09 Jan 2017

Solarwinds MSP

Security for the Future-Ready Workforce
sponsored by Dell, Inc. & Intel®
WHITE PAPER: To both empower the workforce and protect the enterprise, organizations must choose the right technologies and match users to the right devices. Learn how to cover the needs of 5 future-ready worker categories, while keeping your data safe.
Posted: 05 Jan 2017 | Published: 05 Jan 2017

Dell, Inc. & Intel®

Survey Findings: Data Security
sponsored by Dell, Inc. & Intel®
WHITE PAPER: This data security report illuminates the data security concerns held by businesses. Learn how to obtain the business support needed to integrate data security, while mitigating the cloud and mobile risks that plague IT.
Posted: 04 Jan 2017 | Published: 04 Jan 2017

Dell, Inc. & Intel®

Endpoint Security for the Empowered Enterprise
sponsored by Dell, Inc. & Intel®
WHITE PAPER: This resource examines endpoint protection features that improve system performance and user productivity. Uncover Dell's Endpoint Security Suite Enterprise, how it supports encryption and advanced authentication, and the technical specifications required.
Posted: 04 Jan 2017 | Published: 04 Jan 2017

Dell, Inc. & Intel®

A Whale of a Tale: How to Stop the Rising Tide of Impersonation Attacks
sponsored by Mimecast North America
WHITE PAPER: Learn how whaling works, what the tell-tale signs are, and what can be done to safeguard your organization from its ravages. Read on for an in-depth breakdown of a typical whaling attack and where to look for help for threat protection.
Posted: 03 Jan 2017 | Published: 03 Jan 2017

Mimecast North America

Anatomy of a Whaling Attack: Protecting Your Organization from CEO Email Scams
sponsored by Mimecast North America
WHITE PAPER: Learn the anatomy of a whaling attack – an email scam that can threaten every member of your enterprise, from entry-level to the C-suite. Download this e-book now and learn 6 ways to defend against this potentially crippling attack.
Posted: 03 Jan 2017 | Published: 03 Jan 2017

Mimecast North America

Five Tactics to Stop Email Attacks
sponsored by Mimecast North America
WHITE PAPER: Access this resource now to get a breakdown of traditional phishing, spear-phishing, and whaling, and uncover 5 tips to help you prevent this email fraud.
Posted: 03 Jan 2017 | Published: 03 Jan 2017

Mimecast North America

Tackle Email Fraud with Comprehensive Targeted Threat Protection
sponsored by Mimecast North America
WHITE PAPER: This research report from 451 Research highlights Mimecast's expansion into the targeted threat protection market. Access now to compare various vendors and what they can do for your enterprise and uncover the analysis of Mimecast's strengths, weaknesses, threats and more.
Posted: 03 Jan 2017 | Published: 21 Jul 2016

Mimecast North America

Oh #@$%! I've Been Breached: What to do Next
sponsored by Armor
WHITE PAPER: Learn how to not only put together an incident response plan (IRP), but what to do during and afterwards to reduce downtime and smoothly transition back to normal operations as quickly as possible.
Posted: 22 Dec 2016 | Published: 22 Dec 2016

Armor

Mobile Security Checklist: Top Ten Threats to Your Enterprise Today
sponsored by BlackBerry
WHITE PAPER: Access this white paper to find an overview of the key issues you need to be on top of right now to protect your organization, its employees and its customers.
Posted: 19 Dec 2016 | Published: 19 Dec 2016

BlackBerry

Mobile Security In Action: How Enterprises Are Getting Ahead of Threats
sponsored by vmware airwatch
WEBCAST: Enterprises need to bolster their security programs to protect against new, unknown mobile threats, but understanding these risks requires visibility. Learn how Samsung is protecting its mobile employees, best practices for your own mobile security strategy, and more.
Posted: 19 Dec 2016 | Premiered: Dec 19, 2016

vmware airwatch

Mobile Security Addressing the Evolving Threat Landscape
sponsored by SOTI Inc.
WHITE PAPER: Discover why organizations are making the decision to move forward with a holistic security framework to mitigate risk – taking into account physical, network, device, and data (app and content level) protection.
Posted: 16 Dec 2016 | Published: 16 Dec 2016

SOTI Inc.

Web Application Firewall: Delivering Must-Have Protection for the Modern Enterprise
sponsored by Citrix
WHITE PAPER: To thoroughly protect numerous web properties, you need to supplement basic network security and firewall solutions with web application firewall tools. Learn what's currently available as essential components for web protection.
Posted: 16 Dec 2016 | Published: 16 Dec 2016

Citrix

Secure Enterprise File Sharing and Mobile Content Management
sponsored by BlackBerry
WHITE PAPER: Discover how to utilize a highly mobile and collaborative method of document sharing without sacrificing security. Learn how to protect intellectual property, exchange files through data rooms for M&A, and more.
Posted: 14 Dec 2016 | Published: 14 Dec 2016

BlackBerry

Blue Coat Cloud Data Protection Gateway
sponsored by Blue Coat Systems
WHITE PAPER: Learn how to ensure CJIS compliance when using Salesforce.com and other SaaS applications to maintain control over your data on the cloud. Discover the benefits of this approach such as FIPS-140 compliance, seamless user experience, and more.
Posted: 12 Dec 2016 | Published: 12 Dec 2016

Blue Coat Systems
1 - 25 of 396 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement