Software  >   Systems Software  >  

Security Software

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Auditing Software (Security), Infrastructure Software, Security Tools
DEFINITION: Software installed on a computer network or an individual computer that protects it from attack.
Security SoftwareReports
226 - 250 of 292 Matches Previous Page  | Next Page
Securing Virtualised Environments and Accelerating Cloud Computing
sponsored by CA Technologies
WHITE PAPER: There is no question that virtualisation offers compelling tangible benefits for an IT organisation. Virtualisation is inevitable, and cloud computing is a new opportunity. Read this paper to learn about virtualisation security, the CA Access Control (AC) solution, and how to accelerate cloud computing.
Posted: 01 Jun 2010 | Published: 01 May 2010

CA Technologies

ArcSight Case Study: Experian
sponsored by ArcSight, an HP Company
CASE STUDY: Experian is committed to ensuring the integrity and safety of its data. The company sought an enterprise solution that would allow it to monitor threats and vulnerabilities in an automated fashion. ArcSight ESM enables Experian to monitor and analyze security event data from all its systems within a single view. Learn more in this case study.
Posted: 11 May 2010 | Published: 11 May 2010

ArcSight, an HP Company

Protecting Sensitive Data and Resources Throughout the Organization
sponsored by CA (India) Technologies Pvt. Ltd
WHITE PAPER: CA Data & Resource Protection is a family of solutions that provides a proactive approach to securing sensitive information and critical systems without impacting normal business and IT activities. Read this white paper to learn more!
Posted: 29 Apr 2010 | Published: 01 Mar 2009

CA (India) Technologies Pvt. Ltd

Not all Malware Detection is Created Equal
sponsored by Sophos, Inc.
WHITE PAPER: The internet is now the number-one conduit for infecting users with malware. Sophos detects a new infected web page every few seconds. This white paper outlines the terms you need to know and the steps you should take to stay safe.
Posted: 01 Apr 2010 | Published: 05 Nov 2009

Sophos, Inc.

Internet Security… a Priority you can Forget About: High on protection low on maintenance, AVG frees the support team.
sponsored by AVG Technologies USA, Inc.
CASE STUDY: Waingels College in Wokingham is a successful secondary school with almost 500 workstations and servers across the campus. They are challenged with maintaining the efficient running of back office and classroom systems with limited ICT support resources. Read this short case study to learn more about how Waingels College manage their IT security.
Posted: 31 Mar 2010 | Published: 31 Mar 2010

AVG Technologies USA, Inc.

Fast-Growing Municipality in Southeast USA Secures IT Operations and Services with AVG Anti-Virus Network Edition
sponsored by AVG Technologies USA, Inc.
CASE STUDY: The city of Brentwood’s IT environment is made up of 450 computers and counting. Increased population growth brings greater IT infrastructure needs. Brentwood’s old security provider couldn’t keep up. Read this brief case study to find out how Brentwood managed to meet their growing IT security needs.
Posted: 31 Mar 2010 | Published: 31 Mar 2010

AVG Technologies USA, Inc.

Social Engineering: Hacking People, Not Machines
sponsored by AVG Technologies USA, Inc.
WHITE PAPER: Hackers are often portrayed as technical geniuses plying their trade through the use of complex computer code. But gaining access to a computer can be as simple as fooling someone into a revealing a password. Read this paper to learn more about social engineering threats and how to defend against them.
Posted: 31 Mar 2010 | Published: 31 Mar 2010

AVG Technologies USA, Inc.

Secure File Transfer Solution Saves Bank Time and Money
sponsored by Linoma Software
CASE STUDY: Integra Bank needed to secure systems with role-based data access. They accomplished this with GoAnywhere Director from Linoma Software. Additionally they were able to automate and secure file transfers, consolidate processing applications and provide SOX and other compliance audit reports. Read this white paper to learn more.
Posted: 24 Mar 2010 | Published: 24 Mar 2010

Linoma Software

Protecting the Dynamic Datacenter
sponsored by Trend Micro
WHITE PAPER: Trend Micro server and application protection addresses the challenging operational security and compliance needs of today’s dynamic datacenter. We provide comprehensive protection, greater operational efficiency, superior platform support, and tighter integration with existing investments. Read this paper to learn more!
Posted: 17 Mar 2010 | Published: 01 Aug 2009

Trend Micro

Server and Application Protection - Behind the Lines
sponsored by Trend Micro
WHITE PAPER: For organizations evaluating the benefits of server and application protection systems and making a case for incorporating them into the IT infrastructure, Trend Micro recommends examining nine different areas of business interest. This white paper details these topics and examines Trend Micro server and application protection software.
Posted: 17 Mar 2010 | Published: 01 Feb 2009

Trend Micro

State of Internet Security, Q3 - Q4 2009
sponsored by Websense, Inc.
WHITE PAPER: Do you know just how adept Web adversaries have become in using the Internet to spread malware in their attacks? Understand where the true threats lie with this report which summarizes the significant findings of Websense researchers using the ThreatSeeker™ Network during the six-month period ending December 2009.
Posted: 16 Mar 2010 | Published: 16 Feb 2010

Websense, Inc.

Presentation Transcript: College of Virtualization - Lessons in Integrating Data Protection Software
sponsored by Dell and VMware
PRESENTATION TRANSCRIPT: In this SearchStorage.com presentation transcript, you'll see an overview of data protection software. You'll recieve some general advice, business and technology considerations, as well as some deployment considerations and configurations.
Posted: 16 Mar 2010 | Published: 16 Mar 2010

Dell and VMware

Reduce Your TCO with Automated Workspace Management
sponsored by RES Software
WHITE PAPER: This white paper examines how to use automated workspace management products to reduce PC TCO by at least $197 per PC per year while maintaining end-user productivity.
Posted: 19 Feb 2010 | Published: 18 Feb 2010

RES Software

High-performance protection at the network edge—what, why and how
sponsored by Sophos, Inc.
WHITE PAPER: With more demands being put on lightweight network-edge hardware to provide security and connectivity, combining simplified malware detection with URI filtering can offer excellent proactive protection without overburdening the hardware or the administrator.
Posted: 05 Jan 2010 | Published: 05 Nov 2009

Sophos, Inc.

IT Decision Checklist: SIMs and Log Management
sponsored by LogLogic, Inc.
EGUIDE: In this paper, you'll learn that Security information management systems are effective platforms for the collection, analysis and storage of events from a broad range of systems and devices. We'll outline what you should look for to get the most relevant data from SIMs.
Posted: 05 Jan 2010 | Published: 05 Jan 2010

LogLogic, Inc.

Information Security - IT Decision Checklist: Application Security
sponsored by Ounce Labs, an IBM Company
EGUIDE: Standards such as SOAP and XML have made it easier to test applications for security holes. We'll explain how to go about this process and what tools are available to help you secure the application layer.
Posted: 31 Dec 2009 | Published: 31 Dec 2009

Ounce Labs, an IBM Company

Symantec Report on Rogue Security Software
sponsored by Symantec Corporation
WHITE PAPER: The Symantec Report on Rogue Security Software is an in-depth analysis of rogue security software programs. Read this report to learn the specifics about security software scams.
Posted: 10 Dec 2009 | Published: 01 Oct 2009

Symantec Corporation

U.S. Navy Cyber Defense Operations Command
sponsored by Novell, Inc.
WHITE PAPER: Using Novell® Sentinel™ as part of its PROMETHEUS system, the Navy Cyber Defense Operations Command (NCDOC) has automated and centralized security monitoring across hundreds of diverse locations worldwide.
Posted: 09 Dec 2009 | Published: 08 Dec 2009

Novell, Inc.

Secure, Simple and Powerful Log Management with Novell® Sentinel™ Log Manager
sponsored by Novell, Inc.
WHITE PAPER: Read this whitepaper to find out how Novell's Sentinel™ Log Management solution simplifies compliance by collecting, storing, analyzing and managing data logs from all across your enterprise.
Posted: 09 Dec 2009 | Published: 08 Dec 2009

Novell, Inc.

How to Protect Data Against Theft and Ensure That it Remains Confidential - No Matter Where it is Stored
sponsored by Sophos, Inc.
WHITE PAPER: This white paper introduces SafeGuard Enterprise 5.40, an innovative solution from Sophos that fulfills all the requirements a company could have for protecting confidential data on mobile PCs and data media.
Posted: 19 Nov 2009 | Published: 01 Sep 2009

Sophos, Inc.

The Business Impact of Data Security Regulations: Featuring Massachusetts
sponsored by Sophos, Inc.
WHITE PAPER: Massachusetts has taken the lead in passing a new regulation - 201 CMR 17:00 -that requires companies to implement a comprehensive data security plan that includes encryption. This article discusses some aspects of this regulation and offers suggestions on how data security best practices can help with compliance.
Posted: 19 Nov 2009 | Published: 19 Nov 2009

Sophos, Inc.

Avoiding 7 Common Mistakes of IT Security Compliance
sponsored by Qualys, Inc.
EGUIDE: This guide describes seven typical mistakes of IT security compliance and how you can use these lessons to help your organization achieve its compliance goals.
Posted: 21 Oct 2009 | Published: 01 Apr 2009

Qualys, Inc.

7 Essential Steps to Achieve, Measure and Prove Optimal Security Risk Reduction
sponsored by Qualys, Inc.
WHITE PAPER: Rapid changes within technology, new server and software deployments, and the evolving sophistication of attack methods used to infiltrate systems and steal data create the greatest set of challenges faced by security and IT administrators trying to keep their systems secure and within regulatory compliance. Interested in reducing security risk?
Posted: 20 Oct 2009 | Published: 20 Oct 2009

Qualys, Inc.

Novell® Sentinel™: Active Event Monitoring for Improved Security and Compliance Management
sponsored by Novell, Inc.
WHITE PAPER: Novell Sentinel combines the benefits of identity and systems management with real-time security event management and monitoring. It gives you a comprehensive, real-time dashboard view of user, network and application events, so your IT staff can be much more responsive to potential threats.
Posted: 06 Oct 2009 | Published: 06 Oct 2009

Novell, Inc.

The Active Directory Recycle Bin: The End of Third-Party Recovery Tools?
sponsored by Dell Software
WHITE PAPER: Windows Server 2008 R2 offers a number of exciting new features, including an expanded Server Core offering, new Active Directory features, and - of special interest to anyone who has ever wished Active Directory had an “undo” button - a sort of recycle bin for Active Directory objects.
Posted: 05 Oct 2009 | Published: 02 Oct 2009

Dell Software
226 - 250 of 292 Matches Previous Page    8 9 10 11 12    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement