Software  >   Systems Software  >  

Security Software

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Auditing Software (Security), Infrastructure Software, Security Tools
DEFINITION: Software installed on a computer network or an individual computer that protects it from attack.
Security SoftwareReports
226 - 250 of 313 Matches Previous Page  | Next Page
E-Guide: How to build a toolset to avoid Web 2.0 security issues
sponsored by SearchSecurity.com
EGUIDE: Collaborative, interactive nature of Web 2.0 technology has great appeal for business, and companies of all sizes and verticals are taking full advantage of social networking sites, free online services and other platforms. Learn how to implement security tools that monitor, prevent, alert, encrypt and quarantine data from leaving your network.
Posted: 17 Sep 2010 | Published: 17 Sep 2010

SearchSecurity.com

Log Management: How to Develop the Right Strategy for Business and Compliance
sponsored by Dell SecureWorks
WHITE PAPER: Organisations need a business-based approach to creating a log management strategy that will help them detect attacks, deal with mounds of data collected by network and security devices, and meet compliance requirements. This white paper will outline a five step process which will help reduce the complexity of this process.
Posted: 23 Aug 2010 | Published: 23 Aug 2010

Dell SecureWorks

NETGEAR Prosecure Security Threat Management
sponsored by NETGEAR Inc.
CASE STUDY: An end-point solution for each threat was not a cost-effective solution, and paying for security on a per-user license basis was clearly out of the question. What’s more, a number of appliances only protected either web or email, but not both at the same time. Read this case study to learn more about an effective solution to these problems.
Posted: 20 Oct 2010 | Published: 20 Oct 2010

NETGEAR Inc.

E-Guide: Run Antivirus Scans in Virtual Environments Without Compromising System Performance
sponsored by CA Technologies.
EGUIDE: This expert e-guide from SearchServerVirtualization.com explains considerations to keep in mind when planning antivirus scans in your virtual environment.
Posted: 15 Oct 2010 | Published: 15 Oct 2010

CA Technologies.

Web security buyers guide
sponsored by Sophos, Inc.
WHITE PAPER: A new approach to web security and control is required that supports the needs of businesses, equipping users with the tools they need to be more effective while eliminating the risks of potential infection from trusted legitimate sites. In addition to good preventive practices it is vital that organizations implement a comprehensive solution.
Posted: 12 Oct 2010 | Published: 06 Oct 2010

Sophos, Inc.

Threat Containment for Facebook
sponsored by BlueCoat
WHITE PAPER: This technical brief discusses multiple Blue Coat solutions to address malicious content control, enforce acceptable use policies, prevent sensitive information leakage and enhance user productivity on Facebook.
Posted: 08 Oct 2010 | Published: 08 Oct 2010

BlueCoat

Data Leak Protection Planning
sponsored by (ISC)2 UK Ltd
EBOOK: It's becoming more critical and more challenging to prevent data from leaking outside the organization. Read this ebook for expert tips and advice on plugging the holes in your organization's date security system.
Posted: 23 Sep 2010 | Published: 23 Sep 2010

(ISC)2 UK Ltd

ArcSight Case Study: BMW
sponsored by ArcSight, an HP Company
CASE STUDY: Watch this video case study to learn how ArcSight helped BMW drastically decrease incidence response times.
Posted: 22 Sep 2010 | Published: 17 Nov 2009

ArcSight, an HP Company

EFG Bank Case Study
sponsored by ArcSight, an HP Company
CASE STUDY: ArcSight Logger 4 provides EFG Bank a platform that allows their auditors to easily search and review logs to prove adherence to strict compliance and regulation laws.
Posted: 21 Sep 2010 | Published: 02 Nov 2009

ArcSight, an HP Company

Magic Quadrant for Secure Web Gateway
sponsored by BlueCoat
WHITE PAPER: Web application control and data loss prevention are important considerations for future-proofing investments; however, these features are not very mature or widespread. Read on to learn about a critical tool for protecting endpoints from various forms of malware and other security risks.
Posted: 17 Sep 2010 | Published: 17 Sep 2010

BlueCoat

10 Steps to Email Security
sponsored by Clearswift
WHITE PAPER: This white paper outlines the 10 simple steps to best practice in email security including the application of policy, technology and processes designed to keep email safe and secure.
Posted: 10 Sep 2010 | Published: 12 Aug 2013

Clearswift

The Evolution of Data Loss Prevention: Reducing Complexity
sponsored by BlueCoat
WHITE PAPER: In recent years, organizations have come to recognize the critical importance of safeguarding sensitive information. Read this white paper to discover the important role Data Loss Prevention (DLP) plays in maintaining the security of sensitive data.
Posted: 09 Sep 2010 | Published: 09 Sep 2010

BlueCoat

Building a Successful Security Operations Center
sponsored by ArcSight, an HP Company
WHITE PAPER: Designing, building, and managing an internal security operations center can dramatically improve an organization's ability to rapidly recognize and respond to malicious information security events. This paper outlines industry best practices for building and maturing a security operations center (SOC).
Posted: 30 Aug 2010 | Published: 01 Dec 2009

ArcSight, an HP Company

Meeting the challenges of virtualisation security
sponsored by Trend Micro
WHITE PAPER: Your organisation needs to consider which security mechanisms can best protect both physical and virtual servers, particularly as a virtualised architecture fundamentally affects how mission-critical applications are designed, deployed and managed. Download this white paper to find out more about real solutions to these challenges.
Posted: 04 Aug 2010 | Published: 01 Aug 2009

Trend Micro

TechTarget ANZ Securing Virtualised Data Centres E-Book
sponsored by Trend Micro
EBOOK: Virtualisation is powerful, but also creates challenges for the security processes and products organisations defined before they started to virtualise. This e-book explains these new security challenges posed by virtualisation and how security professionals and IT managers can address them.
Posted: 04 Aug 2010 | Published: 04 Aug 2010

Trend Micro

Impact Brief: How to Get Started with Enterprise Risk Management
sponsored by RSA, The Security Division of EMC
WHITE PAPER: To implement a strategic, efficient and sustainable governance, risk and compliance (GRC) program, organizations need integrated technologies, expert resources and a unified view into business processes across IT, Finance, Operations and Legal domains.
Posted: 28 Jul 2010 | Published: 28 Jul 2010

RSA, The Security Division of EMC

Hardware and Software Authentication: Choosing the Right Approach
sponsored by SafeNet, Inc.
WHITE PAPER: This paper compares the strengths and weaknesses of hardware and software-based authentication approaches, and offers five key considerations for evaluating which approach is right for the specific needs of your organization.
Posted: 27 Jul 2010 | Published: 27 Jul 2010

SafeNet, Inc.

SMS Authentication: 10 Things to Know - Before You Buy
sponsored by SafeNet, Inc.
WHITE PAPER: SMS authentication can present a host of benefits to organizations looking to improve security while maximizing the productivity of end users and administrative staff. In choosing any authentication solution, organizations will be well served by taking many key considerations into account. Read this paper to learn more!
Posted: 26 Jul 2010 | Published: 08 Jun 2010

SafeNet, Inc.

Total Economic Impact™ of Trend Micro Enterprise Security
sponsored by Trend Micro, Inc.
ANALYST REPORT: The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of choosing Trend Micro Enterprise Security for their complete content security protection.
Posted: 21 Jul 2010 | Published: 01 Jul 2009

Trend Micro, Inc.

CA Data & Resource Protection
sponsored by CA Technologies.
VIDEO: CA data & resource protection is a set of solutions that provide a proactive approach to privileged user management and data loss prevention by securing sensitive information and critical systems, all without impacting normal business and IT activities. Watch this interactive video to learn more.
Posted: 01 Jun 2010 | Premiered: 01 Jun 2010

CA Technologies.

Privileged user management: It's time to take control
sponsored by CA Technologies
WHITE PAPER: IT managers everywhere feel overwhelmed with the rising tide of security threats in the face of an increasing regulatory burden. It is not surprising then that they tend to overlook one particular area of IT security, which is the privileged access that they grant to themselves and/or their colleagues in order to do their jobs.
Posted: 01 Jun 2010 | Published: 01 Oct 2009

CA Technologies

Securing Virtualised Environments and Accelerating Cloud Computing
sponsored by CA Technologies
WHITE PAPER: There is no question that virtualisation offers compelling tangible benefits for an IT organisation. Virtualisation is inevitable, and cloud computing is a new opportunity. Read this paper to learn about virtualisation security, the CA Access Control (AC) solution, and how to accelerate cloud computing.
Posted: 01 Jun 2010 | Published: 01 May 2010

CA Technologies

ArcSight Case Study: Experian
sponsored by ArcSight, an HP Company
CASE STUDY: Experian is committed to ensuring the integrity and safety of its data. The company sought an enterprise solution that would allow it to monitor threats and vulnerabilities in an automated fashion. ArcSight ESM enables Experian to monitor and analyze security event data from all its systems within a single view. Learn more in this case study.
Posted: 11 May 2010 | Published: 11 May 2010

ArcSight, an HP Company

Protecting Sensitive Data and Resources Throughout the Organization
sponsored by CA (India) Technologies Pvt. Ltd
WHITE PAPER: CA Data & Resource Protection is a family of solutions that provides a proactive approach to securing sensitive information and critical systems without impacting normal business and IT activities. Read this white paper to learn more!
Posted: 29 Apr 2010 | Published: 01 Mar 2009

CA (India) Technologies Pvt. Ltd

Not all Malware Detection is Created Equal
sponsored by Sophos, Inc.
WHITE PAPER: The internet is now the number-one conduit for infecting users with malware. Sophos detects a new infected web page every few seconds. This white paper outlines the terms you need to know and the steps you should take to stay safe.
Posted: 01 Apr 2010 | Published: 05 Nov 2009

Sophos, Inc.
226 - 250 of 313 Matches Previous Page    8 9 10 11 12 13    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement