Software  >   Systems Software  >  

Security Software

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Auditing Software (Security), Infrastructure Software, Security Tools
DEFINITION: Software installed on a computer network or an individual computer that protects it from attack.
Security Software Reports
26 - 50 of 621 Matches Previous Page  |  Next Page
Remediation and Mitigation for Windows Active Directory Security
sponsored by Quest
WHITE PAPER: Discover key steps to follow when adapting to the changes found in Active Directory using remediation and mitigation.
Posted: 14 Aug 2017 | Published: 14 Aug 2017

Quest

Protecting the Hybrid Cloud from Advanced Threats
sponsored by TrendMicro
WHITE PAPER: With over $1 billion in revenue attributable to ransomware in 2016, many new ransomware families are designed to target servers, including web servers, file servers, virtual desktops, and even specific business critical file types. Discover how to secure today's servers, whether they're physical, virtual, or cloud-based.
Posted: 11 Aug 2017 | Published: 11 Aug 2017

TrendMicro

Endpoint Security Review: Cb Defense
sponsored by Carbon Black
PRODUCT REVIEW: Peter Stephenson, technology editor of SC Magazine weighs the strengths and weaknesses of endpoint security vendor Carbon Black's Cb Defense tool. In his review, uncover an in-depth analysis and see how he rated the platform.
Posted: 11 Aug 2017 | Published: 09 Aug 2017

Carbon Black

SME cyber security is increasingly a business imperative
sponsored by ComputerWeekly.com
EGUIDE: A growing number of enterprise-level organisations are assessing cyber security during supplier contract negotiations, which means cyber security is not only important to small and medium enterprises (SMEs) to keep their own data safe, but is also increasingly a requirement for winning new business.
Posted: 07 Aug 2017 | Published: 07 Aug 2017

ComputerWeekly.com

How to Mitigate IP Theft by Departing Employees
sponsored by Veriato, Inc.
WHITE PAPER: The greatest threat to your organization isn't some shadowy hacker, but rather disgruntled company insiders. Read on to learn about the 4 common ways employees steal data, how you can protect yourself, and more. Then explore 2 employee behavior monitoring programs that can provide real-time insights into any suspicious activity.
Posted: 02 Aug 2017 | Published: 02 Aug 2017

Veriato, Inc.

Cyber security in the Nordics
sponsored by ComputerWeekly.com
EGUIDE: With the digitisation of life and work comes the 24-hour threat of cyber attacks. The Nordic region's pioneering spirit in the digital arena could easily turn heads, some of which may have malicious intent.
Posted: 31 Jul 2017 | Published: 31 Jul 2017

ComputerWeekly.com

Ransomware and Cloud Security: Keys to Stop the Threat
sponsored by Cisco Umbrella
EGUIDE: Highly complex threats are targeting corporate assets and resources every day. In this e-guide, security expert Kevin Beaver reveals 5 ways to prevent a ransomware infection through network security and assistant editor Kathleen Casey explores 5 ways to fend off cloud security threats.
Posted: 27 Jul 2017 | Published: 24 Jul 2017

Cisco Umbrella

Securing DNS: What to Do, and What to be Aware of
sponsored by Cisco Umbrella
EGUIDE: In order to understand how DNS attacks work, it is important to understand DNS security weaknesses. In this e-guide, security pros Peter Wenham and Vladimir Jirasek reveal best practices and recommendations for securing DNS and staying ahead of its vulnerabilities.
Posted: 27 Jul 2017 | Published: 24 Jul 2017

Cisco Umbrella

SiliconANGLE Spotlight: HyTrust
sponsored by HyTrust
VIDEO: Join Eric Chiu, the founder and president of HyTrust, a security, compliance and control IT infrastructure company, to learn how this enterprise was founded, what it specializes in, and why you should care.
Posted: 27 Jul 2017 | Premiered: 27 Jul 2017

HyTrust

Sleeping with the Enemy: Achieving Agility and Security with DevSecOps
sponsored by WhiteHat Security
WEBCAST: To address the faster release demands of Agile, explore DevSecOps and how it effectively improves the collaboration between development, security, and operations teams. Learn how to strive towards continuous security, integrate app security tools, address the growing role of infrastructure as code, and more.
Posted: 26 Jul 2017 | Premiered: Jun 28, 2017

WhiteHat Security

Product Overview: 30 Minutes to a More Secure Enterprise
sponsored by Cisco Umbrella
WHITE PAPER: DNS-layer security offers a first line of defense for your company – DNS request proceed internet activity, after all. But which DNS security is right for you? In this product overview, discover how implementing Cisco Umbrella can help you improve your company's security.
Posted: 26 Jul 2017 | Published: 26 Jul 2017

Cisco Umbrella

Guide To PCI Compliance For Containers
sponsored by Twistlock, Inc.
RESOURCE: Inside this guide learn tips for both technical and compliance teams on managing containers for credit card information. Most importantly, discover how this program can help maintain compliance for the Payment Card Industry (PCI) and Data Security Standard (DSS).
Posted: 25 Jul 2017 | Published: 24 Jul 2017


The Rise Of The Secure Internet Gateway
sponsored by Cisco Umbrella
WHITE PAPER: The integration of cloud apps into the everyday business environment has made securing web access more difficult than ever. Click inside to find out how a Secure Internet Gateway (SIG), can help modern businesses secure user information across public and private cloud environments.
Posted: 24 Jul 2017 | Published: 24 Jul 2017

Cisco Umbrella

Beyond your company boundaries
sponsored by ComputerWeekly.com
PRESENTATION: Ludo Houdenaert distils a lifetime of experience on managing performance in the IT department into this collection of interactive presentations, written especially for Computer Weekly.
Posted: 12 Jul 2017 | Published: 12 Jul 2017

ComputerWeekly.com

European Perceptions, Preparedness and Strategies for IoT Security
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Research from analyst group Quocirca conducted in the UK and German-speaking regions exposes the challenges organisations face in managing and securing internet of things devices.
Posted: 12 Jul 2017 | Published: 12 Jul 2017

ComputerWeekly.com

A Ranking of Today's Endpoint Protection Platforms
sponsored by Sentinel Labs, Inc.
CASE STUDY: Open this Gartner Magic Quadrant report to get a clear comparison of how 22 endpoint protection platform providers stack up, as well as the strengths of each individual offering, and some cautions to be aware of so that you can be fully informed when making your purchasing decision.
Posted: 06 Jul 2017 | Published: 30 Jan 2017

Sentinel Labs, Inc.

Leveraging Multi-factor Authentication to Power Protection
sponsored by Centrify Corporation
EBOOK: According to Verizon's 2016 DBIR, 63% of confirmed data breaches last year involved weak, default or stolen passwords. In this e-book, discover how to leverage multi-factor authentication to power protection.
Posted: 28 Jun 2017 | Published: 28 Jun 2017

Centrify Corporation

How to Detect & Respond to a Petya Ransomware Attack
sponsored by AlienVault
WHITE PAPER: On June 27th 2017, a new "Petya-like" form of ransomware spread from Ukraine to wreak havoc around the globe, crippling thousands of computers. Access this white paper to learn the 5 things we know for sure about this new threat and 5 steps to can take to respond to it.
Posted: 28 Jun 2017 | Published: 28 Jun 2017

AlienVault

5 Myths about Privileged Access Security for AWS
sponsored by Centrify Corporation
EBOOK: This e-book dives into the top 5 security myths surrounding AWS. You will learn about the privileged access security model, why maintaining your current security and compliance is slowing down cloud adoption, and more.
Posted: 28 Jun 2017 | Published: 28 Jun 2017

Centrify Corporation

6 Best Practices: Privileged Access Security for AWS
sponsored by Centrify Corporation
RESOURCE: This infographic reveals 6 best practices for implementing and extending AWS security best practices to the cloud. Learn why you should establish a common security model, consolidate identities, and 3 more ways to securely migrate a cloud environment.
Posted: 28 Jun 2017 | Published: 28 Jun 2017

Centrify Corporation

Rethink Security: A Massive Paradigm Shift in the Age of Access
sponsored by Centrify Corporation
EBOOK: Cyber criminals have increased resources at their disposal to get their hands on both end user and privileged user identities. In this e-book uncover the details about the massive shift occurring in the enterprise landscape and the security challenges this shift creates
Posted: 28 Jun 2017 | Published: 28 Jun 2017

Centrify Corporation

Confronting Today's Advanced Email Threats
sponsored by Vircom
WHITE PAPER: Email is becoming one of the most favored attack surfaces used by malicious actors to harm your organization. Discover how to protect your enterprise from the growing number of sophisticated threats in today's threat environment.
Posted: 28 Jun 2017 | Published: 28 Jun 2017

Vircom

Vela Trading Technologies Depends on Gigamon for Real-Time Troubleshooting
sponsored by Gigamon
CASE STUDY: Discover how Vela Trading Technologies bolstered their network security without hindering employee productivity. Find out how they enhanced traffic monitoring, behavioral analytics, data protection, troubleshooting, and more.
Posted: 23 Jun 2017 | Published: 23 Jun 2017

Gigamon

What Makes a Cyber Resilient Organization?
sponsored by IBM Resilient
WHITE PAPER: With a surprising number of companies unsure of their ability to recover from cyberattacks, now is your time to ensure your organization can. Discover what it takes to be cyber resilient and prevent, detect, contain, and recover from a myriad of serious threats against data, applications, and IT infrastructure.
Posted: 19 Jun 2017 | Published: 28 Feb 2017

IBM Resilient

Your expert guide to the highlights of Infosecurity Europe 2017
sponsored by ComputerWeekly.com
EGUIDE: Security technologist Bruce Schneier's insights and warnings around the regulation of IoT security and forensic cyber psychologist Mary Aiken's comments around the tensions between encryption and state security were the top highlights of the keynote presentations at Infosecurity Europe 2017 in London.
Posted: 19 Jun 2017 | Published: 19 Jun 2017

ComputerWeekly.com
26 - 50 of 621 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement