Software  >   Systems Software  >  

Security Software

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Auditing Software (Security), Infrastructure Software, Security Tools
DEFINITION: Software installed on a computer network or an individual computer that protects it from attack.
Security Software Reports
51 - 75 of 585 Matches Previous Page  |  Next Page
10 Benefits to Help Combat Ransomware
sponsored by Symantec
WHITE PAPER: Discover 10 ways an incident response service can help your organization right now if you are, or are ever, infected with ransomware.
Posted: 15 Jun 2017 | Published: 15 Jun 2017

Symantec

Internet and Security Threat Report 2017
sponsored by Symantec
WHITE PAPER: Uncover a massive amount of data on current trends and analysis of today's cybersecurity issues and what malicious actors have been up to in the past 3 years. Discover where they might be going, the damage they've done, and much more.
Posted: 14 Jun 2017 | Published: 14 Jun 2017

Symantec

Information Protection in the Web and Cloud Era
sponsored by Symantec
WHITE PAPER: This white paper explores the challenges associated with protecting data in today's enterprise. Discover how a modern data loss prevention (DLP) strategy , delivered as part of a cloud-based web security gateway, can provide continuous protection of sensitive data.
Posted: 13 Jun 2017 | Published: 13 Jun 2017

Symantec

Your Guide to Combating Phishing in 2017
sponsored by PhishMe
WHITE PAPER: To better understand the benefits, costs, and risks associated with PhishMe, Forrester interviewed executives at five companies with experience using simulator, reporting, and triage tools. Uncover the results in this report today.
Posted: 13 Jun 2017 | Published: 12 Jun 2017

PhishMe

Six Criteria for Buying Data Loss Prevention Products
sponsored by InteliSecure
EGUIDE: Discover 6 steps your organization can take when thinking about what data loss prevention means to your security posture and what to look for to shore up your own defenses.
Posted: 12 Jun 2017 | Published: 07 Jun 2017

InteliSecure

Introduction to Data Loss Prevention Tools
sponsored by InteliSecure
EGUIDE: In this e-guide discover what it means for security for data to be in use, in motion, and at rest; how DLP works in a standalone vs. integrated context; the DLP learning curve; and more.
Posted: 12 Jun 2017 | Published: 07 Jun 2017

InteliSecure

6 Key Security Considerations for Responsible Cloud Migration
sponsored by Symantec
WHITE PAPER: This guide examines 6 important issues to consider when moving enterprise data and applications to the cloud. Learn how to navigate the perils of complexity through smart policies, consider data loss prevention issues, and 4 more ways to migrate to the cloud responsibly.
Posted: 12 Jun 2017 | Published: 12 Jun 2017

Symantec

8 Things to Know About a Secure Web Gateway
sponsored by Symantec
WHITE PAPER: This guide reveals 8 considerations for secure web gateways. Learn about proxy technology, why powerful cloud-based application controls are key, and 6 more must-know aspects of secure web gateways.
Posted: 12 Jun 2017 | Published: 12 Jun 2017

Symantec

5 Reasons to Upgrade Your Endpoint Security
sponsored by Symantec
WHITE PAPER: Uncover 5 reasons to upgrade your endpoint security to ensure that your organization is prepared to handle today's threat landscape.
Posted: 12 Jun 2017 | Published: 31 May 2017

Symantec

Dealing with Ransomware, Business Email Compromise and Spearphishing
sponsored by PhishMe
WHITE PAPER: Phishing, spearphishing, CEO Fraud/BEC and ransomware represent serious threats to any organization. Access this survey report to discover 14 robust cybersecurity best practices that can be implemented to reduce the chances of these threats.
Posted: 12 Jun 2017 | Published: 12 Jun 2017

PhishMe

Conquer malware: Cloud-based protection, multi-lane Defense, and more
sponsored by Symantec
WHITE PAPER: Learn how to deploy cloud-based malware protection with multiple lines of defense giving your organization the ability to leverage analytics to combat the malware threat.
Posted: 09 Jun 2017 | Published: 09 Jun 2017

Symantec

Next Generation Endpoint Security: Hype or Hope?
sponsored by Symantec
WHITE PAPER: Discover the trends that have emerged to deal with malware challenges on the endpoint. Plus, uncover the information necessary to evaluate the right approach for your organization.
Posted: 09 Jun 2017 | Published: 09 Jun 2017

Symantec

Building a More Effective Vulnerability Scanning Program
sponsored by Rapid7
WHITE PAPER: This white paper compares 2 vulnerability management systems side by side, and you can see for yourself which system is superior.
Posted: 09 Jun 2017 | Published: 09 Jun 2017

Rapid7

Building a World-Class Web Application Security Program
sponsored by Rapid7
CASE STUDY: Read this case study to learn the criteria that went into Microsoft's decision making process when buying their new web application vulnerability scanning system.
Posted: 08 Jun 2017 | Published: 08 Jun 2017

Rapid7

GDPR Compliance: From a Compliance Burden to a Security Opportunity
sponsored by Symantec
WHITE PAPER: Uncover the complexities involved in complying with the GDPR, and why many organizations need to rethink their approach to processing personal data if they are going to mitigate the burden of compliance and avoid getting fined.
Posted: 08 Jun 2017 | Published: 08 Jun 2017

Symantec

IT/Security Alignment Paves the Way for Effective Risk Management at University of Salzburg
sponsored by Rapid7
CASE STUDY: Find out how the University of Salzburg's small IT team was able to gain simple reporting that helped them prioritize and remediate issues based off the needs of the organization in this case study.
Posted: 08 Jun 2017 | Published: 08 Jun 2017

Rapid7

Gain Deeper Insights into Your System with this Vulnerability Management System
sponsored by Rapid7
WHITE PAPER: In this white paper, learn about a new vulnerability management system which can provide you with constant intelligence to discover, pinpoint, and prioritize threats to your business.
Posted: 08 Jun 2017 | Published: 08 Jun 2017

Rapid7

To SIEM or not to SIEM
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Uncover the top 5 reasons why SIEM can be a bad choice for mid-market companies.
Posted: 06 Jun 2017 | Published: 30 Dec 2016

Arctic Wolf Networks, Inc.

Application Security Buyers Guide: 15 Requirements
sponsored by Rapid7
WHITE PAPER: In this white paper, learn the 15 elements you need to make sure an application scanning vendor has before making a purchasing decision.
Posted: 06 Jun 2017 | Published: 06 Jun 2017

Rapid7

SSL: Get the Best for You and Mitigate Vulnerabilities
sponsored by A10 Networks
EGUIDE: Inside this e-guide industry experts uncover how security professionals can overcome SSL security issues. Access now to discover how to approach SSL security, tactics to choose the best SSL for your business, 7 steps to overcome SSL vulnerabilities and more.
Posted: 05 Jun 2017 | Published: 30 May 2017

A10 Networks

How the Hybrid Cloud Changes the Game for Security
sponsored by TrendMicro
WHITE PAPER: Discover the dynamics of the hybrid cloud, and uncover the security challenges that organizations are facing as they adopt the latest technologies.
Posted: 14 Jun 2017 | Published: 14 Jun 2017

TrendMicro

The State of Endpoint Security: Approaches, Opportunities and Conclusions
sponsored by TrendMicro
WHITE PAPER: Discover an overview and breakdown of approaches, opportunities and conclusions regarding of the current state of endpoint security.
Posted: 13 Jun 2017 | Published: 13 Jun 2017

TrendMicro

Cloud Computing Top Threats
sponsored by HPE and IntelĀ® Corporate
WHITE PAPER: This Cloud Security Alliance report focuses on 12 security concerns specifically related to the shared, on-demand nature of cloud computing. Discover an in-depth dissection of the issues and gain insight to help you make informed decisions about risk mitigation within a cloud strategy.
Posted: 08 Jun 2017 | Published: 08 Jun 2017

HPE and IntelĀ® Corporate

How to Prepare for a Cloud DDoS Attack on an Enterprise
sponsored by F5 Networks
EGUIDE: Learn the truth behind cloud DDoS attacks and how an enterprise that uses cloud services could protect itself against such a threat.
Posted: 08 Jun 2017 | Published: 31 May 2017

F5 Networks

A Closer Look at Cloud Migration Security Risks
sponsored by F5 Networks
EGUIDE: Explore the security challenges when moving workloads and data into the cloud, and how to mitigate the risks they entail.
Posted: 08 Jun 2017 | Published: 31 May 2017

F5 Networks
51 - 75 of 585 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement