Software  >   Systems Software  >  

Security Software

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Auditing Software (Security), Infrastructure Software, Security Tools
DEFINITION: Software installed on a computer network or an individual computer that protects it from attack.
Security Software Reports
51 - 75 of 356 Matches Previous Page  |  Next Page
Building Management Systems: The cyber security blind spot
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: The systems which control heating, lighting and security in most buildings are vulnerable to cyber attack, this report from QinetiQ warns.
Posted: 26 Jan 2016 | Published: 26 Jan 2016

ComputerWeekly.com

Client Study: Security Intelligence
sponsored by IBM
WHITE PAPER: This report features quantitative statistics documenting the required time, skills and the typical workflow IT security teams utilize to investigate suspected network attacks, security breaches and recognized data loss scenarios. Uncover findings from 196 US IT and IT security practitioners.
Posted: 25 Jan 2016 | Published: 31 Jul 2015

IBM

A Guide to Cyber Risk
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Insurer Allianz Global Corporate & Specialty (AGCS) examines the latest trends in cyber risk and emerging perils around the globe.
Posted: 19 Jan 2016 | Published: 19 Jan 2016

ComputerWeekly.com

Building confidence in data security
sponsored by ComputerWeekly.com
ANALYST REPORT: Businesses need to engage online with users from external organisations and mobile workers about data security. Analysts Bob Tarzey and Clive Longbottom explain why.
Posted: 12 Jan 2016 | Published: 12 Jan 2016

ComputerWeekly.com

Threat Intelligence Platforms: Everything You’ve Ever Wanted to Know But Didn’t Know to Ask
sponsored by ThreatConnect
WHITE PAPER: Today's cyber-threats are relentless, and they come in all forms. This in-depth resource covers the ins and outs of threat intelligence, discussing everything from what threat intelligence is to how you can best utilize it.
Posted: 15 Dec 2015 | Published: 15 Dec 2015

ThreatConnect

Secunia Vulnerability Review
sponsored by ComputerWeekly.com
RESEARCH CONTENT: The absolute number of IT security vulnerabilities detected in Secunia's 2015 annual vulnerability survey reached 15,435, discovered in 3,870 applications from 500 suppliers.
Posted: 23 Sep 2015 | Published: 23 Sep 2015

ComputerWeekly.com

Rethinking Security: Replacing the Traditional Firewall
sponsored by F5 Networks
WHITE PAPER: This white paper discusses how firewalls need to evolve in order to stay relevant and what you can do to embrace that evolution.
Posted: 16 Sep 2015 | Published: 16 Sep 2015

F5 Networks

Protection from Targeted Attacks
sponsored by Mimecast
WHITE PAPER: This white paper introduces a comprehensive form of threat protection that will keep out even today's advanced hacks.
Posted: 11 Sep 2015 | Published: 31 Dec 2014

Mimecast

10 SIEM Platforms Tested for Security Event Management
sponsored by LogRhythm, Inc.
WHITE PAPER: This report looks at ten different SIEM products and analyzes which one performs best when it comes to security event management.
Posted: 05 Aug 2015 | Published: 05 Aug 2015

LogRhythm, Inc.

Special Report: 10 SIEM Technologies Reviewed
sponsored by LogRhythm, Inc.
WHITE PAPER: This report analyzes ten different SIEM technologies for risk management, threat detection, and performance.
Posted: 05 Aug 2015 | Published: 05 Aug 2015

LogRhythm, Inc.

Can You Tell If Your Cloud Servers Are Under Attack?
sponsored by CloudPassage
PRODUCT OVERVIEW: Download this solution brief to learn more about gaining visibility into your cloud or virtual infrastructure through an agile security and compliance platform.
Posted: 15 Jul 2015 | Published: 15 Jul 2015

CloudPassage

Perimeter Security Can’t Protect Your Cloud Workloads
sponsored by CloudPassage
WHITE PAPER: Find out how you can avoid risk and gain complete visibility, no matter which cloud or virtual infrastructure you are using: public, private, hybrid, multi-cloud or virtualized data center. Learn how you can automate security and compliance for your infrastructure and feel confident you critical assets are protected.
Posted: 15 Jul 2015 | Published: 15 Jul 2015

CloudPassage

Mobile Device Management for Retail
sponsored by IBM
WHITE PAPER: Access this white paper to learn about the new age of mobility in the retail space, as well as how to overcome security challenges with centralized device control, compliance, system updates, and disaster recovery.
Posted: 13 Jul 2015 | Published: 26 Dec 2014

IBM

Survey Results: The Value of a SIEM Platform
sponsored by IBM
WHITE PAPER: To ensure you're getting the most out of your SIEM system, you need to understand the value it brings your organization and users. This report presents an in-depth review of one SIEM platform based on survey responses provided by independent IT professionals.
Posted: 05 Jun 2015 | Published: 28 Feb 2014

IBM

How to Sync, Share & Control Data Securely
sponsored by Commvault
WHITE PAPER: Cloud computing has introduced great security risks in the business world. Access this resource and discover ways to achieve data security in the world of cloud file sharing.
Posted: 03 Jun 2015 | Published: 03 Jun 2015

Commvault

Balancing Security and Mobility in the Financial Services Industry
sponsored by IBM
WHITE PAPER: Access this white paper now and discover how you can embrace IT consumerization and provide all of the security you need without sacrificing the benefits of mobility. Read on to learn how you can optimize your mobile strategy.
Posted: 28 Apr 2015 | Published: 26 Dec 2014

IBM

Why Every IT Security Team Needs Anomaly Detection Software
sponsored by Prelert
WHITE PAPER: In this white paper, you will discover the ins and outs of anomaly detection, used to actively prevent today's most pernicious cyber-attacks. Read on to learn the benefits network anomaly detection will deliver to your IT environments, and see how it can function as the "watchdog" for your IT security team.
Posted: 25 Mar 2015 | Published: 31 Dec 2014

Prelert

Security Analytics: Anomaly Detection for IT Security
sponsored by Prelert
VIDEO: Watch this video to learn how anomaly detection systems use advanced analytics to uncover even the subtlest cybercriminals.
Posted: 25 Mar 2015 | Premiered: 25 Mar 2015

Prelert

More Accurate Security Anomaly Detection
sponsored by Prelert
WEBCAST: Discover real-life accounts that describe how machine learning analytics can cut down on false positives and help you zero-in on the actual threats to your data and networks. Learn how to make your enterprise security more effective while making your job a little easier.
Posted: 25 Mar 2015 | Premiered: Mar 25, 2015

Prelert

Mitigating the cyber threat from malicious insiders
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security Thesis Series provides an examination of a malicious insider attack as a sequence of phases and a practical 10-step programme for mitigating the threat.
Posted: 12 Mar 2015 | Published: 12 Mar 2015

ComputerWeekly.com

Detect Network Anomalies with the Right Netflow Analysis Tool
sponsored by Lancope
WHITE PAPER: In this article, a security expert discusses how he found a security tool that met his netflow analysis needs. Read on and learn how you can obtain the deep network insights necessary for stopping advanced hacks in your organization.
Posted: 04 Jan 2016 | Published: 18 Nov 2014

Lancope

Agility in the Data Center
sponsored by SearchDataCenter.com
EBOOK: This expert guide offers all the information you need to discover whether or not SDN is a good fit for your organization. Learn how the pros and cons of SDN and how you should go about implementing it.
Posted: 06 Apr 2015 | Published: 06 Apr 2015

SearchDataCenter.com

The Secret To Finding Unknown IT Security Threats
sponsored by Prelert
WHITE PAPER: Read this brief article to discover how predictive analytics and adaptable machine learning can enhance your security and protect you from even the worst threats.
Posted: 24 Mar 2015 | Published: 18 Mar 2014

Prelert

Distilling Alert Noise to Find Real Problems
sponsored by Prelert
WHITE PAPER: Read this brief article to discover how anomaly detection programs can lower your rates of false positives and make security management much more efficient.
Posted: 24 Mar 2015 | Published: 04 Mar 2015

Prelert

IBM CIO Case Study: Fast and Easy Mobility Strategy Deployment
sponsored by Maas360 by IBM
CASE STUDY: This case study explains how the IBM CIO Office rapidly deployed a mobile device management strategy and on-boarded 15,000 devices in just one day. Read more to learn how one simple software solution can erase all of your worries about adopting a mobile strategy.
Posted: 19 Mar 2015 | Published: 28 Mar 2014

Maas360 by IBM
51 - 75 of 356 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement