Software  >   Systems Software  >  

Security Software

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Auditing Software (Security), Infrastructure Software, Security Tools
DEFINITION: Software installed on a computer network or an individual computer that protects it from attack.
Security Software Reports
51 - 75 of 580 Matches Previous Page  |  Next Page
Actionable Threat Intelligence: Your Guide to the OilRig Malware Campaign
sponsored by LogRhythm, Inc.
WHITE PAPER: The OilRig campaign of cyberattacks have cut a bloody, digital swath through banks and governmental entities in Middle Eastern countries and the U.S. Provide your organization with actionable intelligence regarding threat actors and the tools, techniques, and procedures the OilRig malware campaign uses.
Posted: 12 Apr 2017 | Published: 31 Mar 2017

LogRhythm, Inc.

Top 6 Best Practices For Workload Security In Public & Private Cloud
sponsored by Cloudvisory
WHITE PAPER: Learn 6 best practices that your organization can utilize to improve workload security on the cloud.
Posted: 12 Apr 2017 | Published: 12 Apr 2017

Cloudvisory

Sustainable Security Operations: Optimize Processes and Tools to Make the Most of Your Team's Time and Talent
sponsored by McAfee, Inc.
WHITE PAPER: Discover a modular security optimization platform with an open design that allows you to scale to meet increasing compliance demands and a maturing threat landscape. Learn how you can automate first response using threat intelligence, increase reporting accuracy using behavioral analytics, and more inside.
Posted: 12 Apr 2017 | Published: 31 Oct 2016

McAfee, Inc.

What Security Monster is Lurking in Your IT Closet?
sponsored by BDNA
WHITE PAPER: Learn how to build continuous awareness, monitoring, and mitigation of IT vulnerabilities with security automation.
Posted: 11 Apr 2017 | Published: 11 Apr 2017

BDNA

Rapid Growth of SSL Encryption
sponsored by Fortinet, Inc.
WHITE PAPER: Discover 8 parts of a successful encryption strategy. Also learn 5 factors aiding SSL traffic growth, 3 ways cybercriminals use SSL encryption nefariously, why enterprises often elect to not inspect SSL traffic, and more.
Posted: 11 Apr 2017 | Published: 11 Apr 2017

Fortinet, Inc.

5 Steps to Improve Your Cyber Security Incident Response Plan
sponsored by IBM
WHITE PAPER: Having an incident response plan can positively impact the cost of a data breach. Access this white paper to learn five steps to assess and improve your existing incident response plan – or write a brand new one.
Posted: 11 Apr 2017 | Published: 11 Apr 2017

IBM

3 Steps to Protect Your Data During the High Risk Exit Period
sponsored by Veriato, Inc.
WHITE PAPER: Discover 3 steps that can be put in place to mitigate the risk that employees place on your enterprise when they leave and take sensitive data with them.
Posted: 11 Apr 2017 | Published: 11 Apr 2017

Veriato, Inc.

Advanced Analytics and Machine Learning: A Prescriptive and Proactive Approach to Security
sponsored by McAfee, Inc.
WHITE PAPER: Overwhelmed by the immense volume of security intelligence and alerts, human analysts need machine learning to augment and accelerate their efforts. In this white paper learn how these programs adapt to threats based on new data in a 3 part learning process, separate static and dynamic data to sift the clean files from the malware, and more.
Posted: 11 Apr 2017 | Published: 28 Feb 2017

McAfee, Inc.

Cyber security in the Middle East
sponsored by ComputerWeekly.com
EGUIDE: As organisations increase their reliance on IT through rapid digital transformations, the threat of cyber attack grows. It is not just western countries such as the US and the UK that are being targeted by hackers, as the rapidly developed and wealthy nations of the Middle East become targets of both politically and financially driven attacks.
Posted: 11 Apr 2017 | Published: 11 Apr 2017

ComputerWeekly.com

Focus ASEAN: Security & Digital Transformation
sponsored by ComputerWeekly.com
EGUIDE: With cyber threats and attacks making headlines almost every day, governments and enterprises in Southeast Asia are placing greater emphasis on shoring up their cyber defenses, more so as they transform their economies digitally.
Posted: 10 Apr 2017 | Published: 11 Apr 2017

ComputerWeekly.com

Q&A: Analyzing DNS Services with Paul Vixie
sponsored by Farsight Security
EGUIDE: Dive into this interview as cybersecurity expert Paul Vixie, one of the founders of the Internet Software Consortium, talks about some of his ongoing domain name system (DNS) research, including how domain names are being abused and the data science of looking for patterns.
Posted: 10 Apr 2017 | Published: 04 Apr 2017

Farsight Security

End-to-End Visibility: The Foundation of Business-Driven Security
sponsored by RSA
WHITE PAPER: Access this white paper now to learn how to gain visibility into your network and: how logs are not enough when it comes to visibility, a patchwork of point-solutions creates inefficient silos, modern infrastructure compounds blind spots, and more.
Posted: 10 Apr 2017 | Published: 10 Apr 2017

RSA

How to Bridge the Gap in Data Protection and Recovery
sponsored by Veeam Software
WHITE PAPER: In this white paper learn how backup appliances can ensure your data and documents can be recovered in case of loss and drive huge improvements in backup performance and recovery times. Also discover 5 common backup problems and their solutions, as well as 6 things to look for when choosing the right solution to bridge the availability gap.
Posted: 10 Apr 2017 | Published: 10 Apr 2017

Veeam Software

Cloud Security: An Example Threat Report
sponsored by Cloudvisory
WHITE PAPER: Learn what cloud threat information is vital to ensure that your enterprise gains the ability to see exactly what is deployed, where, and in real time; instant identification of any out-of-bound usage; a "baseline" state of the cloud deployment for comparison; and more.
Posted: 10 Apr 2017 | Published: 10 Apr 2017

Cloudvisory

4 Requirements for a Multi-Cloud Security Approach
sponsored by Cloudvisory
WHITE PAPER: Discover how to replace your traditional network controls with a centralized security policy management platform that can enforce policy through the existing granular, cloud-native security controls of each provider for tighter security with 4 requirements.
Posted: 10 Apr 2017 | Published: 10 Apr 2017

Cloudvisory

How to Gain Peace of Mind in the Cloud: Email and Office 365
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Discover how to obtain end-to-end encryption and full privacy in the cloud for your enterprise's email and Office 365. Learn why email remains at risk, what Forrester expert Kelley Mak thinks, and more.
Posted: 10 Apr 2017 | Published: 31 Dec 2016

Hewlett Packard Enterprise

Effective Information Governance Strategies
sponsored by Iron Mountain
EGUIDE: In this e-guide, experts uncover how organizations are struggling to create effective information governance strategies and the increasing effects BYOD, Big Data, and hybrid storage environments are having on this process.
Posted: 07 Apr 2017 | Published: 03 Apr 2017

Iron Mountain

New GDPR Mandates Require Changes to Storage Management Strategies for All Global Enterprises
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: With failure to comply to the GDPR causing a company to be subject to a fine up to €20 million or 4% of total yearly worldwide turnover (whichever is higher) and/or regular audits, planning to pay isn't an option. Access this Gartner report now to learn how to make an actionable plan for GDPR compliance and avoid business-breaking fines.
Posted: 07 Apr 2017 | Published: 26 Aug 2016

Hewlett-Packard Enterprise

Cloud Security Report: How is IT Responding to Today's Threats
sponsored by Cloudvisory
WHITE PAPER: Access this 2017 cloud security spotlight report to learn how organizations are responding to the security threats in the cloud, and what tools and best practices IT security leaders are considering in their move to the cloud, and more.
Posted: 07 Apr 2017 | Published: 07 Apr 2017

Cloudvisory

7 Questions to Achieve GDPR Compliance
sponsored by Hewlett-Packard Enterprise
WEBCAST: Discover the answers to seven questions that can help you achieve GDPR compliance, covering subjects like how to address your readiness status, what information falls under these regulations, how to respond to legal matters, and more.
Posted: 07 Apr 2017 | Premiered: Nov 18, 2016

Hewlett-Packard Enterprise

Compliance and Beyond: Future-Proofing Your Password Policy
sponsored by Specops Software
WHITE PAPER: This white paper digs down into a variety of password security best practices to determine which established methods are still relevant. Learn how to improve password management with new best practices designed for modern compliance.
Posted: 07 Apr 2017 | Published: 07 Apr 2017

Specops Software

Migration to Exchange Online and Office 365: A Step-by-Step Guide
sponsored by Hewlett Packard Enterprise
WHITE PAPER: For IT administrators who have not been involved in a previous migration to Office 365, there is a steep learning curve. In this step-by-step guide, learn how to select the migration option that makes most sense for your organization to ensure future success and reliable security.
Posted: 07 Apr 2017 | Published: 07 Apr 2017

Hewlett Packard Enterprise

Beginner's Guide to Hybrid Cloud Security
sponsored by AlienVault
WHITE PAPER: Learn everything you need for a successful hybrid cloud deployment, including: the cloud security shared responsibility model, how familiar network security challenges persist in the cloud, what new security challenges emerge in the cloud, and a smarter approach to threat detection in hybrid cloud security.
Posted: 07 Apr 2017 | Published: 07 Apr 2017

AlienVault

Focus ANZ: Security & Digital Transformation
sponsored by ComputerWeekly.com
EGUIDE: With cyber threats and attacks making headlines almost every day, cyber security has now become a key focus of many governments and enterprises all over the world. In this e-guide, read about the new measures the Australian government is putting in placeto protect critical systems from cyber attacks.
Posted: 07 Apr 2017 | Published: 07 Apr 2017

ComputerWeekly.com

Information Insight for GDPR Compliance
sponsored by Hewlett-Packard Enterprise
WEBCAST: Learn about the General Data Protection Regulation and its impact on compliance in the enterprise. Learn the objectives of GDPR for citizens and enterprises, the business opportunity of GDPR, and more.
Posted: 06 Apr 2017 | Premiered: Feb 5, 2017

Hewlett-Packard Enterprise
51 - 75 of 580 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement