IT Systems  >   Business Systems  >  

Security Systems

RSS Feed    Add to Google    Add to My Yahoo!
Security Systems Reports
226 - 250 of 995 Matches Previous Page  |  Next Page
Buying Criteria for Next-Generation Network Security
sponsored by Cisco Systems, Inc.
WHITE PAPER: Discover an in-depth explanation of the factors that compel organizations to look at next-generation solutions. This buyer's guide offers an analysis of the most important capabilities you should look for (and demand) from your network security gear, and will arm you with the information you need to be an educated buyer.
Posted: 12 Sep 2016 | Published: 12 Sep 2016

Cisco Systems, Inc.

Beyond Application Visibility and Control: What an NGFW Must Be
sponsored by Cisco Systems, Inc.
WHITE PAPER: Explore the ways in which digital transformation is changing businesses' security, and discover why typical NGFWs that focus primarily on app visibility offer an incomplete approach to threat defense. Read on to employ a NGFW that protects across the entire attack continuum, and integrates with existing security investments.
Posted: 12 Sep 2016 | Published: 12 Sep 2016

Cisco Systems, Inc.

Next-Generation Firewalls: An Investment Checklist
sponsored by Cisco Systems, Inc.
WHITE PAPER: What should you look for in a next-generation firewall? This paper includes a checklist against which you evaluate NGFWs. Read on now to determine the benefits a truly effective NGFW can deliver, and find one that will provide actionable indications of compromise to identify malicious activity, and more.
Posted: 12 Sep 2016 | Published: 12 Sep 2016

Cisco Systems, Inc.

2016 Digital Channel Threat Report: Enabling Secure Convenience
sponsored by SAS
WHITE PAPER: To successfully prevent fraud while retaining the benefits of offering digital financial services, financial institutions must understand how cybercriminals exploit these capabilities. Read on to explore strategies for protecting mobile wallets, digital account opening, and more.
Posted: 06 Sep 2016 | Published: 31 May 2016

SAS

How to Secure Cloud Applications & Services
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: In this executive guide, uncover everything you need to know to transition to the cloud seamlessly. Learn about incident response and threat detection, compliance and data privacy, selecting a CASB solution, and more.
Posted: 01 Sep 2016 | Published: 01 Sep 2016

Symantec & Blue Coat Systems

A Guide to Safely Adopting Office 365
sponsored by Symantec + Blue Coat
WHITE PAPER: Access this white paper for tips on how you can safely adopt Office 365. Learn where Office 365 fails to protect your organization and how to mitigate those shortcomings to prevent data exposures, safeguard against unauthorized user activity, and more.
Posted: 01 Sep 2016 | Published: 01 Sep 2016

Symantec + Blue Coat

Sandnet++ – A framework for analysing and visualising network traffic from malware
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series looks at Sandnet++, a framework for analysing and visualising network traffic from malware
Posted: 01 Sep 2016 | Published: 02 Sep 2016

ComputerWeekly.com

Analysis of the Linux Audit System
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series identifies serious flaws due to architectural limitations of the Linux kernel which cast doubts on its ability to provide forensically sound audit records and discusses possible mitigation techniques.
Posted: 31 Aug 2016 | Published: 01 Sep 2016

ComputerWeekly.com

2016 Cyber Security Intelligence Index
sponsored by IBM
WHITE PAPER: This in-depth analysis outlines what IT and security professionals learned from 2015's cyberattacks. Discover which industries were most targeted, the role insiders played in exploitation of vulnerabilities and, most importantly, what you can do to avoid catastrophic data loss.
Posted: 29 Aug 2016 | Published: 01 Jul 2016

IBM

11 Steps IT Needs to Take When Adopting Cloud Apps and Services
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: This guide takes you through the 11 steps that enterprises can take to optimize the benefits of cloud applications, while mitigating the risks inherent in adoption.
Posted: 29 Aug 2016 | Published: 29 Aug 2016

Symantec & Blue Coat Systems

Bad Bots, Good Bots and Humans: Quantifying the Risk of Bad Bots
sponsored by Distil Networks
WHITE PAPER: Discover not only the detailed nature of bots, both good and bad ones, but also how to mitigate the massive threat bad bots pose to your enterprise's web presence. Learn not only the numbers and loss surrounding bad bot traffic, but also how to maximize your enterprise's ROI in keeping the bots at bay.
Posted: 29 Aug 2016 | Published: 31 Jul 2016

Distil Networks

Quantifying the Risk and Economic Impact of Bad Bots
sponsored by Distil Networks
WHITE PAPER: Learn how to mitigate the threat of bad bots to your enterprise's sites. Discover vital information on issues faced by sites due to bad bots, such as web scraping, security breaches, spam, skewed analytics, and more.
Posted: 26 Aug 2016 | Published: 26 Aug 2016

Distil Networks

Glossary: The Cloud's Compliance Landscape
sponsored by VMware
WHITE PAPER: Discover a comprehensive glossary of compliance standards for the cloud. Learn what your enterprise needs to remain compliant in the following fields: Audit/Assurance, Management, Finance, and more.
Posted: 23 Aug 2016 | Published: 23 Aug 2016

VMware

Don't let your on-premises Active Directory be your Achilles' heel
sponsored by Quest
WHITE PAPER: Learn how a hybrid Active Directory (AD) can keep your network safe from the vulnerability normally suffered by on-premises ADs. Discover how it establishes configuration baselines, detects and alerts administrators of realized and potential threats, and remediates unauthorized access and security changes.
Posted: 22 Aug 2016 | Published: 22 Aug 2016

Quest

What to Look for in a Security Partner
sponsored by Arbor Networks
WEBCAST: Learn the qualifications that a network security and management partner need to have. Uncover why DDoS is such a major threat, and how to reduce the risk these types of attacks pose to enterprise networks.
Posted: 18 Aug 2016 | Premiered: Mar 28, 2016

Arbor Networks

Perspective: The Art and Science of Value Realization in the Cloud
sponsored by Infor
WHITE PAPER: Discover how to optimize your enterprise's cloud expense and see just how much business value it creates. See such value added as physical records savings, workforce hours, and streamlined workloads.
Posted: 17 Aug 2016 | Published: 25 Jul 2016

Infor

Are You Complacent About Mobile Threats?
sponsored by Lookout
EGUIDE: In this expert guide, learn how a lackadaisical attitude towards mobile security can prove to be catastrophic to enterprises as mobile threats continue to exploit known vulnerabilities to gut profits.
Posted: 12 Sep 2016 | Published: 09 Sep 2016

Lookout

IoT: What it Takes to Run a Wireless, Secure, Mobile Strategy
sponsored by Aruba Networks
EGUIDE: The Internet of Things is here and the knowledge of how to run it effectively is vital. Without a plan and without a vision, the IoT can fall apart catastrophically. In this e-guide, learn what it takes to run an IoT wireless network, how BYOD and IoT device onboarding can improve security, and what your mobile security strategy should look like.
Posted: 09 Sep 2016 | Published: 07 Sep 2016

Aruba Networks

How to Secure Azure and Recover From the Worst Disasters
sponsored by Softchoice Corporation
EGUIDE: In this e-guide, expert Rob Shapland breaks down how two new Microsoft Azure features aim to boost cloud security for enterprises. Learn how to keep Azure secure and keep your business going if disaster strikes and the worst is realized.
Posted: 08 Sep 2016 | Published: 07 Sep 2016

Softchoice Corporation

Four Key Steps That Can Move You Toward More Mature Identity And Access Management Program Now
sponsored by IBM
WHITE PAPER: Learn the benefits of taking a deliberate approach to maturing an existing IAM program that directly improves business performance and security posture in this white paper. Uncover how to reduce costs through automation, improve operational efficiency through an integrated technology framework, and more.
Posted: 30 Aug 2016 | Published: 31 Jul 2016

IBM

The Current Landscape of Advanced Persistent Threats
sponsored by Proofpoint, Inc.
EGUIDE: In this e-guide, discover not only how to talk about Advanced Persistent Threats within your enterprise, but also uncover what the current landscape looks like in regards to these ever-evolving malicious attacks.
Posted: 24 Aug 2016 | Published: 23 Aug 2016

Proofpoint, Inc.

How to Approach Storage Disaster Recovery
sponsored by Rubrik
EGUIDE: In this e-guide learn how to turn back time on a disaster to recover what was lost; manage "deduped" data, and more. Read on to ensure your enterprise can take a hit and recover quickly, allowing for a low-impact return to normalcy.
Posted: 22 Aug 2016 | Published: 18 Aug 2016

Rubrik

University of Wisconsin-Superior Secures Their Campus Network with AlienVault® USMTM
sponsored by AlienVault
WHITE PAPER: University of Wisconsin–Superior's IT team was looking to replace their outdated intrusion prevention system. In this case study, discover how they were able to overcome budget challenges in order to find a solution that still met the security needs of their large network.
Posted: 19 Aug 2016 | Published: 19 Aug 2016

AlienVault

Conquering the Cloud: Top Security Issues and Keeping Hackers at Bay
sponsored by TrendMicro
EGUIDE: In this e-guide, discover two articles that detail the top security issues of the cloud and offer strategies on how to keep malicious hackers at bay.
Posted: 18 Aug 2016 | Published: 11 Aug 2016

TrendMicro

Testing the Cloud: Ensuring Enterprise Data is Secure
sponsored by TrendMicro
EGUIDE: In this e-guide, discover how to minimize threats through public cloud security testing. Plus, learn how penetration testing requirements differ for AWS, Google and Azure.
Posted: 17 Aug 2016 | Published: 11 Aug 2016

TrendMicro
226 - 250 of 995 Matches Previous Page    8 9 10 11 12 13    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement