IT Systems  >   Business Systems  >  

Security Systems

RSS Feed    Add to Google    Add to My Yahoo!
Security Systems Reports
76 - 100 of 847 Matches Previous Page  |  Next Page
Norton Cyber Security Insights Report
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This report examines consumers' online behaviours, attitudes and security habits alongside the dangers and financial cost of cyber crime
Posted: 16 Feb 2016 | Published: 16 Feb 2016

ComputerWeekly.com

How Mobile Malware Compromises Your Secure Containers and Enterprise Content
sponsored by Checkpoint Software Technologies
WHITE PAPER: In this white paper, you will learn how mobile malware could compromise your secure containers and enterprise content.
Posted: 11 Feb 2016 | Published: 30 Mar 2015

Checkpoint Software Technologies

Speak SMB Security: How You Can Be a Security Thought Leader
sponsored by OpenDNS
WEBCAST: In this webcast, learn best practices for defending against the new crime ecosystem and what SMBs need to do to stay protected. Download now to discover why cybercrime is easier than ever and 3 steps for securing your customers.
Posted: 09 Feb 2016 | Premiered: Dec 18, 2015

OpenDNS

Today's Top DDoS Services Providers
sponsored by Imperva
WHITE PAPER: Forrester Research offers unique insight into the rapidly growing DDoS attacks. This report details how well each vendor measures up against Forrester's criteria and against each other with their DDoS prevention services.
Posted: 09 Feb 2016 | Published: 22 Jul 2015

Imperva

A New Guide to Critical Capabilities for Mobile Data Protection Solutions
sponsored by Digital Guardian
WHITE PAPER: In this white paper you will discover solutions for MDP to defend access to storage systems found in laptops, removable media and cloud environments. You will learn how to enforce secure policies across multiple platforms at minimal costs.
Posted: 28 Jan 2016 | Published: 08 Sep 2014

Digital Guardian

What Story Does Your IT Security Tell?
sponsored by Prelert
DATA SHEET: In this resource, you will discover how to analyze log data and locate anomalies in order to combat advanced cyberthreats with an anomaly detection application. Access this resource to apply behavioral analytics to any data resource—including Windows event logs, DNS logs, and firewall logs.
Posted: 28 Jan 2016 | Published: 31 Dec 2015

Prelert

Operation Nexterday
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This study by ICT Intuition and Coleman Parkes Research shows strong demand among enterprises for new connected digital services, but also a serious gap in operators' ability to satisfy them.
Posted: 28 Jan 2016 | Published: 28 Jan 2016

ComputerWeekly.com

A Guide to Protecting your Critical Assets with Identity Governance
sponsored by IBM
WHITE PAPER: In this white paper, you will learn how to secure the gateway to your organization with robust identity governance policies. Read on now to protect assets, and control access risks and separation-of-duties (SoD) violations, by enforcing business-driven identity governance for managing user roles.
Posted: 26 Jan 2016 | Published: 31 Mar 2015

IBM

Client Study: Security Intelligence
sponsored by IBM
WHITE PAPER: This report features quantitative statistics documenting the required time, skills and the typical workflow IT security teams utilize to investigate suspected network attacks, security breaches and recognized data loss scenarios. Uncover findings from 196 US IT and IT security practitioners.
Posted: 25 Jan 2016 | Published: 31 Jul 2015

IBM

Intelligent Spear Phishing Protection: Stopping Highly Targeted Attacks
sponsored by Cloudmark
WHITE PAPER: Discover spear phishing as a catastrophic threat to an enterprise, how the tactic is deployed, and how it evades conventional defenses. Read on to learn how to counter it with a solution that uses next-generation context analysis and behavioral learning, real-time reporting dashboards, and more.
Posted: 25 Jan 2016 | Published: 31 Dec 2015

Cloudmark

Is Your Network Security Limited to Defending Yesterday's Threats?
sponsored by IBM
WHITE PAPER: In this infographic, you will discover how to safeguard your organization from new and emerging threats with a next-gen IPS. Read on how to move beyond pattern matching and apply behavior-based protection to combat advanced and unknown threats to defend your organization.
Posted: 25 Jan 2016 | Published: 03 Nov 2015

IBM

The Impact of Spear Phishing: Enterprise Survey Findings
sponsored by Cloudmark
VIDEO: In this informative video, you'll hear from cyber security expert Morgan Wright and Cloudmark's SVP of engineering Leon Rishniw as they discuss the impacts of spear phishing. Tune in for details on how you can defend the enterprise against this expanding threat.
Posted: 22 Jan 2016 | Premiered: 13 Jan 2016

Cloudmark

The Expansion of the IPS Appliance Market and Intrusion Prevention Systems Assessment
sponsored by IBM
RESOURCE: In this report, you will evaluate several best-in-class intrusion prevention systems, and determine which stand-alone IPS appliances offer the functionality needed in your enterprise. Read on to learn which vendors offer IPS and IDS functionality to provide control over public cloud workloads.
Posted: 22 Jan 2016 | Published: 16 Nov 2015

IBM

Containers and the Cloud: Overcoming Security Concerns
sponsored by CloudPassage
WEBCAST: This webcast contains a discussion of a cloud security innovation, containerization.
Posted: 19 Jan 2016 | Premiered: Dec 31, 2015

CloudPassage

Detecting Data Exfiltration
sponsored by LogRhythm, Inc.
VIDEO: Watch this webcast and learn how you can rapidly detect, respond and neutralize breaches in your networks before they cause serious damage.
Posted: 19 Jan 2016 | Premiered: 03 Aug 2015

LogRhythm, Inc.

A Guide to Cyber Risk
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Insurer Allianz Global Corporate & Specialty (AGCS) examines the latest trends in cyber risk and emerging perils around the globe.
Posted: 19 Jan 2016 | Published: 19 Jan 2016

ComputerWeekly.com

Hospitality and Cybercrime: How to Safeguard Sensitive Information
sponsored by SurfWatch Labs
WHITE PAPER: This white paper explores the many cyber-risks faced by the hospitality sector. Access it and discover just how much your business is at risk – and what you can do about it.
Posted: 06 Jan 2016 | Published: 06 Jan 2016

SurfWatch Labs

Your Guide to the Art of Delivering Identity Federation
sponsored by Radiant Logic, Inc.
EBOOK: In this e-book, you will discover how to deliver first-class identity security and federation with stronger authentication and richer authorization. Read on to and find out why federating the identity layer is essential for empowering today's fragmented IAM infrastructures.
Posted: 14 Dec 2015 | Published: 31 Dec 2014

Radiant Logic, Inc.

Case Study: Closing in on China's Unit 78020
sponsored by ThreatConnect
WHITE PAPER: This report explores how a Chinese cyber-espionage group known as Unit 78020 was discovered with an advanced intrusion analysis strategy.
Posted: 14 Dec 2015 | Published: 14 Dec 2015

ThreatConnect

Insider Threats in the Real World
sponsored by OptioLabs
WHITE PAPER: This white paper introduces an approach to security that reduces the risk of real life insider threats, including eavesdropping, shoulder-surfing, credentials theft, and more.
Posted: 04 Dec 2015 | Published: 04 Dec 2015

OptioLabs

Battling Security Threats from Within your Organization
sponsored by IBM
WHITE PAPER: Access this report to discover how employees and other business partners may be taking advantage of your data. Read on and learn mitigation techniques for threats within the enterprise.
Posted: 30 Nov 2015 | Published: 30 Jun 2015

IBM

Advanced Persistent Threat Detection: Can It Find Custom Malware?
sponsored by UnitedLex
EGUIDE: A recent test showed that some well-known threat detection products were unable to detect custom-written malware samples thrown at them. Access this resource and find out if APT detection is an effective way to find custom malware, and why signature-based antimalware tools can't keep up with today's evolving security risks.
Posted: 18 Feb 2016 | Published: 16 Feb 2016

UnitedLex

How Global Threat Intelligence Fits into a Security Strategy
sponsored by UnitedLex
EGUIDE: While global threat intelligence services can be a powerful business security tool, it's not the first one you should consider when setting strategy for better business security. Read on to evaluate the role of global threat intelligence in today's enterprise and assess other tactics to bolster this strategy.
Posted: 18 Feb 2016 | Published: 16 Feb 2016

UnitedLex

Detect Network Anomalies with the Right Netflow Analysis Tool
sponsored by Lancope
WHITE PAPER: In this article, a security expert discusses how he found a security tool that met his netflow analysis needs. Read on and learn how you can obtain the deep network insights necessary for stopping advanced hacks in your organization.
Posted: 04 Jan 2016 | Published: 18 Nov 2014

Lancope

Case Study: School District Stops Breaches with Heightened Network Visbility
sponsored by Lancope
WHITE PAPER: Access this case study to discover how a large school district blocked breaches with network visibility, improved its incident response time, and more.
Posted: 30 Dec 2015 | Published: 30 Dec 2015

Lancope
76 - 100 of 847 Matches Previous Page    2 3 4 5 6 7    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement