IT Systems  >   Business Systems  >  

Security Systems

RSS Feed    Add to Google    Add to My Yahoo!
Security SystemsReports
76 - 100 of 930 Matches Previous Page  | Next Page
Akamai's (State of the Internet) / Security
sponsored by Akamai Technologies
WHITE PAPER: The following white paper explores the explosion of DDoS attacks that took place Q3 2014 and examines the various methods used, potential ways to thwart future attacks, and much more.
Posted: 11 Nov 2014 | Published: 11 Nov 2014

Akamai Technologies

Minimize Cheque Fraud and Counterfeited Print
sponsored by Hewlett-Packard Limited
WHITE PAPER: This white paper introduces a solution developed by HP and TROY to control check printing operations and help prevent fraud on finished checks, adding security to a variety of applications.
Posted: 10 Nov 2014 | Published: 31 Mar 2014

Hewlett-Packard Limited

Keep Cyber Threats From Destroying Your Organization
sponsored by LabTech Software
EBOOK: This exclusive white paper examines future security risks to the network and provides and in-depth look at how to combat them.  Read on to learn how you can ease that burden for your IT department.
Posted: 10 Nov 2014 | Published: 10 Nov 2014

LabTech Software

Comply Before You Connect: Security for Federal Agencies
sponsored by IBM
WHITE PAPER: This white paper discusses the use of "comply-to-connect" initiatives in federal agencies and proposes IBM Endpoint Manager as a solution to the need for continuous compliance.
Posted: 07 Nov 2014 | Published: 30 Sep 2013

IBM

How to Deal with Increasing DDOS Attacks
sponsored by Verisign, Inc.
EGUIDE: This expert e-guide explores how to protect your organization from distributed denial of service attacks.
Posted: 07 Nov 2014 | Published: 07 Nov 2014

Verisign, Inc.

Web Application Firewall Buying Guide
sponsored by SearchSecurity.com
EBOOK: In this buyer's guide, experts explain how a WAF works, describe the features that different WAFs possess, and reveal how to weight these factors in selecting the right WAF to protect your enterprise's sensitive data.
Posted: 07 Nov 2014 | Published: 07 Nov 2014

SearchSecurity.com

Risk & Compliance Monitoring
sponsored by Software AG
VIDEO: This exclusive video covers a platform-based solution with real-time analytics that can help you manage risk and stay compliant.
Posted: 07 Nov 2014 | Premiered: 07 Nov 2014

Software AG

A Growing Financial Services Company Gains Improved Security Visibility and Compliance
sponsored by LogRhythm, Inc.
CASE STUDY: Access this case study to get an insight into a financial security environment and finding a solution to detect potentially malicious activity.
Posted: 06 Nov 2014 | Published: 30 Sep 2014

LogRhythm, Inc.

Delivering Compliance, Security and Operations Intelligence
sponsored by LogRhythm, Inc.
CASE STUDY: This exclusive case study explores the security solution a theater went with to protect the information of its customers and employees.
Posted: 06 Nov 2014 | Published: 14 Sep 2014

LogRhythm, Inc.

Strong Authentication: Best Practices and Use Cases
sponsored by Gemalto
WHITE PAPER: This helpful white paper explains how an identity-centric approach to IT security can lock down critical processes and systems and ensure that you have complete control over who has access.
Posted: 06 Nov 2014 | Published: 06 Nov 2014

Gemalto

The Importance of Senior Executive Involvement in Breach Response
sponsored by Hewlett-Packard Company
WHITE PAPER: This exclusive whitepaper reveals the results of a study on why senior executives must get involved in breach management.
Posted: 06 Nov 2014 | Published: 15 Oct 2014

Hewlett-Packard Company

Incident Response: The New Paradigm
sponsored by TaaSera
WHITE PAPER: This exclusive whitepaper explores the new requirements your incident response system must be able to meet in order to keep your organization safe.
Posted: 05 Nov 2014 | Published: 15 Oct 2014

TaaSera

Proactive Responses to Today's Advanced Persistent Threats
sponsored by IBM
WHITE PAPER: This exclusive whitepaper explores and endpoint management solution that can mitigate your risk of an attack and limit the damage when one happens.
Posted: 05 Nov 2014 | Published: 15 Oct 2014

IBM

Security Intelligence - Solving the Puzzle for Actionable Insight
sponsored by LogRhythm, Inc.
WHITE PAPER: Download this exclusive whitepaper now to learn how to move beyond prevention alone with detection, security analytics and intelligence, and much more.
Posted: 05 Nov 2014 | Published: 05 Nov 2014

LogRhythm, Inc.

Cutting the Cost of Application Security
sponsored by Imperva
WHITE PAPER: This white paper describes the financial implications of web attacks, DDoS attacks, and other web-based threats, and also introduces one company's web application firewall as a potential solution.
Posted: 30 Oct 2014 | Published: 30 Oct 2014

Imperva

Web Applications Under Attack: How Network Security Solutions Leave You Exposed
sponsored by Imperva
RESOURCE: This infographic depicts how two types of firewalls—web application firewalls and next generation firewalls—measure up against the threats considered to be the "top 10" by the Open Web Application Security Project (OWASP).
Posted: 30 Oct 2014 | Published: 31 Dec 2013

Imperva

DDoS Mitigation Best Practices for a Rapidly Changing Threat Landscape
sponsored by Verisign, Inc.
WHITE PAPER: This exclusive whitepaper explores five best practices for distributed denial of service attack mitigation.
Posted: 29 Oct 2014 | Published: 17 Oct 2012

Verisign, Inc.

Demo: RSA Security Analytics: SIEM Use Case
sponsored by RSA
VIDEO: Watch this demo to discover RSA Security Analytics 10.4 in action as it solves a complex security information and event management (SIEM) use case.
Posted: 29 Oct 2014 | Premiered: 29 Oct 2014

RSA

Finding an Evil in the Haystack
sponsored by EMC Corporation
WHITE PAPER: Learn about the tools, technologies and techniques required for comprehensive detection and remediation of advanced malware threats and why traditional signature-based approaches fall short of protecting your organization.
Posted: 29 Oct 2014 | Published: 18 Oct 2012

EMC Corporation

Demo: RSA ECAT
sponsored by RSA
VIDEO: Watch this demo to see what real-time malware analysis on the endpoint looks like with RSA ECAT.
Posted: 28 Oct 2014 | Premiered: 28 Oct 2014

RSA

Protect Your Organization from DDoS Malware
sponsored by Verisign, Inc.
WHITE PAPER: Check out this valuable whitepaper now to learn about five specific types of DDoS attacks, how they work, what you can do to prevent them, and much more.
Posted: 28 Oct 2014 | Published: 09 Oct 2013

Verisign, Inc.

How ObserveIT Helped AIG to Pioneer a User-Centric Security Strategy
sponsored by ObserveIT
WEBCAST: This webcast describes how global insurance company AIG benefited from a user activity monitoring solution from Observe IT.
Posted: 28 Oct 2014 | Premiered: Oct 28, 2014

ObserveIT

DLP That Works for You
sponsored by Clearswift
VIDEO: This video examines a flexible DLP system that uses automation to detect sensitive information travelling across your network while allowing valid business traffic to move securely and unhindered.
Posted: 27 Oct 2014 | Premiered: 27 Oct 2014

Clearswift

DDoS and Downtime Considerations for Risk Management
sponsored by Verisign, Inc.
WHITE PAPER: This exclusive whitepaper explores your risk management options when it comes to distributed denial of service attacks.
Posted: 27 Oct 2014 | Published: 11 Oct 2012

Verisign, Inc.

Improve Security Visibility with Advanced Analytics
sponsored by RSA
VIDEO: See key features of RSA Security Analytics 10.4 and RSA ECAT 4.0 in action including log collection, packet analysis, the addition of Netflow, and real-time malware analysis on the endpoint.
Posted: 27 Oct 2014 | Premiered: 27 Oct 2014

RSA
76 - 100 of 930 Matches Previous Page    2 3 4 5 6 7    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement