IT Systems  >   Business Systems  >  

Security Systems

RSS Feed    Add to Google    Add to My Yahoo!
Security SystemsReports
76 - 100 of 757 Matches Previous Page  | Next Page
No Silver Bullet: Eight Ways Malware Defeats Strong Security Controls
sponsored by IBM
WHITE PAPER: This whitepaper explores 8 ways malware can defeat your security strategy and outlines some key techniques for preventing these intrusions.
Posted: 08 Apr 2014 | Published: 31 Dec 2013

IBM

Advanced Persistent Threats: Detection, Protection and Prevention
sponsored by Sophos, Inc.
WHITE PAPER: Download this paper to get an overview of the common characteristics of APTs, how they typically work, and how Sophos complete security solution can protect your network, servers and end user clients.
Posted: 08 Apr 2014 | Published: 08 Apr 2014

Sophos, Inc.

SANS Report: Security Web Applications Made Simple and Scalable
sponsored by Hewlett-Packard Company
ANALYST REPORT: This SANS report features an automated application security testing solution that identifies known vulnerabilities across multiple sources to keep your networks fully protected.
Posted: 07 Apr 2014 | Published: 30 Sep 2013

Hewlett-Packard Company

Using Free Web Application Security Scanning Tools to Secure Web Apps
sponsored by Imperva
EGUIDE: Expert Michael Cobb sheds light on the true benefits of a zero-cost, open source Web application security scanning tool.
Posted: 07 Apr 2014 | Published: 07 Apr 2014

Imperva

8 Questions to Ask Your Intrusion Security System Vendor
sponsored by Hewlett-Packard Limited
WHITE PAPER: This resource outlines 8 questions to ask your intrusion security provider – to ensure your network stays protected.
Posted: 07 Apr 2014 | Published: 30 Sep 2012

Hewlett-Packard Limited

Protecting Your Critical Data with Integrated Security Intelligence
sponsored by IBM
WHITE PAPER: This white paper features a security intelligence platform that integrates with data monitoring and vulnerability assessment for improved threat detection.
Posted: 07 Apr 2014 | Published: 30 Apr 2013

IBM

Buyer's Criteria for Advanced Malware Protection
sponsored by Sourcefire
WHITE PAPER: This guide explores the current state of malware in today's threat landscape and discusses some of the top strategies for stopping sophisticated malware.
Posted: 07 Apr 2014 | Published: 07 Apr 2014

Sourcefire

Addressing the Malware Challenge: Strategies At Work
sponsored by Sourcefire
WHITE PAPER: This guide explores the current threat landscape, and what businesses are doing to prevent advanced malware from breaching their system.
Posted: 07 Apr 2014 | Published: 31 Dec 2013

Sourcefire

A More Secure From Door: SSO and Strong Authentication
sponsored by Imprivata
WHITE PAPER: This white paper guides you through the advantages of strong authentication, and helps you decide which strategies and solutions best fit your business needs.
Posted: 07 Apr 2014 | Published: 28 Feb 2014

Imprivata

More Data Requires Scale-Out NAS for Video Surveillance Systems
sponsored by EMC & Arrow
WHITE PAPER: Access this in-depth white paper and uncover the ins-and-outs of a game-changing NAS system to support your video surveillance system.
Posted: 07 Apr 2014 | Published: 30 Nov 2013

EMC & Arrow

Orange Business Services
sponsored by IBM
CASE STUDY: This informative guide explores Orange Business Services, a leader in communications technology, and outlines how their Secure My Device solution can help manage and secure mobile endpoints.
Posted: 07 Apr 2014 | Published: 31 Dec 2012

IBM

Mobile Innovation: Transforming Customer Expectations
sponsored by Cisco Systems, Inc.
ASSESSMENT TOOL: This assessment tool provides you with 6 key factors for your mobile strategy that will increase savings and productivity.
Posted: 07 Apr 2014 | Published: 07 Apr 2014

Cisco Systems, Inc.

Mobilize Magazine - Online
sponsored by Cisco Systems, Inc.
EZINE: This informative webpage provides access to Mobilize, an e-zine by Cisco, which provides valuable insight to all the current trends in the mobile marketplace.
Posted: 07 Apr 2014 | Published: 07 Apr 2014

Cisco Systems, Inc.

How to be Ahead of Windows Security Threats
sponsored by Secunia
EGUIDE: In this e-guide, experts Paul Korzeniowski and Michael Cobb discuss how to position yourself ahead of the Windows security game. Read on to gain awareness of the risks that Web browser extensions can cause and what you can do to counter browser plug-in threats.
Posted: 04 Apr 2014 | Published: 04 Apr 2014

Secunia

Consumer Web Portals: Platforms At Significant Security Risk
sponsored by RSA, The Security Division of EMC
WHITE PAPER: These survey results show just how badly affected some organizations were due to weak authentication, authorization, and fraud detection strategies. Click through to learn why a strong security posture is a must.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

RSA, The Security Division of EMC

Proper Cloud Fraud Detection and Prevention Practices for Cloud Providers
sponsored by ThreatMetrix
EGUIDE: This expert E-Guide discusses how cloud-based fraud occurs and consequences of failure to detect fraud.
Posted: 04 Apr 2014 | Published: 04 Apr 2014

ThreatMetrix

Strength Through Integration: Securing the Mobile Enterprise
sponsored by Cisco Systems, Inc.
VIRTUAL ENVIRONMENT: This interactive webpage outlines some top security concerns for the growing mobile landscape and what you can do to best prevent cyber-attacks on your mobile devices.
Posted: 04 Apr 2014 | Premiered: 22 Jan 2014

Cisco Systems, Inc.

Magic Quadrant for Intrusion Prevention Systems
sponsored by Sourcefire
WHITE PAPER: This guide explores one company's intrusion prevention system and how it can integrate smoothly with your next-generation firewalls to ensure top-notch security.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

Sourcefire

Top 5 Reasons to Choose EMC Isilon for Video Surveillance
sponsored by EMC & Arrow
DATA SHEET: Access this concise resource to uncover five top reasons why you should adopt an impressive video surveillance system, so you can gain peace of mind knowing your business is safe and secure.
Posted: 04 Apr 2014 | Published: 31 Dec 2012

EMC & Arrow

20 Practical Tips on Single Sign-On and Strong Authentication from Healthcare IT Professionals
sponsored by Imprivata
WHITE PAPER: This resource features a collection of 20 tips from your healthcare peers on how to successfully implement single sign-on (SSO) and strong authentication solutions.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

Imprivata

Protecting Control Networks: Key Considerations For Protection
sponsored by Sourcefire
WHITE PAPER: This whitepaper takes a look at how to secure control networks, with strategies before, during and after an attack.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

Sourcefire

Buyer's Criteria for Next-Generation Network Security
sponsored by Sourcefire
WHITE PAPER: This whitepaper outlines current factors driving organizations to look at next-generation networking solutions and offers analysis on the capabilities of these new technologies.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

Sourcefire

Handling Security in the Cloud
sponsored by CloudPassage
EGUIDE: This expert e-guide from SearchSecurity.com offers advice on maintaining compliance and controlling issues with shadow IT when you move your critical business applications to the cloud.
Posted: 03 Apr 2014 | Published: 03 Apr 2014

CloudPassage

How to Extend your Identity Management Systems to use OAuth
sponsored by Forum Systems
WHITE PAPER: Read this resource to learn how to extend your authentication and authorization model to outsourced services. Click through for details on the deployment process, including the benefits of using an API gateway to help with integration.
Posted: 03 Apr 2014 | Published: 03 Apr 2014

Forum Systems

Navigating Security in a Mobile World
sponsored by Cisco Systems, Inc.
VIRTUAL ENVIRONMENT: This interactive webpage will help you navigate security threats in a mobile world, as well as outlines potential security breaches and what you can do to stop them.
Posted: 03 Apr 2014 | Premiered: 03 Apr 2014

Cisco Systems, Inc.
76 - 100 of 757 Matches Previous Page    2 3 4 5 6 7    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement