Software  >   Systems Software  >  

Security Tools

RSS Feed    Add to Google    Add to My Yahoo!
Security Tools Reports
 
Sandbox Technology: Building an Effective Breach Detection and Response Strategy
sponsored by Fortinet, Inc.
WHITE PAPER: Security professionals need to detect threats and manage risks to avoid data breaches. Discover why sandboxing is an essential component of a comprehensive prevention, detection, and response strategy to mitigate future attacks.
Posted: 23 Jun 2016 | Published: 30 Oct 2015

Fortinet, Inc.

How Security has Failed us, and what you Can Do
sponsored by Unisys
WHITE PAPER: Find out what Unisys Global Security Solutions GM, Tom Patterson, has to say about the state of security. Discover ways legacy systems have failed us, and what needs to be done to keep us safe.
Posted: 26 Aug 2016 | Published: 08 Jan 2016

Unisys

AWS Cautionary Tales and How to Avoid Becoming One
sponsored by Palerra Inc.
WHITE PAPER: AWS can provide a number of security concerns for enterprises, and knowing the pitfalls and possible solutions to them can prove to be invaluable knowledge. Explore real-life cautionary tales of the dangers that AWS can provide, and ways to mitigate these cloud threats.
Posted: 14 Jul 2016 | Published: 14 Jul 2016

Palerra Inc.

Unisys' Tom Patterson: 3 Key Steps in Securing Critical Infrastructure
sponsored by Unisys
WHITE PAPER: In this video, Tom Patterson, VP and GM of Unysis Global Security Solutions, discusses the need to protect critical infrastructure systems. Uncover three key tips to get started.
Posted: 26 Aug 2016 | Published: 08 Jan 2016

Unisys

Perspective: The art and science of value realization in the cloud
sponsored by Infor
WHITE PAPER: Discover how to optimize your enterprise's cloud expense and see just how much business value it creates. See such value added as physical records saving, workforce hours, and streamlined workloads.
Posted: 17 Aug 2016 | Published: 25 Jul 2016

Infor

DDoS Attack: Smoke Screen or Smoke Signal?
sponsored by Arbor Networks
WHITE PAPER: Learn how distributed denial-of-service (DDoS) attacks are used as not only a means of direct harassment of enterprise data, but also as a "smoke screen" in an attempt to conceal more surgical intrusion tactics. Discover why organizations must recognize DDoS attacks for the data security threats that they have become.
Posted: 17 Aug 2016 | Published: 08 Apr 2016

Arbor Networks

Real-Time Voice Authentication at the Call Center
sponsored by NICE Systems, Inc
WHITE PAPER: Biometrics offers one of the best opportunities to improve security and the customer experience. Discover the advantages of biometric authentication by reducing handle time by 25 to 45 seconds, save significantly in the call center, and more.
Posted: 23 Aug 2016 | Published: 31 May 2016

NICE Systems, Inc

How Banks Secure Conversations with their Most Valued Customers
sponsored by NICE Systems, Inc
WHITE PAPER: Voice biometrics technologies are proving to be the ideal candidate for intelligent authentication in the context of client-to-advisor conversations. Discover ways to leverage a person's voice as an accurate identifier without interrupting the natural flow of conversation.
Posted: 23 Aug 2016 | Published: 23 Aug 2016

NICE Systems, Inc

Managing Encrypted Traffic
sponsored by Blue Coat Systems
WHITE PAPER: Discover how you can utilize encrypted traffic management solutions while granting complete visibility and control of SSL communications and the potential threats therein without the need to re-architect your security infrastructure, nor impact network performance.
Posted: 25 Jul 2016 | Published: 31 Dec 2014

Blue Coat Systems

Understanding behavioural detection of antivirus
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series analyses the effectiveness and behavior of 32-bit and 64-bit antivirus software in Windows 7.
Posted: 12 Aug 2016 | Published: 12 Aug 2016

ComputerWeekly.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement