IT Management  >   Systems Operations  >   Security  >  

Software Security Threats

RSS Feed    Add to Google    Add to My Yahoo!
Software Security ThreatsReports
 
Next Generation Firewall Solutions Aid Research-oriented Institutions
sponsored by McAfee, Inc.
CASE STUDY: Access this case study to learn about a university that used a next generation firewall solution for complete network security.
Posted: 01 Aug 2014 | Published: 01 Aug 2014

McAfee, Inc.

Get the Facts On APTs To Avoid Misguided Security Efforts
sponsored by IBM
WHITE PAPER: This expert E-Guide cuts through the confusion, explaining exactly what APT is, what they are capable of, and how you can best defend your organization from them.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

IBM

The New Breed of DDoS Attacks: An Executive Brief
sponsored by Juniper Networks, Inc.
WHITE PAPER: This informative resource breaks down the new breed of DDoS attacks, and provides strategies for keeping your organization protected.
Posted: 07 Aug 2014 | Published: 07 Aug 2014

Juniper Networks, Inc.

Fax Security: Minimizing Breaches and Compliance Risks
sponsored by OpenText
WHITE PAPER: In this in-depth resource, you'll gain critical insights into the best practices and strategies for maintaining process control, information integrity, privacy, and effective archiving for your fax communications.
Posted: 19 Aug 2014 | Published: 31 Dec 2013

OpenText

Use Case: Scaling a University's Intrusion Detection System to Support 30,000 Users
sponsored by Gigamon
WHITE PAPER: This white paper explores a use case in which a major research university needed to upgrade its intrusion detection system (IDS) to secure 30,000 users and monitor tens of gigabits of internet traffic each second.
Posted: 07 Aug 2014 | Published: 30 Jun 2014

Gigamon

The Secret Ingredient in Mobile ROI: Why Security is Paramount in Enterprise Mobility Management
sponsored by BlackBerry
WHITE PAPER: This white paper looks closely at what the right EMM security solution does for business leaders, users and operations.
Posted: 25 Jul 2014 | Published: 25 Jul 2014

BlackBerry

The Evolution of Application Vulnerabilities, Spam Threats, and Incident Response
sponsored by IBM
WHITE PAPER: This report details the many breaches and security incidents that have plagued organizations in recent years; threats from past years that are currently showing signs of resurgence; and issues to be aware of in today's security landscape.
Posted: 24 Jul 2014 | Published: 30 Jun 2014

IBM

Use Case: Secure Internet Access for 71,000 Australian Students
sponsored by Websense, Inc.
WHITE PAPER: This white paper describes a use case involving an Australian educational in need of a centralized, scalable solution in order to distribute materials to 45,000 users per day in safe, easily accessible manner.
Posted: 07 Aug 2014 | Published: 07 Aug 2014

Websense, Inc.

Protect Mobile Data without Restricting Users
sponsored by Bit9 + Carbon Black
WEBCAST: In this informative webcast, explore a new mobile security solution which provides mobile security and visibility without forcing users to stop using their preferred apps and devices.
Posted: 15 Aug 2014 | Premiered: Mar 5, 2014

Bit9 + Carbon Black

Buyer's Guide: SIEM Appliances for 2014-2015
sponsored by LogRhythm, Inc.
WHITE PAPER: Many smaller organizations still face an uphill battle in understanding and sorting through the SIEM vendor options available to them and then choosing the right product for them. This Buyer's Guide lets IT organizations immediately understand what features and functions are available so they can move more quickly to making a buying decision.
Posted: 29 Jul 2014 | Published: 29 Jul 2014

LogRhythm, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement