IT Management  >   Systems Operations  >   Security  >  

Software Security Threats

RSS Feed    Add to Google    Add to My Yahoo!
Software Security Threats Reports
 
Microsoft Windows Defender Advanced Threat Protection Examined
sponsored by Microsoft
RESEARCH CONTENT: In this Forrester Research Report, learn how, by switching to the Windows Defender Advanced Threat Protection software, 4 businesses in the energy, automotive, food and beverage, and IT industries were able to improve productivity, reduce risk, and more.
Posted: 15 Sep 2017 | Published: 31 Jul 2017

Microsoft

The "Patient Zero" Problem and the Need for Modern Endpoint Protection
sponsored by Palo Alto Networks
RESEARCH CONTENT: The digital era requires the need for a modernized approach to endpoint protection. In this IDC research paper, learn how to address and overcome the latest network security challenges. Then, discover IDC's 5 fundamental rules for modern endpoint security.
Posted: 30 Nov 2017 | Published: 30 Jun 2017

Palo Alto Networks

Protecting Data After the Digital Disruption
sponsored by Proofpoint, Inc.
WEBCAST: Data is no longer stored in one location and companies are running into challenges related to securing sensitive data. Watch this webcast to uncover key challenges driving DLP as well as stages of DLP maturity, considerations for your DLP strategy, and more.
Posted: 04 Oct 2017 | Premiered: Oct 4, 2017

Proofpoint, Inc.

All Together Now: Securing the Internet of Things
sponsored by Juniper Networks, Inc.
WHITE PAPER: In this white paper, learn how deeper visibility into network utilization and behavior from IOT devices can help improve both network management and network security. Then, uncover the tools and techniques IT pros can implement for stronger IoT security.
Posted: 20 Nov 2017 | Published: 20 Nov 2017

Juniper Networks, Inc.

10 Reasons Smart Power-Over-Ethernet Switches are the Wise Choice for Upgrading IP Surveillance Networks
sponsored by D-Link
WHITE PAPER: In this white paper, uncover the top 10 reasons to upgrade to Smart (managed) PoE Switches for IP surveillance networks.
Posted: 30 Nov 2017 | Published: 20 Nov 2017

D-Link

How to Build a Rock-Solid Software Security Initiative in 5 Steps
sponsored by Synopsys
EBOOK: Find out how security pros and app development teams can work together better to ensure app security, and discover your roadmap to building a sound software security initiative.
Posted: 09 Nov 2017 | Published: 09 Nov 2017

Synopsys

A CISO's Guide to Mobile Threat Defense
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Security systems need an upgrade to be able to protect mobile devices and apps in the workplace. Read this white paper to learn the 5 major threats to mobile security, then find out what steps you can take to mitigate these vulnerabilities.
Posted: 12 Oct 2017 | Published: 12 Oct 2017

Check Point Software Technologies Ltd.

Most Wanted Malware: Banking Trojans and Ransomware That Want Your Money
sponsored by Check Point Software Technologies Ltd.
RESOURCE: Read this rundown of the top 10 malwares that tried to steal your money in the summer of 2017.
Posted: 12 Oct 2017 | Published: 19 Sep 2017

Check Point Software Technologies Ltd.

How to Build a High Performance Secure Network
sponsored by Aruba Networks
RESOURCE: Inside this resource learn how Aruba's UEBA tool, Introspect, helps detect attacks by spotting small changes in behavior that are often indicative of attacks that have evaded traditional security defenses.
Posted: 30 Nov 2017 | Published: 30 Nov 2017

Aruba Networks

Real-Time Threat Prevention Lets Managed IT Services Provider Vology Thrive
sponsored by Oracle Corporation
WHITE PAPER: In this case study, learn how deploying a cloud-based security system gave the IT consulting company Vology both the protection they need to fight against today's threats, and the ability to learn and grow from each attack that comes their way
Posted: 15 Sep 2017 | Published: 17 Nov 2017

Oracle Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement