IT Management  >   Systems Operations  >   Security  >  

Software Security Threats

RSS Feed    Add to Google    Add to My Yahoo!
Software Security Threats Reports
 
5 Reasons to Upgrade Your Endpoint Security
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Uncover 5 reasons to upgrade your endpoint security to ensure that your organization is prepared to handle today's threat landscape.
Posted: 12 Jun 2017 | Published: 31 May 2017

Symantec & Blue Coat Systems

Is Your Lack of Mobile Security Affecting Your Workforce Productivity?
sponsored by Dell India
WHITE PAPER: In this Forrester Research report, learn how to develop a mobile security strategy that not only delivers an improved risk profile but also makes your environment more user-friendly. Read on to implement an effective end user computing security strategy that improves workforce productivity and will enact advanced threat identification.
Posted: 19 Jun 2017 | Published: 31 Oct 2016

Dell India

Manage and Secure Your Supply Chain
sponsored by Unisys
WHITE PAPER: Discover how to secure your supply chain as well as gain insight and visibility into every step of the journey, helping to ensure compliance.
Posted: 08 Jun 2017 | Published: 08 Jun 2017

Unisys

Build or Buy? Security Operations Center Strategies for Midmarket Companies
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Discover insights into the challenges and opportunities of building your security internally and the advantages of a managed security operations center.
Posted: 02 Jun 2017 | Published: 28 Feb 2017

Arctic Wolf Networks, Inc.

Your IIoT Security Plan: Risks in Manufacturing
sponsored by Bayshore Networks
EGUIDE: In this e-guide learn how to get smart about industrial IoT security risks in manufacturing, as well as how to map out an industrial IoT plan to create a smooth-running, smart factory.
Posted: 02 Jun 2017 | Published: 26 May 2017

Bayshore Networks

The Rapid Growth of SSL Encryption
sponsored by Fortinet, Inc.
WHITE PAPER: Learn about the growth of encrypted secure socket layer (SSL) traffic, as well as how cybercriminals are beginning to hide malware inside applications embedded in this layer.
Posted: 08 Jun 2017 | Published: 03 Mar 2017

Fortinet, Inc.

What Makes a Cyber Resilient Organization?
sponsored by IBM Resilient
WHITE PAPER: With a surprising number of companies unsure of their ability to recover from cyberattacks, now is your time to ensure your organization can. Discover what it takes to be cyber resilient and prevent, detect, contain, and recover from a myriad of serious threats against data, applications, and IT infrastructure.
Posted: 19 Jun 2017 | Published: 28 Feb 2017

IBM Resilient

10 Benefits to Help Combat Ransomware
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Discover 10 ways an incident response service can help your organization right now if you are, or are ever, infected with ransomware.
Posted: 15 Jun 2017 | Published: 15 Jun 2017

Symantec & Blue Coat Systems

Security Ops: How Your Peers are Facing the Threat Landscape
sponsored by Splunk
WHITE PAPER: Discover the current state of security operations and how your peers around the globe are responding to security incidents of all sizes and types, and why it might seem like a losing battle.
Posted: 14 Jun 2017 | Published: 14 Jun 2017

Splunk

How Raque Food Systems Bolstered Their Anti-Spam Strategy
sponsored by GFI
CASE STUDY: This case study explores how Raque Food Systems, a food packaging machine manufacturer, used a multi-faceted messaging security tool. Find out how to confront the growing spam security threat, protect your servers from malicious malware attacks, and increase employee productivity.
Posted: 02 Jun 2017 | Published: 02 Jun 2017

GFI
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement