IT Management  >   Systems Operations  >   Security  >  

Spyware Threats

RSS Feed    Add to Google    Add to My Yahoo!
Spyware ThreatsReports
 
Strengthening Security, Compliance, and Control in Microsoft® Office 365®
sponsored by Actiance
WHITE PAPER: There are some missing features in Office 365 that will prompt some customers to consider the use of third-party, cloud-based or on-premises tools to enhance Office 365's native capabilities.
Posted: 22 Sep 2014 | Published: 22 Sep 2014

Actiance

How Midsize Businesses Can Defend Against Enterprise-Caliber Threats
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper examines the security posture of midsize companies and how effective they are, as well as the four most important industry insights into midsize company security.
Posted: 21 Aug 2014 | Published: 21 Aug 2014

Hewlett-Packard Company

Holistic Risk Management: Professional Perspectives
sponsored by IBM
WHITE PAPER: In this informative white paper, gain critical insights into the top strategies for strengthening enterprise-wide risk management and business resilience frameworks.
Posted: 27 Aug 2014 | Published: 31 Dec 2011

IBM

Endpoint Threat Detection, Response, and Prevention for Dummies
sponsored by Bit9 + Carbon Black
EBOOK: In this in-depth eBook, gain critical insights into how organizations are targeted by advanced threats, and how your endpoints, servers, and other devices can function as entrances into your network for cyber criminals.
Posted: 25 Aug 2014 | Published: 25 Aug 2014

Bit9 + Carbon Black

7 Essential Practices for Business Continuity Management
sponsored by IBM
WHITE PAPER: In this informative white paper, uncover a tested approach to expanding Business Continuity Management into an integrated, enterprise-wide program.
Posted: 22 Aug 2014 | Published: 30 Apr 2014

IBM

The Next Generation of Data-Driven Security
sponsored by MapR Technologies
WHITE PAPER: In this in-depth white paper, get the facts on how new adaptive algorithms like Machine Learning and Big Data can identify security risks that other outdated techniques simply couldn't.
Posted: 02 Sep 2014 | Published: 30 Jun 2014

MapR Technologies

Why and How You Should Use a VPN
sponsored by Global Knowledge
WHITE PAPER: This resource explains why VPNs are instrumental in eliminating the risk of public wired and wireless connections; how to use VPN at home and on the go; and how to choose a VPN provider.
Posted: 27 Aug 2014 | Published: 27 Aug 2014

Global Knowledge

Staying Secure and Compliant during Windows XP End-of-Life
sponsored by Bit9 + Carbon Black
WHITE PAPER: In this white paper, discover the a new security solution that can enable you to continue using Windows XP to the fullest while keeping your systems compliant and secure.
Posted: 27 Aug 2014 | Published: 31 Dec 2013

Bit9 + Carbon Black

Manage Security and Risk
sponsored by Intel Security
WHITE PAPER: Read how managing risk today means making sense of more data: vulnerability scans, application and database logs, flows, access and session records, alerts, and trending analysis.
Posted: 10 Sep 2014 | Published: 10 Sep 2014

Intel Security

Vendor Landscape: Intrusion Detection and Prevention Systems
sponsored by IBM
WHITE PAPER: This comprehensive resource compares 12 competitors in the Intrusion Detection and Prevention Systems (IDPS) market, providing a number of tools for comparing and evaluating each vendor's solution in order to determine the best fit for your enterprise's needs.
Posted: 28 Aug 2014 | Published: 31 Dec 2013

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement