IT Management  >   Systems Operations  >   Security  >  

Spyware Threats

RSS Feed    Add to Google    Add to My Yahoo!
Spyware Threats Reports
What's New in Unified Communications
sponsored by Dell Software
WHITE PAPER: Whether you're motivated by curiosity or talking points, this guide will help you find the information you need to stay up-to-date on important features and enhancements in the unified communications market.
Posted: 18 Nov 2015 | Published: 18 Nov 2015

Dell Software

How Partitioning Technology Delivers Consolidation Without Compromising Performance, Security, or Isolation
sponsored by Unisys
WHITE PAPER: In this white paper learn about a new partitioning technology that is architected, designed, and developed to deliver a predictable, secure, scalable, distributed environment. Read on to see a comparison of modern partitioning vs. virtualization options.
Posted: 04 Nov 2015 | Published: 31 Dec 2014


Combat the Rise of Malware
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This resource discusses the growing malware threat and gives suggestions for combatting zero-day attacks, non-executable attacks, and more.
Posted: 13 Nov 2015 | Published: 26 Oct 2015

Check Point Software Technologies Ltd.

Vendor Comparison: Choose the Right DDoS Service Provider
sponsored by Akamai
WHITE PAPER: This Forrester report examines nine of the most significant offerings in the DDoS protection market, giving you insight into the strengths and weaknesses of each one.
Posted: 05 Nov 2015 | Published: 05 Nov 2015


Staying One Step Ahead with Zero-Day Protection
sponsored by Check Point Software Technologies Ltd.
WEBCAST: This webcast examines how you can stop today's advanced hackers. Watch and learn how sandboxing, CPU-level detection and more can keep your organization secure from even the most sophisticated threats.
Posted: 16 Nov 2015 | Premiered: Sep 22, 2015

Check Point Software Technologies Ltd.

How to Extend Identity Security To Your APIs
sponsored by Ping Identity Corporation
WHITE PAPER: This white paper discusses the new authentication and authorization standards for REST APIs, how they can be composed with SAML, and details about how they work to provide IAM and API security. Continue reading to learn more.
Posted: 26 Oct 2015 | Published: 07 May 2014

Ping Identity Corporation

Protection from the Inside: Application Security Methodologies Compared
sponsored by Hewlett Packard Enterprise
WHITE PAPER: In this paper, the SANS Institute captures the relative capabilities and efficiencies of RASP and WAF technologies using a representative product in each category. Learn how your defense-in-depth strategy could benefit from the additional visibility of runtime protection.
Posted: 18 Nov 2015 | Published: 16 Apr 2015

Hewlett Packard Enterprise

Turning the Tables on Cyber Criminals - Kill Chain eBook
sponsored by Proofpoint, Inc.
WHITE PAPER: Delve into the minds of hackers and learn how they plan, launch, and monitor attacks against security systems. Learn the 7 steps of the kill chain and how to use each phase to take the advantage over cybercriminals and stop them in their steps.
Posted: 22 Oct 2015 | Published: 13 Jul 2015

Proofpoint, Inc.

Cyberthreat Defense in 2015
sponsored by Citrix
RESOURCE: This short infographic reveals survey results that all IT security professionals will be interested in reviewing.
Posted: 26 Oct 2015 | Published: 26 Oct 2015


Strategies for Advanced Threat Protection
sponsored by Symantec Corporation
WHITE PAPER: In this data sheet, you'll find a new strategy designed to uncover, prioritize, and remediate advanced attacks across all your endpoints. Access now and learn how to search for, discover, and remediate any attack artifacts across all of your endpoint systems.
Posted: 25 Nov 2015 | Published: 25 Nov 2015

Symantec Corporation
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement