IT Management  >   Systems Operations  >   Security  >  

Spyware Threats

RSS Feed    Add to Google    Add to My Yahoo!
Spyware ThreatsReports
 
Seizing Opportunities and Eliminating Risks with BYOD and Mobile Security
sponsored by Gemalto
WHITE PAPER: This white paper distills the complexities of BYOD scenarios into three common use cases. Read on to find actionable mobile security ideas that fit your own organization's specific requirements in order to reduce threats in this dynamic landscape.
Posted: 11 Nov 2014 | Published: 10 Nov 2014

Gemalto

How Often Should IT Security and Firewalls be Upgraded?
sponsored by Icomm Technologies
VIDEO: Download this exclusive video now to learn about important lifecycle consideration factors, like cost and firmware upgrades, and much more.
Posted: 30 Oct 2014 | Premiered: 30 Oct 2014

Icomm Technologies

Modernize your Active Directory
sponsored by Dell Software
WHITE PAPER: This exclusive white paper takes an in-depth look at Active Directory, which can be used to mitigate risk and reduce costs with security software. Read on to learn more.
Posted: 30 Oct 2014 | Published: 30 Oct 2014

Dell Software

Your Number One IT Security Tip is...
sponsored by Icomm Technologies
VIDEO: Tune in to this exclusive video now to learn the top tip for IT managers whose businesses are still likely vulnerable to attack.
Posted: 31 Oct 2014 | Premiered: 31 Oct 2014

Icomm Technologies

Enhance Network Security: A Survey by Ipsos Observer for HP
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper explores the challenges faced by 205 network security professionals in the United States, including their major concerns, their experience with cyber threats, and their current and planned use of network security technologies.
Posted: 19 Nov 2014 | Published: 19 Nov 2014

Hewlett-Packard Company

RSA Security Analytics and RSA ECAT Customer Case Study: LA World Airports
sponsored by RSA
VIDEO: Bob Cheong, CISO of LA World Airports, discusses why RSA Security Analytics and RSA ECAT are key components of his state-of-the-art security operations center (SOC).
Posted: 27 Oct 2014 | Premiered: 27 Oct 2014

RSA

C&J Energy: Going Public and Outgrowing Its Infrastructure
sponsored by Alert Logic
WHITE PAPER: This white paper describes how C&J Energy, an oilfield services firm, collaborated with Alert Logic in order to meet user needs and achieve SOX compliance quickly without compromising protected information or spending unnecessary time on installation and implementation.
Posted: 22 Oct 2014 | Published: 22 Oct 2014

Alert Logic

Next Generation Firewall Comparative Analysis
sponsored by Fortinet, Inc.
WHITE PAPER: Check out this important whitepaper now to find out as it examines the security effectiveness and value of 12 different next-generation firewall solutions from Cisco, Dell, Fortinet, and more.
Posted: 14 Nov 2014 | Published: 14 Nov 2014

Fortinet, Inc.

Keep Cyber Threats From Destroying Your Organization
sponsored by LabTech Software
EBOOK: This exclusive white paper examines future security risks to the network and provides and in-depth look at how to combat them.  Read on to learn how you can ease that burden for your IT department.
Posted: 10 Nov 2014 | Published: 10 Nov 2014

LabTech Software

Security Intelligence - Solving the Puzzle for Actionable Insight
sponsored by LogRhythm, Inc.
WHITE PAPER: Download this exclusive whitepaper now to learn how to move beyond prevention alone with detection, security analytics and intelligence, and much more.
Posted: 05 Nov 2014 | Published: 05 Nov 2014

LogRhythm, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement