IT Management  >   Systems Operations  >   Security  >  

Spyware Threats

RSS Feed    Add to Google    Add to My Yahoo!
Spyware Threats Reports
 
Cloud Security: Advanced, Efficient, and Trusted
sponsored by Unisys
WHITE PAPER: Yesterday's security has fallen behind the needs of today. Here are better ways to address threats by keeping security up to speed with the cloud.
Posted: 17 May 2016 | Published: 17 May 2016

Unisys

Healthcare CIOs Share Cybersecurity Best Practices
sponsored by Symantec Corporation
EGUIDE: Cybersecurity is on everyone's mind in health IT. At HIMSS 2016, we spoke with 4 CIOs who provided advice on best practices and technologies you can (and should) implement to protect your organization from healthcare cybersecurity vulnerabilities.
Posted: 13 Jun 2016 | Published: 07 Jun 2016

Symantec Corporation

Facing Network Breach Threats, Visibility Is Key
sponsored by Intel
EGUIDE: If the past three years have taught network managers anything, it's that everyone is vulnerable to a network breach by cybercriminals. Andy McInerney, data network and voice manager at Penn Mutual, one of the oldest mutual life insurance companies in the US, reveals what his business is doing to stop it.
Posted: 26 May 2016 | Published: 17 May 2016

Intel

How to Prevent Security Breaches in Your Retail Network
sponsored by Dell Software
WHITE PAPER: This paper discusses the multi-vendor nature common to most high-profile security breaches in retail enterprises. Learn about several of the characteristics common to recent breaches, and uncover a blueprint for a viable security model to prevent breaches in retail networks.
Posted: 03 Jun 2016 | Published: 03 Jun 2016

Dell Software

BYOD Mobile Device Management
sponsored by IBM
WHITE PAPER: Discover a management solution that can streamline access, compliance, and protection for BYOD from a single screen. Learn how to provision, protect and manage your devices easily; configure email, calendar, contacts, Wi-Fi and VPN profiles to quickly onboard users; set security policies and enforce them with automated compliance actions; and more.
Posted: 16 Jun 2016 | Published: 31 Dec 2015

IBM

Help Your Security Team Sleep at Night
sponsored by Riverbed Technology, Inc.
WHITE PAPER: This resource explores a platform that combines the packet, flow, application, infrastructure, and transaction data required to understand past security events. Uncover ways to make the right choices to strengthen and monitor cyber defenses.
Posted: 23 May 2016 | Published: 23 May 2016

Riverbed Technology, Inc.

Data Privacy and Protection: 5 Insights from the Experts
sponsored by Iron Mountain
EBOOK: With major data breaches in the news nearly every day, the privacy of business information is on the minds of companies across the globe. Discover exclusive insight from experts on data privacy and protection—and learn how new data privacy laws affect records management, 5 steps to redefining your retention policies, and more.
Posted: 17 May 2016 | Published: 17 May 2016

Iron Mountain

Threat Defense Isn't Just About Detection: It's How Your Respond
sponsored by Intel Security
WHITE PAPER: EDR can mitigate threats before they impact your organization. Discover 5 key factors to look for when researching EDR to best determine which solutions are most proactive in helping to prevent attacks.
Posted: 10 May 2016 | Published: 31 Dec 2015

Intel Security

Emergency Incident Response: 10 Common Mistakes of Incident Responders
sponsored by Intel Security
WHITE PAPER: Understand the top 10 common emergency incident response mistakes that organizations commonly make and how you can avoid making the same ones. Access now to prevent your enterprise from suffering from these shortcomings and ensure your current incident response practices are tested, effective and secure.
Posted: 06 May 2016 | Published: 31 Dec 2012

Intel Security

Six Steps to Buying Data Loss Prevention Products
sponsored by Intel Security
EGUIDE: Data loss prevention (DLP) products allow organizations to protect sensitive data that could cause grave harm if stolen or exposed. There are six important steps an organization should follow when looking to procure the right DLP products and tools for your enterprise.
Posted: 14 Jun 2016 | Published: 07 Jun 2016

Intel Security
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement