IT Management  >   Systems Operations  >  

System Security

RSS Feed    Add to Google    Add to My Yahoo!
System Security Reports
 
The Top Five Security Threats to Your Business
sponsored by Level 3 Communications, Inc.
WHITE PAPER: Cyber security breaches are more common now than they have ever been. And the risks they present are all serious. This infographic details the top five security threats to your business and highlights a network-based security solution that protects against them.
Posted: 08 Jul 2016 | Published: 30 Jun 2016

Level 3 Communications, Inc.

Securing Agile IT: Common Pitfalls, Best Practices and Surprises
sponsored by CloudPassage
WEBCAST: Discover not only what you need to know about the various incarnations of the cloud as it relates to security, but also how you should be looking at modern security in general. Learn about security as a "secondary layer," removing layers from the bottom up, reducing attack surface, and more.
Posted: 18 Jul 2016 | Premiered: Jun 23, 2016

CloudPassage

Cybersecurity truth: Protection isn't enough
sponsored by Verizon
VIDEO: Access this short video to learn about improving your incident response time, and to gain access to the 2016 Data Breach Investigation Report.
Posted: 05 Jul 2016 | Premiered: 02 May 2016

Verizon

How Industry Collaboration Mitigates Cybersecurity Risks
sponsored by LogRhythm, Inc.
WHITE PAPER: Discover in this white paper how APAC business leaders can actively share cybersecurity resources, expertise, and best practices to collectively build defenses. Read on to learn how to integrate cybersecurity into HR policies, expansion strategies, staff training processes, and more.
Posted: 22 Jul 2016 | Published: 22 Jul 2016

LogRhythm, Inc.

Computer Weekly – 5 July 2016: How will UK IT adapt after Brexit?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, as the aftershocks continue from the UK's decision to leave the European Union, we look at the implications and challenges for the UK technology community. Our latest buyer's guide examines expense management software. And IT leaders discuss the question – can you trust your technology? Read the issue now.
Posted: 05 Jul 2016 | Published: 05 Jul 2016

ComputerWeekly.com

Tips for Streamlining Financial Processes and Providing Real Time Reporting
sponsored by Infor
WHITE PAPER: Discover how to address the growing gap between what a modern financial department should be able to and what they are actually able to accomplish with their current toolset. See detailed breakdowns of time spent, how to set a strategy, how to banish silos, and how to maximize ROI.
Posted: 25 Jul 2016 | Published: 25 Jul 2016

Infor

The Cloud: Securing Your Enterprise both Before and After Migration
sponsored by Armor
EGUIDE: In this e-guide, get an in-depth look at the kinds of attacks threatening the cloud. You'll learn about advanced persistent threat (APT) groups targeting the public cloud, how not all cloud services are the same and some harbor unique risks, and how to set up your cloud migration correctly from the get-go.
Posted: 26 Jul 2016 | Published: 25 Jul 2016

Armor

Network Based Security Infographic
sponsored by Level 3 Communications, Inc.
RESOURCE: To stop network threats, you first have to see them coming. Access this infographic that explains how implementing a network-based security platform, that provides full protection by wrapping your data, applications and infrastructure in a continuous cycle of protection, stops even the most sophisticated attacks.
Posted: 08 Jul 2016 | Published: 01 Jun 2016

Level 3 Communications, Inc.

A Technology Brief on SSL/TLS Traffic
sponsored by Blue Coat Systems
RESOURCE: In this resource get a detailed breakdown of SSL/TSL traffic and not only its importance to enterprises but also the grave threat it can pose if malware hides in it. Read on to discover the skills necessary to effectively utilize encrypted traffic and combat the malware threat.
Posted: 27 Jul 2016 | Published: 27 Jul 2016

Blue Coat Systems

Is UTM Ready for the Big Leagues?
sponsored by SearchSecurity.com
EBOOK: This Technical Guide reviews advanced UTM and what elements make for a truly enterprise-class UTM device.
Posted: 11 Jul 2016 | Published: 10 Jul 2014

SearchSecurity.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement