IT Management  >   Systems Operations  >  

System Security

RSS Feed    Add to Google    Add to My Yahoo!
System Security Reports
 
DDoS Attack Mitigation Technologies Demystified
sponsored by Fortinet, Inc.
WHITE PAPER: This exclusive whitepaper dives into the technologies used traditionally to detect and mitigate DDoS attacks, and how they evolved to the stands they're at today. Read on to learn more.
Posted: 28 Jan 2015 | Published: 28 Jan 2015

Fortinet, Inc.

The Big Shift to Cloud-Based Security for Small Businesses
sponsored by Qualys
WHITE PAPER: This white paper explains why SMBs are just as vulnerable to cyberattacks as larger corporations, and how cloud-based security can provide them with a stronger network security posture without breaking the bank.
Posted: 28 Jan 2015 | Published: 29 Aug 2014

Qualys

Web Application Security for Dummies
sponsored by Qualys
EBOOK: This e-book explains how to quickly locate and remediate vulnerabilities in order to prevent attackers from gaining control over the application and obtaining access to the server, database, and other back-end IT resources.
Posted: 26 Jan 2015 | Published: 30 Dec 2011

Qualys

IBM Endpoint Manager for Core Protection
sponsored by IBM
WHITE PAPER: Download this exclusive white paper now to learn about an endpoint manager with core protection that provides organizations with an automated, easy-to-use solution to ensure the protection of sensitive data and much more.
Posted: 28 Jan 2015 | Published: 14 Oct 2014

IBM

Security at the Speed of DevOps
sponsored by Risk IO
WEBCAST: This exclusive webcast explores the role DevOps can play in helping IT security make the most of their time.
Posted: 23 Jan 2015 | Premiered: Jan 13, 2015

Risk IO

Symantec Intelligence Report -November 2014
sponsored by Symantec Corporation
WHITE PAPER: This exclusive white paper provides in-depth analysis of the security landscape from November 2014.
Posted: 30 Jan 2015 | Published: 18 Nov 2014

Symantec Corporation

Allgress Insight Risk Management Suite
sponsored by Allgress
WHITE PAPER: This white paper introduces a risk management suite that enables security professionals to apply business context to security and compliance management. It also empowers business stakeholders to make informed investment decisions that align with top business priorities.
Posted: 26 Jan 2015 | Published: 26 Jan 2015

Allgress

Can You Securely & Affordably Scale Your Healthcare Applications?
sponsored by Array Networks
CASE STUDY: In this case study, learn how application delivery controllers can provide scalability, availability, performance, and security for patient data and medical records.
Posted: 20 Jan 2015 | Published: 20 Jan 2015

Array Networks

Protecting Your Organization from DNS Security Threats
sponsored by Cloudmark
WEBCAST: This webinar provides a detailed look at common threats to DNS infrastructure, and how your enterprise can mitigate these threats.
Posted: 26 Jan 2015 | Premiered: Nov 13, 2014

Cloudmark

Protecting Data, Enabling Mobility and Empowering Users: Unified Endpoint Management
sponsored by IBM
WHITE PAPER: Download this exclusive white paper now to learn about how much a breach really costs, how long breaches often go undetected, how to handle the always-connected user, and much more.
Posted: 23 Jan 2015 | Published: 15 Dec 2014

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement