IT Management  >   Systems Operations  >  

Systems Security

RSS Feed    Add to Google    Add to My Yahoo!
Systems Security Reports
IAM: On-Premises vs. IDaaS Delivery
sponsored by OneLogin
WHITE PAPER: Which is better for your organization: on-premises IAM or IDaaS? This Gartner report can provide valuable insight into which one may be best for you.
Posted: 18 Jul 2017 | Published: 18 Jul 2016


Securing the Web: The Plight of the Modern Cybersecurity Team
sponsored by Comstor
WHITE PAPER: Whether they come from network, endpoint, or mobile devices, threats are getting more sophisticated and attack surfaces are getting larger. Discover how your security team can ensure that users get the same protection whether they are working on or off the corporate network using DNS security.
Posted: 30 Jun 2017 | Published: 30 Jun 2017


5 Post-Hot Patch App Ban Risks and the Value of Security Assessments
sponsored by Blue Cedar
EGUIDE: Discover the value of application assessments when determining security risk, and 5 areas that need to be considered for enterprise app security in the face of Apple's decision to ban hot patches.
Posted: 13 Jul 2017 | Published: 11 Jul 2017

Blue Cedar

Ransomware: 4 Ways to Protect Data Now
sponsored by Citrix
WHITE PAPER: Ransomware is a very real threat, seemingly in the news everyday with attacks like WannaCry. Learn how to deploy a multilayered approach designed to reduce exposure to ransomware attacks, as well as to recover encrypted data more quickly and effectively.
Posted: 21 Jul 2017 | Published: 21 Jul 2017


GDPR and Citrix ShareFile
sponsored by Citrix
WHITE PAPER: The General Data Protection Regulation (GDPR) was approved and adopted by the EU Parliament in April 2016 with the goal to protect all EU citizens from privacy and data breaches. What is the scope of the GDPR? How does it impact your organisation? This white paper guides you so your organization can meet the needs of GDPR.
Posted: 18 Jul 2017 | Published: 27 Dec 2016


European Perceptions, Preparedness and Strategies for IoT Security
sponsored by
ESSENTIAL GUIDE: Research from analyst group Quocirca conducted in the UK and German-speaking regions exposes the challenges organisations face in managing and securing internet of things devices.
Posted: 12 Jul 2017 | Published: 12 Jul 2017

Endpoint Security: Solving the Anti-virus Problem
sponsored by Sentinel Labs, Inc.
WHITE PAPER: With endpoints equating to a particularly juicy target for hackers, your organization must be prepared to counter the malicious attack techniques they utilize today, as well as into the future.
Posted: 06 Jul 2017 | Published: 06 Jul 2017

Sentinel Labs, Inc.

Your Checklist to Preventing and Fighting Ransomware
sponsored by Comstor
WHITE PAPER: With attacks like WannaCry and NotPetya in the news, the time to shore up your ransomware preparedness is now. Discover a 10 step checklist to improving your organization's ransomware defense.
Posted: 29 Jun 2017 | Published: 29 Jun 2017


4 Ways to Reduce the Risk of Ransomware
sponsored by Citrix
WHITE PAPER: In recent years, ransomware such as Locky and KeRanger have emerged as a top threat, not just to consumers, but to businesses with high-value data. Read this whitepaper for four best practices to protect yourself from this costly threat.
Posted: 18 Jul 2017 | Published: 18 Jul 2017


What Should Happen after an Employee Clicks on a Malicious Link?
sponsored by Vircom
EGUIDE: What do you do if an employee clicks on a malicious link? The clock is already ticking. Inside this e-guide, expert Matthew Pascucci discusses how to handle the aftermath of an attack.
Posted: 30 Jun 2017 | Published: 28 Jun 2017

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement