IT Management  >   Systems Operations  >  

Systems Security

RSS Feed    Add to Google    Add to My Yahoo!
Systems Security Reports
Extending Global Load Balancing to the Cloud With Secondary DNS
sponsored by Dyn
WHITE PAPER: Discover how on premise global load balancing (GLB) can become part of your cloud deployment. With GLB enhancing your DNS networks, you can improve security and prevent DDoS attacks.
Posted: 10 Oct 2016 | Published: 13 Jul 2016


Stop Malware Attacks Before They Strike With This Network Threat Analytcs Module
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper explores how LogRhythm's Network Threat Analytics module can help you detect, prioritize, and neutralize cyber threats before they attack. Learn how you can immediately detect botnets and other malware, quickly identify disguised data transfers, and more.
Posted: 10 Oct 2016 | Published: 31 Aug 2015

LogRhythm, Inc.

Protecting and Empowering your Connected Organization
sponsored by Microsoft
WHITE PAPER: This white paper explores how Microsoft Enterprise Mobility + Security helps protect your data in a cloud-first world. Learn how EMS can help you restrict and monitor user identities, receive security updates with an easy-to-read attack timeline, enable users to update passwords via a single portal, and more.
Posted: 18 Oct 2016 | Published: 18 Oct 2016


Securely Extend Your Content Externally
sponsored by IntraLinks, Inc
WEBCAST: External content sharing requires you to strike a balance between security and productivity that is difficult to find. Access this webinar to explore the security and cost challenges of sharing beyond your firewall as well as keys to secure, timely collaboration practices.
Posted: 06 Oct 2016 | Premiered: Oct 5, 2016

IntraLinks, Inc

How Global Threat Intelligence Fits into a Security Strategy
sponsored by IBM
EGUIDE: Before considering global threat intelligence services, there are some critical dangers that you may need to address closer to home. In this e-guide, Rob Shapland shares his advice on how simple tools like staff training and awareness can help prevent breaches from phishing attacks and more.
Posted: 05 Oct 2016 | Published: 03 Oct 2016


2016 State of the Channel Ransomware Report
sponsored by Datto
RESOURCE: 93% of IT service providers reported that their clients were successfully attacked by ransomware despite having anti-virus/malware software in place. Access this report to learn about the state of ransomware in 2016 and how to stay ahead of these impending malware attacks.
Posted: 10 Oct 2016 | Published: 10 Oct 2016


From IoT to IDoT: Securing the Identity of Things
sponsored by
EZINE: With devices seeping into everyday work life, the danger to businesses has increased, and companies should worry about who is bringing what into the workplace and which corporate devices pose risks. In this issue of Information Security, we discuss the Identity of Things problem, and how you can solve it.
Posted: 03 Oct 2016 | Published: 03 Oct 2016

Preparing Your Business For Ransomware Attacks with a Backup and Recovery Strategy
sponsored by Barracuda Networks
WHITE PAPER: This white paper explores an often overlooked line of defense against the ransomware threat: having a sound backup and disaster recovery plan in place. Learn how you can prep your organization to recover from a ransomware attack with a data protection strategy that offers speed, offsite replication, enhanced recovery performance, and more.
Posted: 19 Oct 2016 | Published: 19 Oct 2016

Barracuda Networks

Managing Content Beyond the Corporate Walls: Working in the Cloud
sponsored by ASG
WHITE PAPER: If your organization doesn't provide employees with proper content management, they'll make up their own, putting security and compliance at risk. Access this white paper to learn how to manage your organization's content beyond your firewalls and corporate structure, and why the path to success is through the cloud.
Posted: 10 Oct 2016 | Published: 10 Oct 2016


Cybersecurity During a Merger: CrowdStrike on Key Risks and Due Diligence
sponsored by CrowdStrike
WHITE PAPER: In this interview with CrowdStrike's Steve Chabinsky, learn key risk factors such as cybersecurity that organizations encounter during the merger and acquisition due diligence process and how to avoid them.
Posted: 06 Oct 2016 | Published: 06 Oct 2016

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement