IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Threat Management

RSS Feed    Add to Google    Add to My Yahoo!
Threat ManagementReports
 
Thwarting Sophisticated Attacks with Today’s Firewalls
sponsored by SearchSecurity.com
EGUIDE: This expert resource explores modern network security, offering key insight into fighting today’s sophisticated threats as well as the differences between next-generation firewall (NGFW) and unified threat management (UTM).
Posted: 17 Feb 2012 | Published: 17 Feb 2012

SearchSecurity.com

Unified Threat Management Guide for Managers
sponsored by Information Security magazine, sponsored by Secure Computing
BOOK: This Ebook dissects five arguments in favor of unified threat management (UTM) and gives you a better idea of whether UTM is the best choice for your network. Discover how to implement the most effective UTM solution for your company.
Posted: 01 Nov 2006 | Published: 01 Nov 2006

Information Security magazine, sponsored by Secure Computing

Multi-Layer Security Platforms: The New Definition of Best of Breed
sponsored by Fortinet, Inc.
WHITE PAPER: Significant changes in the threat, technology, and regulatory landscapes are forcing organizations to implement an array of security controls. This white paper explores the benefits of integrating multiple security layers into a single solution.
Posted: 01 Feb 2007 | Published: 01 Jun 2006

Fortinet, Inc.

Information Security Magazine, July 09: Controlling Privileged Accounts
sponsored by Information Security Magazine
EZINE: This month's cover story is about reigning in privileged accounts such as the UNIX root and Windows Administrator accounts. Regulatory requirements and economic realities are pressuring enterprises to secure their privileged accounts, but how? Also in this issue: Keeping UTM Unified instead of Unnecessary, and more. Read on to learn more.
Posted: 13 Jul 2009 | Published: 13 Jul 2009

Information Security Magazine

Attack Mitigation System
sponsored by Radware
WHITE PAPER: Radware’s Attack Mitigation System (AMS) is a real-time network and application attack mitigation solution that protects the application infrastructure against network and application downtime, application vulnerability exploitation, malware spread, information theft, web service attacks and web defacement. View now to learn more.
Posted: 10 Oct 2011 | Published: 10 Oct 2011

Radware

Examining SSL-encrypted Communications
sponsored by Netronome Systems
WHITE PAPER: SSL-encrypted communications have enabled a variety of secure, web-based communications and online transactions. This paper explores the drivers behind the increase in SSL usage and the methods used to confront the security challenges that SSL creates.
Posted: 26 Oct 2007 | Published: 16 Oct 2007

Netronome Systems

Risk Management: Protect and Maximize Stakeholder Value
sponsored by Oracle Corporation UK Ltd
WHITE PAPER: This white paper explains how a risk management program can help identify opportunities for value creation while also protecting against potential threats.
Posted: 07 Oct 2010 | Published: 02 Feb 2009

Oracle Corporation UK Ltd

E-Guide: IT Security and Defence Strategies
sponsored by Kaseya International Limited
EGUIDE: With so many security options and technologies available, how can you know which solution is best for your business needs? This e-guide provides a back to basics lesson on regular defense strategies and offers insight on buying considerations for an effective and reliable IT strategy.
Posted: 30 Aug 2011 | Published: 30 Aug 2011

Kaseya International Limited

Risk Management: Protect and Maximize Stakeholder Value
sponsored by Oracle Corporation
WHITE PAPER: This white paper explains how a risk management program can help identify opportunities for value creation while also protecting against potential threats.
Posted: 01 Oct 2010 | Published: 02 Feb 2009

Oracle Corporation

Botnets: The dark side of cloud computing
sponsored by Astaro
WHITE PAPER: Botnets pose a serious threat to your network and business, rivaling the power today’s most powerful cloud computing platforms. These “dark” clouds, controlled by cybercriminals, are designed to silently infect your network. View this paper to explore how to protrect against the risk of botnets with security gateways that offer comprehensive UTM.
Posted: 06 Apr 2012 | Published: 06 Apr 2012

Astaro
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement