IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Threat Management

RSS Feed    Add to Google    Add to My Yahoo!
Threat Management Reports
 
E-Guide: How to Combat the Latest Cybersecurity Threats
sponsored by SearchSecurity.com
EGUIDE: It takes a great deal of time and money to fine-tune IT security in response to evolving IT security threats and attack tactics. This expert e-guide provides an in-depth overview of modern computer security threats and offers technical advice on how to deal with them.
Posted: 26 Aug 2011 | Published: 11 Aug 2011

SearchSecurity.com

Hybrid Clouds
sponsored by Trend Micro, Inc.
WHITE PAPER: Hybrid clouds offers the best of both worlds, but it also has the largest attack surface, requiring organizations to deploy security across both private and public cloud elements. This white paper explores the business benefits of hybrid clouds, security considerations, and how to mitigate risks.
Posted: 07 Oct 2011 | Published: 07 Oct 2011

Trend Micro, Inc.

Web Filtering: An Essential Part of a Consolidated Security System
sponsored by Fortinet, Inc.
WHITE PAPER: In spite of the billions of dollars invested in security, web-borne threats are still on the rise. Enterprises need a security system that can enforce granular web access policies on all devices used to access the web from inside and outside the network perimeter.
Posted: 01 Aug 2011 | Published: 29 Jul 2011

Fortinet, Inc.

Antispyware Buyers Checklist -- Meeting Your Organization's Needs for Enterprise Antispyware Protection
sponsored by Sunbelt Software
WHITE PAPER: Learn about all the necessary requirements to best protect your network from spyware and other malware and what to look for in an antispyware solution.
Posted: 31 Oct 2007 | Published: 31 Oct 2007

Sunbelt Software

E Is for Endpoint: Six Security Strategies for Highly Effective IT Professionals
sponsored by Lumension
WHITE PAPER: Security professionals know that effective endpoint protection calls for a layered, defense-in-depth approach. But endpoint security now requires a new way of thinking that goes beyond just battling threats to actually enable operational improvement. Read this whitepaper to learn the six steps you need to think different about endpoint security.
Posted: 23 Jan 2012 | Published: 23 Jan 2012

Lumension

Radware Security Incidents Report, 1H2011 Special Focus: Multi-Layer Attack Threats
sponsored by Radware
WHITE PAPER: This Security Incidents Report explores select cases of recent multi-layered attack threats. Read now to explore these “war stories” and gain key recommendations on how to address them.
Posted: 10 Oct 2011 | Published: 10 Oct 2011

Radware

Anti-X and the Mob: Addressing Content-Borne Threats with Unified Threat Management
sponsored by Juniper Networks, Inc.
WEBCAST: Register for this webcast to learn more about the anatomy of a modern blended attack and how Unified Threat Management from Juniper Networks can help stop these threats at various points of their progression.
Posted: 30 Sep 2008 | Premiered: Sep 30, 2008

Juniper Networks, Inc.

Risk Management: Protect and Maximize Stakeholder Value
sponsored by Oracle Corporation UK Ltd
WHITE PAPER: This white paper explains how a risk management program can help identify opportunities for value creation while also protecting against potential threats.
Posted: 07 Oct 2010 | Published: 02 Feb 2009

Oracle Corporation UK Ltd

Essential Guide to Threat Management
sponsored by Information Security Magazine
EBOOK: Check out this expert eBook and get expert advice that can help your company successfully improve its threat management posture.
Posted: 19 Mar 2009 | Published: 19 Mar 2009

Information Security Magazine

Information Security Magazine, July 09: Controlling Privileged Accounts
sponsored by Information Security Magazine
EZINE: This month's cover story is about reigning in privileged accounts such as the UNIX root and Windows Administrator accounts. Regulatory requirements and economic realities are pressuring enterprises to secure their privileged accounts, but how? Also in this issue: Keeping UTM Unified instead of Unnecessary, and more. Read on to learn more.
Posted: 13 Jul 2009 | Published: 13 Jul 2009

Information Security Magazine
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement