IT Management  >   Systems Operations  >   Security  >  

Threats

RSS Feed    Add to Google    Add to My Yahoo!
ThreatsReports
 
Stopping Malicious Botnets
sponsored by Hewlett-Packard Limited
WHITE PAPER: In this white paper, get vital information about the malicious bot, also known as botnets when in large forces, and explore 4 key features that will help you build a defense-in-depth security system to prevent these attacks from compromising your networks.
Posted: 11 Apr 2014 | Published: 30 Nov 2012

Hewlett-Packard Limited

Beyond the Hype: Real-world APT Solution Testing by NSS Labs
sponsored by Fortinet, Inc.
WHITE PAPER: This resource provides a thorough analysis of the Fortinet FortiSandbox 3000D v1.2 breach detection system. It looks at aspects like the effectiveness, performance and TCO of the solution and finds it to be an effective way to detect breaches and breach attempts.
Posted: 07 Apr 2014 | Published: 07 Apr 2014

Fortinet, Inc.

Advanced Intelligence (AI) EngineTM
sponsored by LogRhythm, Inc.
WHITE PAPER: This brief guide takes an in-depth look at one company's SIEM solution and how it employs log and event management to prevent cyber-attacks.
Posted: 17 Apr 2014 | Published: 17 Apr 2014

LogRhythm, Inc.

Making a Business Case for Fraud Prevention Technology
sponsored by IBM
WHITE PAPER: This guide makes an effective business case for fraud-prevention technology and evaluates the true impact of fraud on various financial institutions.
Posted: 09 Apr 2014 | Published: 31 Dec 2013

IBM

Utilizing Threat Analytics for Cloud-Based Web Security
sponsored by Cisco Systems, Inc.
WHITE PAPER: This guide explores one company's unique, cloud-based solution for threat detection by utilizing threat analytics.
Posted: 21 Apr 2014 | Published: 21 Apr 2014

Cisco Systems, Inc.

From SIEM to Security Analytics: The Path Forward
sponsored by EMC Corporation
WEBCAST: Watch this webcast to learn how you can accelerate your security transformation from traditional SIEM to a unified platform for incident detection, investigation and advanced security analysis.
Posted: 14 Apr 2014 | Premiered: Dec 31, 2012

EMC Corporation

A Risk Management Approach to HITECH
sponsored by Symantec Corporation
WHITE PAPER: This exclusive resource describes the challenges of security and privacy in the healthcare environment, discussing how you can best assess risk, prevent data loss, and secure critical systems with minimal impact on the end user or the quality of patient care.
Posted: 23 Apr 2014 | Published: 23 Apr 2014

Symantec Corporation

Is Your AV Keeping Up?
sponsored by Lumension
WEBCAST: This informative resource takes a look at anti-virus technology and outlines how businesses can prevent sophisticated malware from infiltrating their system.
Posted: 16 Apr 2014 | Premiered: Apr 16, 2014

Lumension

Third Party Applications: A Chink in Your Armour
sponsored by Lumension
WEBCAST: This webcast sheds light on the prevalence of third party application vulnerabilities. View now for key tips from industry leaders on how to reduce these risks with optimum patch management.
Posted: 15 Apr 2014 | Premiered: Apr 15, 2014

Lumension

Using Free Web Application Security Scanning Tools to Secure Web Apps
sponsored by Imperva
EGUIDE: Expert Michael Cobb sheds light on the true benefits of a zero-cost, open source Web application security scanning tool.
Posted: 07 Apr 2014 | Published: 07 Apr 2014

Imperva
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement