IT Management  >   Systems Operations  >   Security  >  


RSS Feed    Add to Google    Add to My Yahoo!
Threats Reports
Between Defense and Recovery: The Growing Trend Toward Mitigation
sponsored by Unisys
RESOURCE: This resource will help you gain an understanding of what a successful defense against cyber-attacks entails. Learn how a mitigation strategy can stop security threats from doing real harm, even once inside your system.
Posted: 05 Nov 2015 | Published: 14 Jul 2015


IDC’s Top Ten IT Security Predictions for Asia-Pacific
sponsored by RSA, The Security Division of EMC
VIDEO: Watch this video to uncover the top 10 IT Security predictions from IDC Asia Pacific's head of IT security research, Simon Piff. Tune in as he discusses the potential impact each projection will have on Asia Pacific markets.
Posted: 19 Nov 2015 | Premiered: 16 Nov 2015

RSA, The Security Division of EMC

Case Study: How West Virginia University Reduced Its Sensitive Data Footprint
sponsored by Identity Finder, LLC
WEBCAST: In the following webinar, chief information security officer Alex Jalso describes how he reduced his sensitive data footprint in his organization and suggests best practices for reducing your own.
Posted: 12 Oct 2015 | Premiered: Oct 12, 2015

Identity Finder, LLC

Gartner Magic Quadrant for Secure Email Gateways 2015
sponsored by Proofpoint, Inc.
WHITE PAPER: In this Magic Quadrant report, find out what SEGs top the list as leaders delivering strong email security capabilities. View now to learn the strengths of today's top SEG platforms as well as cautionary advice from insiders.
Posted: 21 Oct 2015 | Published: 29 Jun 2015

Proofpoint, Inc.

Strategies for Advanced Threat Protection
sponsored by Symantec Corporation
WHITE PAPER: In this data sheet, you'll find a new strategy designed to uncover, prioritize, and remediate advanced attacks across all your endpoints. Access now and learn how to search for, discover, and remediate any attack artifacts across all of your endpoint systems.
Posted: 25 Nov 2015 | Published: 25 Nov 2015

Symantec Corporation

Managed Security Services Portal Demo
sponsored by IBM
WEBCAST: This video provides a demonstration of a managed security services portal that acts as a command center for all of your security services. Access now to see the key features and benefits can provide to help you secure your information assets
Posted: 19 Nov 2015 | Premiered: Apr 12, 2013


Deliver a Secure and Fluid Web Experience with Next-Gen Firewall Technology
sponsored by Palo Alto Networks
CASE STUDY: In this case study, you will learn how CESA leveraged a next-generation firewall and security platform in conjunction with in-house developed integration components, allowing for a truly fluid, secure web experience. Access now to discover how you can target dangerous apps, sites, and content without missing a beat.
Posted: 19 Oct 2015 | Published: 19 Oct 2015

Palo Alto Networks

The ESG Cybersecurity Maturity Model
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Based on their research, Enterprise Strategy Group has developed a cyber security maturity model that classifies organizations as basic, progressing, or advanced.
Posted: 12 Nov 2015 | Published: 22 Oct 2014

Hewlett Packard Enterprise

Special Report: Healthcare Security in 2015
sponsored by Raytheon|Websense
WHITE PAPER: This report examines the issues and challenges surrounding IT security in the healthcare industry and gives advice on overcoming them.
Posted: 17 Nov 2015 | Published: 22 Sep 2015


Improving Your Web Security Intelligence by Contextualizing Data
sponsored by Akamai
WHITE PAPER: This white paper highlights the key components missing from your web security intelligence strategy. Learn how to secure your apps, web tools, and critical business information against a myriad of attacks and develop a holistic web security strategy.
Posted: 20 Oct 2015 | Published: 20 Oct 2015

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement