IT Management  >   Systems Operations  >   Security  >  

Threats

RSS Feed    Add to Google    Add to My Yahoo!
ThreatsReports
 
Demystifying Security Controls for IT Risk & Audit Professionals
sponsored by Bit9, Inc.
WEBCAST: Although you may be a compliant company, if you disregard security threats and the technologies and tools to protect them, then you are as vulnerable as anyone. Watch this webcast to learn about the risks that face your organization if you don't meet compliance guidelines and how to meet these goals.
Posted: 18 Aug 2014 | Premiered: Aug 18, 2014

Bit9, Inc.

The Power to Destroy: How Malware Works
sponsored by Symantec
WHITE PAPER: In this white paper, you'll learn the basics of how malware works and how cyber criminals use it to steal valuable data, as well as the best practices for defending your website against them.
Posted: 31 Jul 2014 | Published: 31 Jul 2014

Symantec

The McAfee Next Generation Firewall Revolutionizes Network Security
sponsored by McAfee, Inc.
DATA SHEET: This white paper highlights a next-generation firewall (NGFW) solution that is up to speed with the latest technological advancements, and stands apart from your traditional firewall solutions.
Posted: 06 Aug 2014 | Published: 06 Aug 2014

McAfee, Inc.

Top Three Tactics Advanced Attackers Use to Breach Pharmaceutical Organizations
sponsored by FireEye
WHITE PAPER: This essential white paper breaks down the top three most dangerous methods malicious attackers employ and evaluates strategies that can safeguard your sensitive data against them.
Posted: 08 Aug 2014 | Published: 08 Aug 2014

FireEye

Vulnerability Assessment and Penetration Testing: Can You Afford Not To?
sponsored by Pwine Express
WHITE PAPER: This informative white paper explains why vulnerability assessment and penetration testing are such critical tools in the fight against modern cybercrime, as well as how they can make a difference in your organization's security solution.
Posted: 11 Aug 2014 | Published: 11 Aug 2014

Pwine Express

Discover the Danger Behind the Heartbleed Bug
sponsored by Symantec Corporation
WHITE PAPER: Discover the dangers lurking within the Heartbleed bug, and learn how your organization should respond to it.
Posted: 28 Jul 2014 | Published: 21 Jul 2014

Symantec Corporation

Use Case: Secure Internet Access for 71,000 Australian Students
sponsored by Websense, Inc.
WHITE PAPER: This white paper describes a use case involving an Australian educational in need of a centralized, scalable solution in order to distribute materials to 45,000 users per day in safe, easily accessible manner.
Posted: 07 Aug 2014 | Published: 07 Aug 2014

Websense, Inc.

Threat Management Gateway Replacement Guide
sponsored by Sophos, Inc.
WHITE PAPER: This TMG replacement guide covers a few key areas of Microsoft's TMG, and addresses a unified threat management system that can replace TMG and improve your network protection. Discover more about this system's interface that simply works, and why you don't need to panic without Microsoft's TMG.
Posted: 11 Aug 2014 | Published: 31 Jul 2013

Sophos, Inc.

Advanced Cyber Threats Demand a New Privileged Account Security Model
sponsored by Cyber-Ark Software
WHITE PAPER: In this ESG report, discover how to better protect your privileged accounts by embracing new centralized architectural solutions.
Posted: 30 Jul 2014 | Published: 29 Jun 2013

Cyber-Ark Software

Next Generation Firewall Solutions Aid Research-oriented Institutions
sponsored by McAfee, Inc.
CASE STUDY: Access this case study to learn about a university that used a next generation firewall solution for complete network security.
Posted: 01 Aug 2014 | Published: 01 Aug 2014

McAfee, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement