IT Management  >   Systems Operations  >   Security  >  

Threats

RSS Feed    Add to Google    Add to My Yahoo!
Threats Reports
 
How LepideAuditor Helps You Detect and Prevent Privilege Abuse
sponsored by Lepide Software
WHITE PAPER: Discover how to combat the issue of privilege abuse with in-depth auditing of changes taking place in critical servers and data. Find out how to identify privileged users, track permission changes continuously, clean out old, unused accounts, ensure least privilege, and more.
Posted: 27 Jul 2017 | Published: 27 Jul 2017

Lepide Software

How to Track Privileged Users' Activities in the Active Directory
sponsored by Lepide Software
EBOOK: Privileged account abuse can result in data breaches, downtime, and failed compliance audits. Discover a 4 step process for tracking the activities of privileged user accounts to bolster your security posture and uncover an even easier way to audit privileged accounts and manage users' activities.
Posted: 26 Jul 2017 | Published: 26 Jul 2017

Lepide Software

Internet Security Threat Report
sponsored by Symantec
WHITE PAPER: In this comprehensive guide, review some of the major security attacks and vulnerabilities from 2016, and learn how it can inform your policy moving into the future.
Posted: 08 Aug 2017 | Published: 28 Apr 2017

Symantec

6 Best Practices: Privileged Access Security for AWS
sponsored by Centrify Corporation
RESOURCE: This infographic reveals 6 best practices for implementing and extending AWS security best practices to the cloud. Learn why you should Establish a common security model, consolidate identities, and 3 more ways to securely migrate a cloud environment.
Posted: 28 Jun 2017 | Published: 28 Jun 2017

Centrify Corporation

CyberSecurity in 2017: Can Business Really Be Secure?
sponsored by AdvizeX Technologies
RESOURCE: As technology and criminals both advance at lightning speed, can you really be sure that your business is secure? As you introduce tools for productivity, are you also opening yourself to attack? Access this report from cybersecurity expert Sam Cattle.
Posted: 07 Aug 2017 | Published: 09 Feb 2017

AdvizeX Technologies

CISOs Investigate: User Behavior Analytics
sponsored by Exabeam
EBOOK: User behavior analytics (UBA) helps you calculate the potential security risks posed by your own employees to help mitigate internal threats. This extensive 100+ page report takes a comprehensive look at UBA, with input from several CISOs, to give you the best foot forward with this technology to strengthen your security strategy.
Posted: 03 Aug 2017 | Published: 29 Dec 2016

Exabeam

The Impact of Data Breaches on Reputation and Share Value
sponsored by Centrify Corporation
RESEARCH CONTENT: Discover how IT practitioners view the impact of data breaches on reputation and share value. Step into their shoes to learn more about the correlation between security posture ad brand reputation, customer concerns for privacy and data security, and more.
Posted: 28 Jun 2017 | Published: 31 May 2017

Centrify Corporation

How Ransomware is Evolving into the Perfect Crime
sponsored by Barkly
WEBCAST: Ransomware is on the rise. The 2017 WannaCry ransomware attack impacted 300,000 systems in 150 countries, while NotPetya affected 100,000 systems in 65 countries. Access this in-depth webcast to get a full understanding of new ransomware trends.
Posted: 03 Aug 2017 | Premiered: Aug 3, 2017

Barkly

It Vs. Users? How Law Firms Can Maximize Security While Granting Access To The Web
sponsored by Authentic8, Inc.
WHITE PAPER: Discover how to maximize network and endpoint security while still granting the web access employees need to stay productive, with a particular focus on the role of security in law firms. Learn how to go beyond virtualization to secure web access and use Silo to create secure, cloud-based virtual browsers.
Posted: 28 Jul 2017 | Published: 31 Dec 2016

Authentic8, Inc.

Stopping the Next Ransomware Outbreak
sponsored by Carbon Black
WHITE PAPER: The spike in ransomware outbreaks in the last two years has left security analysts and administrators searching for better protection. Discover 5 simple tips to prevent a ransomware outbreak at your enterprise.
Posted: 10 Aug 2017 | Published: 09 Aug 2017

Carbon Black
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement