IT Management  >   Systems Operations  >   Security  >  

Threats

RSS Feed    Add to Google    Add to My Yahoo!
ThreatsReports
 
Best practices for securing mobile email access
sponsored by Hewlett-Packard Limited and Intel ®
EGUIDE: As companies continue to encourage and enable their employees to work remotely, accessing email and information on Exchange servers in a secure environment is not always easy. A secure connection is necessary in order to guarantee there will be no consequences for a potential threat or attack.
Posted: 31 Jul 2014 | Published: 31 Jul 2014

Hewlett-Packard Limited and Intel ®

Webcast: Protecting Enterprise Networks and Endpoints
sponsored by CDW Corporation
WEBCAST: This webcast presents a next-generation firewall solution to protect your organization's network and endpoints.
Posted: 21 Jul 2014 | Premiered: May 31, 2014

CDW Corporation

ActivID® Threat Detection Service
sponsored by HID
WHITE PAPER: Discover a threat detection service that uses revolutionary identification technology to protect against fraud and data breaches.  Read on to find out how it works in combating threats and the benefits of implementing a detection service.
Posted: 24 Jul 2014 | Published: 03 May 2013

HID

Keeping Advanced Persistent Threats in Check
sponsored by CDW Corporation
WHITE PAPER: This white paper provides valuable information on APTs and proposes one company's comprehensive next-generation security solution.
Posted: 18 Jul 2014 | Published: 18 Jul 2014

CDW Corporation

The Evolution of Application Vulnerabilities, Spam Threats, and Incident Response
sponsored by IBM
WHITE PAPER: This report details the many breaches and security incidents that have plagued organizations in recent years; threats from past years that are currently showing signs of resurgence; and issues to be aware of in today's security landscape.
Posted: 24 Jul 2014 | Published: 30 Jun 2014

IBM

Why Your Company Should Consider Professional Security Services
sponsored by CDW Corporation
WHITE PAPER: This white paper details the professional security services offered by CDW, which include the people, partners, and planning capabilities to assist your organization in devising a comprehensive security strategy.
Posted: 17 Jul 2014 | Published: 17 Jul 2014

CDW Corporation

Web Attack Survival Guide
sponsored by Imperva
WHITE PAPER: This informative whitepaper explores survival tactics in the event of a web attack.
Posted: 07 Jul 2014 | Published: 07 Jul 2014

Imperva

The new reality of mobile solutions: Everything you’ve been told about mobility is wrong
sponsored by Dell, Inc.
WHITE PAPER: This white paper breaks down four huge misconceptions about mobility that is scaring organizations away from going mobile. It also provides ways to easily overcome any barriers to mobility across your organization by objectively matching the best mobility strategy to your unique IT requirements, business goals and user group needs.
Posted: 30 Jul 2014 | Published: 30 Jul 2014

Dell, Inc.

The Secret Ingredient in Mobile ROI: Why Security is Paramount in Enterprise Mobility Management
sponsored by BlackBerry
WHITE PAPER: This white paper looks closely at what the right EMM security solution does for business leaders, users and operations.
Posted: 25 Jul 2014 | Published: 25 Jul 2014

BlackBerry

How Controlling Access to Privileged Accounts Can Keep Insider Threat from Hurting Your Bottom Line
sponsored by BeyondTrust Corporation
WHITE PAPER: Access control is a necessity. Read this paper to identify a line of identity and access solutions that address these problems inside the perimeter and, ultimately, your enterprise's bottom line and reputation.
Posted: 24 Jul 2014 | Published: 16 Feb 2009

BeyondTrust Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement