IT Management  >   Systems Operations  >   Security  >  


RSS Feed    Add to Google    Add to My Yahoo!
Threats Reports
Advanced, Efficient, and Trusted Security Practices
sponsored by Unisys
DATA SHEET: In this solution brief, you'll discover ways to address threats with new approaches that give you the security, affordability, and management control you need today. Access now and find answers to your most pertinent security questions.
Posted: 05 Nov 2015 | Published: 30 Sep 2015


Gartner Magic Quadrant for Secure Email Gateways 2015
sponsored by Proofpoint, Inc.
WHITE PAPER: In this Magic Quadrant report, find out what SEGs top the list as leaders delivering strong email security capabilities. View now to learn the strengths of today's top SEG platforms as well as cautionary advice from insiders.
Posted: 21 Oct 2015 | Published: 29 Jun 2015

Proofpoint, Inc.

Cyberthreat Defense in 2015
sponsored by Citrix
RESOURCE: This short infographic reveals survey results that all IT security professionals will be interested in reviewing.
Posted: 26 Oct 2015 | Published: 26 Oct 2015


The 2015 Internet of Things in the Enterprise Report: Executive Summary
sponsored by OpenDNS
WHITE PAPER: In this IoT report, take a closer look at the 7 key findings about IoT devices, connectivity, and infrastructure. Access now and learn what you can do to protect your organization.
Posted: 09 Oct 2015 | Published: 29 May 2015


Meeting the Challenges of HIPAA Compliance, Phishing Attacks, and Mobile Security
sponsored by Proofpoint, Inc.
WHITE PAPER: This white paper examines three top healthcare security challenges—stricter regulations, inbound threats, and mobile IT. Read on to protect PHI and other confidential data from inbound security threats while embracing mobile computing technologies and security as a service (SaaS).
Posted: 05 Nov 2015 | Published: 31 Dec 2013

Proofpoint, Inc.

Infographic: Is Your Data Classified?
sponsored by Identity Finder, LLC
WHITE PAPER: In a world where classifying your sensitive data prevents and reduces risk for 75% of breach events, it's in your best interest to be prepared. Access this infographic and learn methods for tackling classification.
Posted: 12 Oct 2015 | Published: 12 Oct 2015

Identity Finder, LLC

Supporting Technologies and Enterprise Scenarios for Deploying DLP Products
sponsored by Oracle Corporation
EGUIDE: In this exclusive e-guide, you will learn how to boost your enterprise security with 5 surprising supporting technologies like MDM and secure file sharing. Read on now to complement your existing DLP products and access 4 enterprise scenarios for deploying database security tools.
Posted: 05 Nov 2015 | Published: 05 Nov 2015

Oracle Corporation

Staying One Step Ahead with Zero-Day Protection
sponsored by Check Point Software Technologies Ltd.
WEBCAST: This webcast examines how you can stop today's advanced hackers. Watch and learn how sandboxing, CPU-level detection and more can keep your organization secure from even the most sophisticated threats.
Posted: 16 Nov 2015 | Premiered: Sep 22, 2015

Check Point Software Technologies Ltd.

Incident Response Spend Up As Firms Recognize Cyber-Attacks Are Inevitable
sponsored by IBM
EGUIDE: Access this expert guide to learn why an effective incident response plan may be your best defense against today's increasingly personalized cyber-attacks.
Posted: 23 Oct 2015 | Published: 23 Oct 2015


Reduce Attack Surface and Compliance Risks with Unified Threat Protection
sponsored by Proofpoint, Inc.
WEBCAST: In this webcast, Joe Diamond, Director of Product Marketing for Information Protection at Proofpoint, explains how to protect your sensitive information from malicious attacks, system glitch, and human error with ongoing security solutions. View now to reduce your attack surface with automated classification.
Posted: 05 Nov 2015 | Premiered: Nov 5, 2015

Proofpoint, Inc.
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement