IT Management  >   Systems Operations  >   Security  >  

Threats

RSS Feed    Add to Google    Add to My Yahoo!
Threats Reports
 
Data Security in Higher Education
sponsored by J2 Cloud Services
RESOURCE: In this resource, discover how cloud faxing delivers a fast, secure, and more convenient fax service that increases satisfaction among university administration and students.
Posted: 13 Sep 2017 | Published: 14 Dec 2016

J2 Cloud Services

Yelp Customer Story: Secure Content with Threat Intelligence and Automated Protection
sponsored by Cisco Umbrella
CASE STUDY: Discover how Yelp fosters trust between their users and its online content by preempting potentially dangerous malware attacks and other threats with cloud-delivered automated protection and integrated threat intelligence.
Posted: 09 Aug 2017 | Published: 09 Aug 2017

Cisco Umbrella

What's on Your Network?
sponsored by Aruba Networks
RESOURCE: In this resource, find out how the closed-loop approach to network security allows IT professionals to deploy and retain control of IoT and BYOD devices to protect against security breaches.
Posted: 20 Sep 2017 | Published: 20 Sep 2017

Aruba Networks

Network Visibility for Dummies
sponsored by Ixia
EBOOK: You can't monitor what you can't see. When it comes to establishing strong security, visibility across all your network traffic is essential. This 77-page e-book, Network Visibility for Dummies, describes how you can achieve truly resilient and effective network security.
Posted: 28 Aug 2017 | Published: 28 Aug 2017

Ixia

Most Wanted Malware: Banking Trojans and Ransomware That Want Your Money
sponsored by Check Point Software Technologies Ltd.
RESOURCE: Read this rundown of the top 10 malwares that tried to steal your money in the summer of 2017.
Posted: 12 Oct 2017 | Published: 19 Sep 2017

Check Point Software Technologies Ltd.

Mobile Application Security: Discovering Leaks and Remediation
sponsored by WhiteHat Security
WEBCAST: 25% of mobile apps have at least one high security risk or privacy flaw. Discover how to overcome the top issues facing mobile security and learn more about key iOS and Android vulnerabilities, mobile app security services, automated mobile app scanning, and more.
Posted: 27 Jul 2017 | Premiered: Jul 27, 2017

WhiteHat Security

Cyber security in the Nordics
sponsored by ComputerWeekly.com
EGUIDE: With the digitisation of life and work comes the 24-hour threat of cyber attacks. The Nordic region's pioneering spirit in the digital arena could easily turn heads, some of which may have malicious intent.
Posted: 31 Jul 2017 | Published: 31 Jul 2017

ComputerWeekly.com

How to Become a Superstar Security Leader
sponsored by Google Cloud
RESEARCH CONTENT: Be the superstar security leader your fellow executives need. This report looks at the biggest changes in firms' expectations of their CISOs and provides specific examples of how top information security professionals rise to those occasions. Download the Forrester report today and secure your future.
Posted: 08 Aug 2017 | Published: 13 Feb 2017

Google Cloud

Improve End-to-end Security with Aruba Clearpass
sponsored by Aruba Networks
RESOURCE: In this resource, learn how to protect all devices corporate, IoT, BYOD- wired and wirelessly to tighten up end-to-end security from unauthorized users.
Posted: 18 Sep 2017 | Published: 18 Sep 2017

Aruba Networks

Add-ons Secure Office 365 from Advanced Attacks
sponsored by OPSWAT inc
EGUIDE: Microsoft has added new features to secure Office 365 against advanced threats, such as email phishing attempts and malicious attachments. In this expert e-guide, learn more about the new layers of protection.
Posted: 31 Aug 2017 | Published: 30 Aug 2017

 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement