IT Management  >   Systems Operations  >   Security  >   Security Management  >  

UTM

RSS Feed    Add to Google    Add to My Yahoo!
UTMReports
 
Managing Security Risks and Vulnerabilities
sponsored by IBM
WHITE PAPER: Read now to learn about automated labor-saving automation, a platform that incorporates vulnerability analysis, risk management, and remediation support, all within a single console.
Posted: 06 Mar 2014 | Published: 31 Jan 2014

IBM

Combating Today’s Security Threats
sponsored by SearchSecurity.com
EGUIDE: In this expert guide, gain a better understanding of advanced persistent threats (APTs) and how you can stay one step ahead. View now to gain key insight into security strategies that can help you protect your organization.
Posted: 20 Feb 2012 | Published: 17 Feb 2012

SearchSecurity.com

Thwarting Sophisticated Attacks with Today’s Firewalls
sponsored by SearchSecurity.com
EGUIDE: This expert resource explores modern network security, offering key insight into fighting today’s sophisticated threats as well as the differences between next-generation firewall (NGFW) and unified threat management (UTM).
Posted: 17 Feb 2012 | Published: 17 Feb 2012

SearchSecurity.com

Evolving IT security threats: Inside Web-based, social engineering attacks
sponsored by Websense, Inc.
EGUIDE: In order to adequately defend IT infrastructure, organizations must have a solid understanding of the various attack methods that are effective today. This expert e-guide takes an in-depth look into the latest IT security threats and provides strategic recommendations on how to deal with them.
Posted: 02 Sep 2011 | Published: 02 Sep 2011

Websense, Inc.

Presentation Transcript: Best Practices for Implementation of an Intrusion Prevention and Intrusion Detection Systems
sponsored by Dell SecureWorks
PRESENTATION TRANSCRIPT: View this presentation transcript to explore the benefits of deploying IPS & IDS, challenges and considerations when implementing IPS & IDS, features to look for when selecting a device, deployment methodologies and more.
Posted: 22 Aug 2011 | Published: 22 Aug 2011

Dell SecureWorks

Practical Advantages of Fireware® XTM for Hands-On IT Administrators
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: Take a look at the new XTM (extensible threat management) network security from WatchGuard. See the tangible benefits this new generation of security solutions offers. No hype -- just concrete examples of XTM features and the advantages they deliver for you to evaluate against your current security.
Posted: 26 Oct 2009 | Published: 26 Jul 2009

WatchGuard Technologies, Inc.

Sophos Email Security Appliances
sponsored by Sophos, Inc.
PRODUCT DEMO: The Sophos Email Security Appliance offers high-capacity, high-availability security for your email network, delivering protection updates every five minutes and providing the most up-to-date email security available.
Posted: 18 Apr 2006 | Premiered: 18 Apr 2006

Sophos, Inc.

6 Tips for Choosing a UTM Solution
sponsored by Astaro
WHITE PAPER: Organizations today are replacing multiple, outdated and costly security appliances with a more simplified, single unified threat management (UTM) solution. Which one is best for your business? In this paper, gain key advice on how to choose a comprehensive UTM solution.
Posted: 13 Jan 2012 | Published: 13 Jan 2012

Astaro

Web Filtering: An Essential Part of a Consolidated Security System
sponsored by Fortinet, Inc.
WHITE PAPER: In spite of the billions of dollars invested in security, web-borne threats are still on the rise. Enterprises need a security system that can enforce granular web access policies on all devices used to access the web from inside and outside the network perimeter.
Posted: 01 Aug 2011 | Published: 29 Jul 2011

Fortinet, Inc.

7 Essential Steps to Achieve, Measure and Prove Optimal Security Risk Reduction
sponsored by Qualys, Inc.
WHITE PAPER: Rapid changes within technology, new server and software deployments, and the evolving sophistication of attack methods used to infiltrate systems and steal data create the greatest set of challenges faced by security and IT administrators trying to keep their systems secure and within regulatory compliance. Interested in reducing security risk?
Posted: 20 Oct 2009 | Published: 20 Oct 2009

Qualys, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
UTM White Papers | UTM Multimedia | UTM IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement