IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Unified Threat Management

RSS Feed    Add to Google    Add to My Yahoo!
Unified Threat Management Reports
 
Debunking APT myths: What it really means and what you can do about it
sponsored by SearchSecurity.com
EGUIDE: This E-Guide defines APT, dispels common myths and explains what you can do about this adversary. Additionally, uncover why the idea of keeping intruders out with traditional, perimeter-based security is useless against APT and how you can best protect against modern security threats.
Posted: 29 Jul 2011 | Published: 29 Jul 2011

SearchSecurity.com

Attack Mitigation System
sponsored by Radware
WHITE PAPER: Radware’s Attack Mitigation System (AMS) is a real-time network and application attack mitigation solution that protects the application infrastructure against network and application downtime, application vulnerability exploitation, malware spread, information theft, web service attacks and web defacement. View now to learn more.
Posted: 10 Oct 2011 | Published: 10 Oct 2011

Radware

Advanced Persistent Threats and Other Advanced Attacks: Threat Analysis and Defense Strategies for SMB, Mid-size, and Enterprise Organizations
sponsored by Websense, Inc.
WHITE PAPER: Understanding exactly what an Advanced Persistent Threat (APT) is can be difficult, as the hype surrounding this dangerous threat has clouded its definition. View this paper to discover the nature of APT risks and gain key recommendations on how to defend against them.
Posted: 15 Sep 2011 | Published: 15 Sep 2011

Websense, Inc.

Risk Management: Protect and Maximize Stakeholder Value
sponsored by Oracle Corporation UK Ltd
WHITE PAPER: This white paper explains how a risk management program can help identify opportunities for value creation while also protecting against potential threats.
Posted: 07 Oct 2010 | Published: 02 Feb 2009

Oracle Corporation UK Ltd

The Advantages of Multi-Core Architecture in Unified Threat Management (UTM) Solutions
sponsored by SonicWALL
WHITE PAPER: Securing your company's network requires a comprehensive approach that includes intrusion prevention, data leak protection, and content filtering. This white paper examines how UTM solutions provide enhanced security that is efficient and cost-effective.
Posted: 28 Apr 2008 | Published: 01 Apr 2008

SonicWALL

The Essential Elements of Comprehensive Endpoint Security
sponsored by Symantec Corporation
WHITE PAPER: Establishing a comprehensive endpoint security solution is a complicated undertaking. This paper will clarify the various aspects of the endpoint security problem and identify the functional requirements of a comprehensive endpoint security solution.
Posted: 27 Mar 2006 | Published: 01 Feb 2006

Symantec Corporation

Information Security Magazine, July 09: Controlling Privileged Accounts
sponsored by Information Security Magazine
EZINE: This month's cover story is about reigning in privileged accounts such as the UNIX root and Windows Administrator accounts. Regulatory requirements and economic realities are pressuring enterprises to secure their privileged accounts, but how? Also in this issue: Keeping UTM Unified instead of Unnecessary, and more. Read on to learn more.
Posted: 13 Jul 2009 | Published: 13 Jul 2009

Information Security Magazine

Top 10 Threats to SME Data Security
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: For a no-nonsense perspective on the most common types of network and data compromises in small to medium-sized businesses, read this white paper. It lists the ten most common vectors of data compromise, with practical techniques and defenses to counter them.
Posted: 26 Oct 2009 | Published: 26 Oct 2008

WatchGuard Technologies, Inc.

Unified Threat Management (UTM) Solutions
sponsored by SonicWALL
WHITE PAPER: This series of technical briefs examines the key factors you need to consider regarding unified threat management (UTM) solutions as they impact security, performance, management, and consolidation.
Posted: 05 Dec 2007 | Published: 01 Dec 2007

SonicWALL

Examining SSL-encrypted Communications
sponsored by Netronome Systems
WHITE PAPER: SSL-encrypted communications have enabled a variety of secure, web-based communications and online transactions. This paper explores the drivers behind the increase in SSL usage and the methods used to confront the security challenges that SSL creates.
Posted: 26 Oct 2007 | Published: 16 Oct 2007

Netronome Systems
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement