IT Management  >   Systems Operations  >   Security  >  

Virus Threats

RSS Feed    Add to Google    Add to My Yahoo!
Virus Threats Reports
Three Mobile Security Threats IT Should Know
sponsored by CloudMine
EGUIDE: Access this expert e-guide to get a detailed look at three mobile security threats and find out how to safeguard corporate-provided or employee-owned mobile devices in your enterprise. You'll also discover how mobile backend as a service (MBaaS) helps IT shops to bridge the gap between legacy systems and mobile devices.
Posted: 29 Oct 2015 | Published: 29 Oct 2015

Simplified Network Security  in 90 Seconds
sponsored by OpenDNS
WEBCAST: View this webcast to learn how to protect users on any device in any location from today's top network security threats such as malware and phishing attacks.
Posted: 14 Oct 2015 | Premiered: Jun 30, 2012


IDC’s Top Ten IT Security Predictions for Asia-Pacific
sponsored by RSA, The Security Division of EMC
VIDEO: Watch this video to uncover the top 10 IT Security predictions from IDC Asia Pacific's head of IT security research, Simon Piff. Tune in as he discusses the potential impact each projection will have on Asia Pacific markets.
Posted: 19 Nov 2015 | Premiered: 16 Nov 2015

RSA, The Security Division of EMC

Incident Response Spend Up As Firms Recognize Cyber-Attacks Are Inevitable
sponsored by IBM
EGUIDE: Access this expert guide to learn why an effective incident response plan may be your best defense against today's increasingly personalized cyber-attacks.
Posted: 23 Oct 2015 | Published: 23 Oct 2015


Cyberthreat Defense in 2015
sponsored by Citrix
RESOURCE: This short infographic reveals survey results that all IT security professionals will be interested in reviewing.
Posted: 26 Oct 2015 | Published: 26 Oct 2015


Anatomy of A Hack Disrupted
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper takes a close-up look one successfully mitigated malware attack, giving you insight on how to stop a potential cyber-breach.
Posted: 28 Oct 2015 | Published: 28 Oct 2015

LogRhythm, Inc.

Managed Security Services Portal Demo
sponsored by IBM
WEBCAST: This video provides a demonstration of a managed security services portal that acts as a command center for all of your security services. Access now to see the key features and benefits can provide to help you secure your information assets
Posted: 19 Nov 2015 | Premiered: Apr 12, 2013


Report Summary: Reliability Analysis of Juniper Networks SRX5000 Line of Services Gateways
sponsored by Juniper Networks, Inc.
ANALYST REPORT: This analysis report focuses on a networking and security service that provides application security, UTM, integrated IPS, and advanced integrated threat management. Read on to see how this scalable, resilient security solution can guard your enterprise's data center against cyber threats and malware.
Posted: 26 Oct 2015 | Published: 31 Jan 2015

Juniper Networks, Inc.

Cloud-Based Network Security Test Results Revealed
sponsored by OpenDNS
CASE STUDY: In this brief white paper, examine the results of a third-party security test of one cloud-delivered network security service.
Posted: 13 Oct 2015 | Published: 07 Oct 2015


Remove Network Traffic Blind Spots
sponsored by Radware
WHITE PAPER: In this white paper, learn how to shine a light on all network traffic shadows and dark spots to mitigate malicious programs and attacks. Continue reading to examine the 8 considerations for choosing an SSL visibility strategy.
Posted: 12 Nov 2015 | Published: 15 Apr 2015

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement