IT Management  >   Systems Operations  >   Security  >  

Virus Threats

RSS Feed    Add to Google    Add to My Yahoo!
Virus Threats Reports
Combat Data Breaches with an Endpoint Detection and Response Platform
sponsored by Bit9 + Carbon Black
DATA SHEET: Access this data sheet to learn about an endpoint threat detection and response platform that enables SOC and IR teams to prepare for a data breach through continuous endpoint recording, customized detection, live response, remediation, and rapid attack recover with threat banning.
Posted: 06 Nov 2015 | Published: 30 Oct 2015

Bit9 + Carbon Black

Supporting Technologies and Enterprise Scenarios for Deploying DLP Products
sponsored by Oracle Corporation
EGUIDE: In this exclusive e-guide, you will learn how to boost your enterprise security with 5 surprising supporting technologies like MDM and secure file sharing. Read on now to complement your existing DLP products and access 4 enterprise scenarios for deploying database security tools.
Posted: 05 Nov 2015 | Published: 05 Nov 2015

Oracle Corporation

How to Extend Identity Security To Your APIs
sponsored by Ping Identity Corporation
WHITE PAPER: This white paper discusses the new authentication and authorization standards for REST APIs, how they can be composed with SAML, and details about how they work to provide IAM and API security. Continue reading to learn more.
Posted: 26 Oct 2015 | Published: 07 May 2014

Ping Identity Corporation

Between Defense and Recovery: The Growing Trend Toward Mitigation
sponsored by Unisys
RESOURCE: This resource will help you gain an understanding of what a successful defense against cyber-attacks entails. Learn how a mitigation strategy can stop security threats from doing real harm, even once inside your system.
Posted: 05 Nov 2015 | Published: 14 Jul 2015


An eCommerce Guide to Secure Website Visitor Acquisition
sponsored by Symantec Corporation
WHITE PAPER: This white paper explores new approaches to online marketing and demonstrates several security practices that will improve your customer acquisition and conversion rates.
Posted: 11 Nov 2015 | Published: 31 Dec 2014

Symantec Corporation

Special Report: Healthcare Security in 2015
sponsored by Raytheon|Websense
WHITE PAPER: This report examines the issues and challenges surrounding IT security in the healthcare industry and gives advice on overcoming them.
Posted: 17 Nov 2015 | Published: 22 Sep 2015


How to Stop Today's Advanced Hackers
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This white paper discusses how you can protect against any threat today's advanced hackers throw at you.
Posted: 13 Nov 2015 | Published: 19 Aug 2015

Check Point Software Technologies Ltd.

Staying One Step Ahead with Zero-Day Protection
sponsored by Check Point Software Technologies Ltd.
WEBCAST: This webcast examines how you can stop today's advanced hackers. Watch and learn how sandboxing, CPU-level detection and more can keep your organization secure from even the most sophisticated threats.
Posted: 16 Nov 2015 | Premiered: Sep 22, 2015

Check Point Software Technologies Ltd.

Security Intelligence for the Modern Data Center
sponsored by AccelOps Inc.
WHITE PAPER: Organizations need an intelligent approach to understand data and proactively detect security threats and anomalies. In this white paper, learn how to consolidate security, performance, and compliance monitoring into a single pane of glass to improve protection across environments
Posted: 17 Nov 2015 | Published: 03 Nov 2015

AccelOps Inc.

5 Network Security Lessons We Should All Learn from the Sony Hack
sponsored by Trend Micro
EGUIDE: Access this expert guide now to uncover the 5 enterprise network security lessons that could have helped Sony Pictures Entertainment to avoid its data breach fate, from treating APTs seriously to getting the right executives on board.
Posted: 26 Oct 2015 | Published: 26 Oct 2015

Trend Micro
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement