IT Management  >   Systems Operations  >   Security  >  

Virus Threats

RSS Feed    Add to Google    Add to My Yahoo!
Virus Threats Reports
 
Network Security: Making the Jump to 100GbE
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper explores the need for moving network security closer to the core and the need to make the jump from the once-standard 10GbE to 100GbE. View now to learn how to increase East-West visibility to catch masked malware as the data center becomes more virtualized.
Posted: 07 May 2015 | Published: 01 Apr 2015

Fortinet, Inc.

Security Strong Enough for Today's Threats
sponsored by IBM
VIDEO: In this brief video, discover the essential components of a security system strong enough for today's threat landscape.
Posted: 21 May 2015 | Premiered: 09 Sep 2014

IBM

Securing Your End of Life Servers While Enabling a Safe Transition
sponsored by Trend Micro
WHITE PAPER: Access this white paper to learn how to continue running your end of life platform while avoiding common security risks and preparing to upgrade your system.
Posted: 07 May 2015 | Published: 30 Apr 2015

Trend Micro

Critical Role of DNS Calls for Vulnerability Mitigation
sponsored by Neustar┬«
WHITE PAPER: This white paper explores the current state of DNS threats, vulnerabilities, and 3 most common attacks.
Posted: 29 May 2015 | Published: 13 May 2015

Neustar®

Ransomware Security Threats: Defending Against CryptoLocker & CryptoWall
sponsored by Trend Micro
WEBCAST: This webcast can help you keep yourself safe from ransomware and mitigate it if you do come under attack.
Posted: 11 May 2015 | Premiered: Jan 21, 2015

Trend Micro

Secure Mobile Access: Overcoming Today's BYOD Obstacles
sponsored by Dell Software
WHITE PAPER: This white paper examines the need for a holistic security strategy to address the end-to-end mobility and BYOD challenges.
Posted: 28 May 2015 | Published: 19 May 2015

Dell Software

Infographic: Statistics for Cyber Security
sponsored by IBM
WHITE PAPER: This infographic helps you learn what you're up against by giving you some numbers and statistics behind the growing problem of cybercrime.
Posted: 27 May 2015 | Published: 31 Dec 2014

IBM

Work Smarter, Not Harder, to Secure Your Applications
sponsored by Hewlett-Packard Company
WHITE PAPER: This paper features Maverick research from Gartner analyst, Joseph Feiman: Stop Protecting Your Apps: It's Time for Apps to Protect Themselves.
Posted: 18 May 2015 | Published: 01 May 2015

Hewlett-Packard Company

Securing the Mobile-First Experience
sponsored by HID
RESOURCE: This brief infographic outlines the current mobile security challenges landscape and today's popular defense strategies being implemented. Access now to explore the benefits of several new and alternative approaches.
Posted: 26 May 2015 | Published: 01 Apr 2015

HID

Detect, Prevent, and Manage Cyber-Security Incidents
sponsored by Hewlett-Packard Limited
WHITE PAPER: This white paper suggests how you can partner with security services for more advanced and effective threat detection and mitigation.
Posted: 26 May 2015 | Published: 30 Apr 2015

Hewlett-Packard Limited
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement