IT Management  >   Systems Operations  >   Security  >  

Web Threats

RSS Feed    Add to Google    Add to My Yahoo!
Web Threats Reports
4 Features Your Security Strategy Needs in a Virtual Environment
sponsored by Kaspersky Lab
WHITE PAPER: This report discusses four features that a virtual desktop infrastructure (VDI) security solution must include. Discover ways to maintain the benefits of virtualization while also meeting the unique needs of VDI.
Posted: 24 Oct 2016 | Published: 24 Oct 2016

Kaspersky Lab

Designing a Multilayered, In-Depth Defense Approach to Authentication
sponsored by Dell Software
WHITE PAPER: This white paper details the logical and administrative layers of security that you should implement to improve your authentication and authorization security posture. Read on to uncover features you should look for in third-party solutions to supplement native security mechanisms.
Posted: 29 Sep 2016 | Published: 29 Sep 2016

Dell Software

Focus: Securing new technology
sponsored by
EGUIDE: The scarcity of information security professionals with the required depth and breadth of experience is one of the biggest challenges facing businesses. As businesses seek to gain competitive edge through digital transformation, they are increasingly exposing themselves to increasing risk of cyber attack.
Posted: 29 Sep 2016 | Published: 29 Sep 2016

Best Practices for Secure and Efficient Onboarding and Off-boarding
sponsored by RES Software
WHITE PAPER: Onboarding and off-boarding can be a nightmare when it comes to account and network permissions. Learn why provisioning identities and access in today's enterprise environment is inefficient and how to leverage the benefits of a workforce that consistently has the digital resources it needs.
Posted: 12 Oct 2016 | Published: 12 Oct 2016

RES Software

Cyber Attackers Follow Companies into the Cloud
sponsored by Alert Logic
ANALYST REPORT: Learn the trends of cloud security, what the data from over 80,000 security incidents have taught, and what the future might hold for safeguarding your data in the cloud.
Posted: 28 Sep 2016 | Published: 31 Dec 2015

Alert Logic

Best Practices For Multi-Factor Authentication
sponsored by Synchronoss
WHITE PAPER: Learn how multi-factor authentication bolsters security and is exponentially more secure than passwords alone. Discover the fundamental problem with relying on passwords, how to choose a cloud service that meets your industry's guidelines, and more.
Posted: 25 Oct 2016 | Published: 25 Oct 2016


Inside the 2016 Verizon Data Breach Investigations Report
sponsored by Intel Security
WEBCAST: Join security experts Marc Spitler, Senior Manager at Verizon Security Research, and Raj Samani, CTO for EMEA at Intel Security, as they go over findings from the 2016 Data Breach Investigation Report.
Posted: 26 Sep 2016 | Premiered: Sep 26, 2016

Intel Security

Security Testing Practices and Priorities
sponsored by Trustwave
WHITE PAPER: This report shows the survey results from Osterman Research about security testing within various organizations. Discover which security issues organizations had experienced most frequently within the past year and how vulnerable many of these organizations were.
Posted: 03 Oct 2016 | Published: 30 Sep 2016


Ransomware, Phishing and APTs: What Can be Done About These Growing Threats
sponsored by Barracuda Networks
WEBCAST: Hear from industry experts Michael Osterman, Industry Analyst at Osterman Research, and Aj Murray, IT manager at Hayward Tyler, as well as a panel of others on the rise of, and what can be done about, ransomware, phishing, and APTs.
Posted: 20 Oct 2016 | Premiered: Oct 20, 2016

Barracuda Networks

Ask The Analyst: Key Elements of an Effective Security Program
sponsored by AlienVault
WEBCAST: In this webcast, join Barbara Call of IDG and Forrester Security Analyst Joseph Blankenship to learn how organizations should assess their security intelligence program, validate the effectiveness of security monitoring tools, and plan for the future.
Posted: 12 Oct 2016 | Premiered: Jun 28, 2016

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement