IT Management  >   Systems Operations  >   Security  >   Application Security  >  

Windows Flaws

RSS Feed    Add to Google    Add to My Yahoo!
Windows Flaws Reports
 
A Closer Look at Microsoft Office 365 Security
sponsored by Rackspace
EGUIDE: This expert guide reviews the pros and cons of Office 365's security features. Access now to learn where Office 365's security falls short of your needs and what you can do about it.
Posted: 16 Nov 2015 | Published: 16 Nov 2015

Rackspace

Become a Technology Partner with Citrix and Expand Your Business Reach
sponsored by Citrix
PODCAST: In this podcast, you will discover how to expand your business reach and mobilize your enterprise with Citrix mobility and Windows 10. Get the insider's look at how Windows 10 can transform your business, as well as 10 tips to ensure your W10 readiness.
Posted: 17 Nov 2015 | Premiered: Nov 6, 2015

Citrix

How to collect Windows Event logs to detect a targeted attack
sponsored by M86 Security
EGUIDE: Targeted attacks are growing, and eventually your enterprise will be a target. In this e-guide, expert Richard Bejtlich covers how to collect Windows Event logs to detect an intrusion.
Posted: 13 Jul 2011 | Published: 13 Jul 2011

M86 Security

Evaluating Business Continuity Solutions: Ten Factors to Consider Before Buying
sponsored by Asempra Technologies, Inc.
WHITE PAPER: In order to evaluate a business continuity solution, you should have properly defined metrics. This paper describes ten parameters that should be assessed when evaluating and measuring business continuity solutions before you make your purchase.
Posted: 25 Apr 2007 | Published: 01 Apr 2007

Asempra Technologies, Inc.

Operating System Migration - The 5 Essential Steps
sponsored by RES Software
WHITE PAPER: Throughout this white paper you will learn in five easy steps how the traditional challenges of migrating from one operating system to another can become a thing of the past by using a user workspace management solution.
Posted: 19 Feb 2010 | Published: 19 Feb 2010

RES Software

Presentation Transcript: The Real Deal about Windows Server 2008 R2, Part 1 - Latest Security Enhancements
sponsored by Dell and Microsoft
PRESENTATION TRANSCRIPT: This presentation transcript compares the first and second releases of Windows Server 2008. Discover security improvements to this enhanced operating system and learn how they impact your small or mid-sized business.
Posted: 19 Nov 2010 | Published: 19 Nov 2010

Dell and Microsoft

Technical Guide on Windows Security
sponsored by SearchSecurity.com
EGUIDE: SearchSecurity.com presents a comprehensive guide to Windows security. Our experts help you discover all of the security enhancements made to Windows 7, including BitLocker, AppLocker, DirectAccess and the Win7 Firewall. You’ll learn how to use these tools to help your organization better manage your Windows security efforts.
Posted: 04 Nov 2011 | Published: 04 Nov 2011

SearchSecurity.com

Webroot SecureAnywhere Business Endpoint Protection vs. Seven Competitors (February 2014)
sponsored by Webroot
WHITE PAPER: This resource outlines testing results of 8 competing endpoint security software products and breaks down how each perform in relation to a wide variety of criteria.
Posted: 18 Apr 2014 | Published: 28 Feb 2014

Webroot

Windows XP Migration: Protect and Secure Critical Data
sponsored by Commvault
WHITE PAPER: This informative whitepaper explores strategies for protecting and securing your data when migrating from Windows XP to your new operating system.
Posted: 30 Apr 2014 | Published: 30 Apr 2014

Commvault

Information Security Magazine: May 2010 - Data: Do you know where it’s going?
sponsored by Information Security Magazine
EZINE: This month’s cover story deals with database activity monitoring and how to keep vigilant watch over your data. Other features cover new stealthy and sophisticated malware that aims at hijacking business banking accounts and Windows 7 operating system security improvements. Read on and take a look at all three featured articles and much more.
Posted: 03 May 2010 | Published: 03 May 2010

Information Security Magazine
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement