IT Management  >   Systems Operations  >   Security  >  

Zero Day Threats

RSS Feed    Add to Google    Add to My Yahoo!
Zero Day Threats Reports
Growing Cyber Threats Challenging Cost Reduction as Reason To Use Managed Services
sponsored by IBM
EGUIDE: This expert guide delves deeper into the results of a recent survey finding that over a third of IT operations in mid-sized companies will make the move to an outsourced managed service over the next 5 years as IT directors chase greater security and reduced costs.
Posted: 23 Oct 2015 | Published: 23 Oct 2015


Cybersecurity Experts Brittle Security Systems Need Overhaul
sponsored by Unisys
EGUIDE: In this expert e-guide, learn why your security strategy will continue to fail if you do not prioritize the continuous implementation and upgrading of sophisticated security controls and the ongoing education of users and CXOs.
Posted: 19 Nov 2015 | Published: 04 Nov 2015


The 10 Essential Elements for a Secure Enterprise Mobility Strategy
sponsored by Citrix
WHITE PAPER: This white paper presents 10 key points to consider as you develop your enterprise mobility strategy—from security to BYOD. Unlock the full potential of your mobility, and develop a comprehensive and security-conscious mobility strategy for your organization.
Posted: 28 Oct 2015 | Published: 31 Oct 2014


Enhance Security Visibility to Improve Incident Response and Compliance
sponsored by OpenDNS
WHITE PAPER: In this white paper, explore the limitations of traditional security log measures such as firewalls, AD, and web proxies and why it's imperative to gain complete visibility over DNS and your network. View now to learn how to eliminate network security blind spots and enable your SIEM to detect masked cybersecurity threats.
Posted: 08 Oct 2015 | Published: 30 Sep 2015


Exposing The Unknown: How Sandboxing Technology Fights Modern Threats
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Access this white paper to learn how sandboxing has evolved to fight modern cybercrime and how the technology could secure your business.
Posted: 13 Nov 2015 | Published: 30 Jun 2015

Check Point Software Technologies Ltd.

Five Reason to Adopt a Managed Security Service
sponsored by MASERGY
WHITE PAPER: This resource presents the top five benefits you can enjoy by adopting an MSSP. Find out what an MSSP can offer you and decide if an MSSP is the right solution to your cybersecurity dilemma.
Posted: 30 Oct 2015 | Published: 30 Oct 2015


APT Attacks and Ways to Protect Your Network
sponsored by Proofpoint, Inc.
EGUIDE: In this expert e-guide, examine several approaches to protecting your network from APT attacks, including global threat intelligence.
Posted: 06 Nov 2015 | Published: 29 Oct 2015

Proofpoint, Inc.

Secure Your Private Cloud Infrastructure
sponsored by Oracle Corporation
WEBCAST: In this webcast, take a closer look at one private cloud infrastructure and how it can help you protect your sensitive data.
Posted: 17 Nov 2015 | Premiered: Nov 11, 2015

Oracle Corporation

5 Steps for Stronger Advanced Threat Protection
sponsored by Blue Coat Systems
WHITE PAPER: This resource outlines the 5 steps your organization can take to protect against advanced threats and strengthen your line of defenses. Learn how to take a network-based approach for 20/20 visibility into all threats, and access more security best practices.
Posted: 23 Oct 2015 | Published: 31 Dec 2014

Blue Coat Systems

Case Study: How West Virginia University Reduced Its Sensitive Data Footprint
sponsored by Identity Finder, LLC
WEBCAST: In the following webinar, chief information security officer Alex Jalso describes how he reduced his sensitive data footprint in his organization and suggests best practices for reducing your own.
Posted: 12 Oct 2015 | Premiered: Oct 12, 2015

Identity Finder, LLC
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement