IT Management  >   Systems Operations  >   Security  >  

Zero Day Threats

RSS Feed    Add to Google    Add to My Yahoo!
Zero Day Threats Reports
 
App-ID Tech Brief: Traffic classification that identifies applications traversing your network
sponsored by Palo Alto Networks
WHITE PAPER: In this technology brief, learn about App-ID, a patented traffic classification technology that identifies applications traversing your network. Find out how App-ID enables creation and enforcement of safe application enablement policies and brings increased application visibility and control back to the firewall.
Posted: 29 Nov 2017 | Published: 29 Nov 2017

Palo Alto Networks

What your Network Security Solution Should Include
sponsored by Aruba Networks
RESOURCE: Learn what's needed to build a highly secure network that provides the control, visibility and reliability needed to deliver a secure computing experience from the edge, to the core, to the cloud.
Posted: 28 Nov 2017 | Published: 28 Nov 2017

Aruba Networks

How to Build a High Performance Secure Network
sponsored by Aruba Networks
RESOURCE: Inside this resource learn how Aruba's UEBA tool, Introspect, helps detect attacks by spotting small changes in behavior that are often indicative of attacks that have evaded traditional security defenses.
Posted: 30 Nov 2017 | Published: 30 Nov 2017

Aruba Networks

Insuring the uninsurable: Is cyber insurance worth its salt?
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This article in our Royal Holloway Information Security Thesis series discusses the risks and benefits of cyber insurance and outlines steps businesses can take to make better informed risk mitigation decisions.
Posted: 12 Sep 2017 | Published: 12 Sep 2017

ComputerWeekly.com

What you Need to Know About Cloud Security
sponsored by Arctic Wolf Networks, Inc.
EBOOK: In this e-book, gain a stronger understanding of the 3 most prominent types of cloud services and the questions your organization should ask when building a network security platform.
Posted: 25 Oct 2017 | Published: 25 Oct 2017

Arctic Wolf Networks, Inc.

Making a DDoS Protection Plan: 8 Best Practices
sponsored by Akamai Technologies
WHITE PAPER: Having a DDoS protection plan in place is all it takes to stave off the panic when an attack hits, and help you return to business as usual. Inside, learn 8 steps you can take to put this plan in place.
Posted: 26 Sep 2017 | Published: 26 Sep 2017

Akamai Technologies

How to Gain Visibility and Control of your Networks, Users and Devices
sponsored by Aruba Networks
RESOURCE: Learn what's needed to build a highly secure network that provides the control, visibility and reliability needed to deliver a secure computing experience from the edge, to the core, to the cloud.
Posted: 28 Nov 2017 | Published: 28 Nov 2017

Aruba Networks

10 Network Security Tools and Tests Everyone Should Use
sponsored by Global Knowledge
WHITE PAPER: Discover the 10 network security tools and tests that you should consider implementing and know how to use.
Posted: 01 Dec 2017 | Published: 01 Dec 2017

Global Knowledge

The Smart, Secure Cloud for India: Learn How Google Cloud Infrastructure Keeps Your Data Secure
sponsored by Google Cloud
WHITE PAPER: Google Cloud's Mumbai cloud region provides faster data transfers and reduced latency to the India region. Download the whitepaper for a look under the hood of Google's infrastructure security, and explicit detail on the process we go through to build and maintain GCP regions. Download the report and find out more now.
Posted: 25 Sep 2017 | Published: 25 Sep 2017

Google Cloud

Data + Security = A Most Unvirtuous Relationship
sponsored by Delphix
RESOURCE: Learn about the emergence of DataOps as well as how different data security methodologies and tools are changing to handle modern threats to growing volumes of data and personal information.
Posted: 21 Nov 2017 | Published: 21 Nov 2017

Delphix
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement