Search Results for: firewall webcast

How Can You Avoid a Web Security Breach? It's All in the Preparation
In this e-guide, from SearchCompliance.com, discover simple steps in order to avoid web security breaches.

TechTarget Security

Unified Insights on One Unified Threat Management Market Product
This e-guide looks at one market leader in the UTM category. Learn what experts are saying about WatchGuard's features, product specs, and more.

WatchGuard Technologies, Inc.

Surviving Ransomware - What You Need to Know
Ransomware attacks dominate headlines in a seemingly endless parade of compromises in numerous sectors. From Trojan.Gpcoder, the first modern ransomware exploit, to high-profile hits on Colonial Pipeline, it’s becoming clear that security practitioners are up against formidable foes. Read this white paper to learn how to survive ransomware.

TOPICS: .NET
Palo Alto Networks

Surviving Ransomware— What You Need to Know
Many have heard about the high-profile hits on Colonial Pipeline and JBS Foods, but ransomware attacks are erupting into a seemingly endless parade of compromises in numerous sectors. Download this eBook for a reference point to understand the basics of ransomware, common attack methods, and best practices in the unfortunate event of an attack.

TOPICS: .NET
Palo Alto Networks

Mobile Network Security Remains an Enterprise Challenge
This expert e-guide addresses the needs enterprises need to meet to successfully deploy a secure, available, and lightning-fast mobile network.

Appthority

Your September Issue of Information Security Magazine– Readers’ Choice Awards
In this month’s issue we provide our 5th annual Readers’ Choice Awards for the best security products in the market. We’ve talked with over 1,500 Information Security readers to find what their favorite products are and why. Read through to see which ones take the gold.

Information Security Magazine

Presentation Transcript: How to Secure Your Mobile Devices
In this presentation transcript, Paul Pearston, a Senior Security Engineer at Dell SecureWorks, discusses the most serious security threats to mobile devices and recommends specific approaches for securing the mobile organization.

Dell SecureWorks

Find the right EFSS to secure employee file sharing
This e-guide gives you a way to solve your enterprise file synchronization and sharing needs.

Trend Micro, Inc.

Presentation Transcript: Go Forth & Comply - New Virtualization Guidelines from the PCI Council
In this presentation transcript, principal security consultant at Dell SecureWorks, discuss the issues confronting organizations who wish to use virtualization technologies with their Cardholder Data Environment, summarize and clarify the recommendations from the PCI council and more.

Dell SecureWorks

Seven Things That You Can Do If You Want to Embrace the Consumerization of IT
Discover what you can do to embrace the consumerization of IT, letting your employees pick devices and applications of their choice while maintaining the security your organization needs.

Good Technology