IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Push Messaging

RSS Feed   
Push Messaging Reports
 
Cyber Insecurity: Managing Threats from Within
sponsored by Proofpoint
WHITE PAPER: Data breaches are having increasingly disastrous consequences for business. Explore the frequency and severity of people-centric data breaches in this Cyber Insecurity: Managing Threats from Within white paper.
Posted: 09 Oct 2019 | Published: 09 Oct 2019

Proofpoint

Your Guide to VDI on Hyper-converged Infrastructure
sponsored by Nutanix
EBOOK: Hyper-converged infrastructure (HCI) offers one means of achieving predictable cost, performance, and capacity scaling for VDI—yet with a plethora of product options, how can you be sure which architecture will suit your company’s workload demands best? Download the following e-book to VDI on HCI to find out.
Posted: 16 Oct 2019 | Published: 16 Oct 2019

Nutanix

Cloud Security Guardian Integration with Microsoft Azure 2019
sponsored by Barracuda
VIDEO: Designed to integrate with Microsoft Azure 2019 and to leverage built-in security and alerting features, the Cloud Security Guardian will help you establish end-to-end cloud security visibility—a critical requirement in this era of increasing compliance mandates. Tune in now to see how it works.
Posted: 08 Oct 2019 | Premiered: 31 Jul 2019

Barracuda

Major Financial Services Company Looks to SolarWinds for an Enterprise-grade, Unified IT Monitoring Solution
sponsored by SolarWinds, Inc.
CASE STUDY: View this case study to learn how a financial service company used a unified IT monitoring solution to drastically improve uptimes, earn full-stack infrastructure visibility and more – across over 300 network devices, 3,000 servers, and four data centers.
Posted: 17 Oct 2019 | Published: 31 Oct 2017

SolarWinds, Inc.

The Value of Moving PKI to the Cloud
sponsored by Keyfactor
WHITE PAPER: Cloud-based Public Key Infrastructure (PKI) is becoming a top-of-mind investment for many businesses. Read on to see the data and significance of this security shift while highlighting the value of moving complex, costly in-house PKI to a streamlined cloud-based solution.
Posted: 18 Oct 2019 | Published: 18 Oct 2019

Keyfactor

Securing Office 365 Against Data Loss and Advanced Threats
sponsored by Datto, Inc.
WEBCAST: Learn how to establish complete and comprehensive Office 365 data protection for your customers by tuning into this webcast. Topics covered include: Office 365 native protection vs. what falls under your jurisdiction, how to painlessly restore lost user data, and more.
Posted: 15 Oct 2019 | Premiered: Oct 15, 2019

Datto, Inc.

Ten Tips For Achieving Digital Innovation In The Workplace
sponsored by Dropbox
WHITE PAPER: Employees expect workplace flexibility, agility and an environment that encourages collaboration—fortunately, IT leaders have the opportunity to attract and retain talent and contribute to general employee happiness. Read this this white paper to learn how to fuel growth and innovation with streamlined business processes and automation.
Posted: 18 Oct 2019 | Published: 18 Oct 2019

Dropbox

The Practical Executive's Guide to Data Loss Prevention
sponsored by Forcepoint
WHITE PAPER: As more and more companies are encouraging their employees to work from anywhere, on any device, data loss prevention (DLP) has evolved from an option to a requirement. Download this whitepaper for insightful guidance on implementing DLP.
Posted: 11 Oct 2019 | Published: 11 Oct 2019

Forcepoint

Security for Microservices: Best Practices
sponsored by Aporeto
WHITE PAPER: Moving to a microservices framework and adoption of cloud-native services introduces new security considerations for developers, line-of-business owners, and security teams. In this white paper, explore best practices for security in a microservices environment.
Posted: 18 Oct 2019 | Published: 18 Oct 2019

Aporeto

JetBrains Extends Security with Cisco Stealthwatch Cloud on AWS
sponsored by Amazon Web Services
CASE STUDY: When JetBrains migrated to Amazon Web Services (AWS), it realized it needed a solution to combat security risks. In this case study, learn how JetBrains was able to achieve visibility across their AWS environment, continuous monitoring for suspicious activity and much more with Cisco Stealthwatch Cloud on AWS.
Posted: 09 Oct 2019 | Published: 09 Oct 2019

Amazon Web Services
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement