IT Management  >   Systems Operations  >   Security  >  

Virus Threats

RSS Feed   
Virus Threats Reports
Introducing The F5 Advanced WAF
sponsored by F5 Networks
WEBCAST: The F5 Advanced Web Application Firewall (WAF) provides a set of security features that can help keep your Web Applications safe from attack. In this webcast, John Wagnon, Senior Solution Developer at DevCentral, outlines many of the key features offered in the F5 Advanced WAF.
Posted: 08 May 2019 | Premiered: Apr 30, 2018

F5 Networks

New Survey Reveals Small and Mid-Size Enterprises Are Making Big Strides in Cybersecurity, But Big Decisions Loom Ahead
sponsored by Armor
RESEARCH CONTENT: Recently, many SMEs have shown an increased awareness of the potential impact that a security breach could have on their organization. As a result, many SMEs have invested significant efforts towards improving their cybersecurity. In this research report, explore the advancements organizations have made and challenges they still face.
Posted: 06 May 2019 | Published: 31 Oct 2018


8 Real-World Use Cases for Security Orchestration, Automation and Response (SOAR)
sponsored by Swimlane
WHITE PAPER: Security operations present an escalating series of management challenges. However, SOAR platforms can help security teams automate tasks and aggregate data. This allows security teams to handle more tasks while decreasing mean times to resolution. In this white paper, explore 8 real-world uses cases for SOAR platforms.
Posted: 16 Apr 2019 | Published: 16 Apr 2019


Hybrid Cloud Company Armors its Defenses
sponsored by Armor
CASE STUDY: In today's business environment, security must be an integral consideration for all organizations. With that in mind, a large technology service provider wanted to ensure that its infrastructure was properly secured. In this case study, explore why the service provider chose to implement Armor Anywhere, Armor's cloud-based security-as-a-service.
Posted: 30 Apr 2019 | Published: 30 Apr 2019


Security Challenges for State and Local Government IT Departments
sponsored by Dell EMC
RESOURCE: Today's overall increasing security risks have threatened the state and local government IT departments. This has impacted their functionality. In this infographic, learn about the many different security challenges government IT departments face.
Posted: 15 May 2019 | Published: 15 May 2019

Dell EMC

8 Essential Elements of a Comprehensive IT Security Strategy
sponsored by Involta
WHITE PAPER: IT security measures should be at the forefront of every business owner's mind. Improving cybersecurity to prevent data loss and protect critical business and financial data is essential. In this white paper, explore 8 elements that play an important role in developing and maintaining secure IT environments.
Posted: 21 May 2019 | Published: 21 May 2019


Top 5 Critical Alerts You Need for IT Security
sponsored by ManageEngine
WHITE PAPER: Analyzing log data and identifying which security events are of concern among thousands of routine events can be a challenge, especially if you aren't sure which events to track. In this white paper, explore a list of 5 critical events your organization should be on the lookout for.
Posted: 13 May 2019 | Published: 13 May 2019


Dawn of the Terrorbit Era
sponsored by NetScout Systems, Inc.
RESEARCH CONTENT: The global cyberthreat landscape continues to evolve, unleashing increasingly sophisticated and persistent attack techniques at internet scale. In this NETSCOUT Threat Intelligence report, explore key findings.
Posted: 09 May 2019 | Published: 09 May 2019

NetScout Systems, Inc.

Armor File Integrity Monitoring (FIM)
sponsored by Armor
WHITE PAPER: When traditional firewalls or IDS fail to prevent or detect a threat, monitoring operating system and application changes at the host level provides an additional layer of security. In this white paper, learn more about Armor's File Integrity Monitoring which watches your hosts for unauthorized activities to detect potential threats.
Posted: 01 May 2019 | Published: 01 May 2019


Achieving Hitrust Certification with Impenetrable Cloud Security
sponsored by Armor
CASE STUDY: As a SaaS provider of population health and care management technology and services, Medecision made the commitment to meet the most rigorous standards and protocols available, including achieving HITRUST CSF certification. In this case study, learn how Medicison was able to achieve the certification by deploying Armor Anywhere.
Posted: 06 May 2019 | Published: 06 May 2019


About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.


All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement