IT Management  >   Systems Operations  >   Security  >   Application Security  >  

Windows Security

RSS Feed   
ALSO CALLED: Windows Vulnerabilities, Windows Flaws, Microsoft Windows Security, Windows Vista Security
DEFINITION: Microsoft Antigen is a set of programs that provides security and e-mail filtering for network servers. Antigen can provide layered, multiple-scan protection against viruses, worms, spyware and other forms of malware. Antigen can also filter e-mail to minimize inappropriate content and malicious attachments according to user or administrator preferences. There are several versions of the package including:  … 

Windows Security definition sponsored by SearchEnterpriseDesktop.com, powered by WhatIs.com an online computer dictionary
Windows Security Reports
1 - 25 of 57 Matches Previous Page  |  Next Page
Key Considerations when Making the Move to Office 365
sponsored by Smarsh
WHITE PAPER: In this white paper, discover key considerations firms should address to make their Office 365 migration more efficient and cost effective as well as how to deploy Office 365 while maintaining regulatory compliance.
Posted: 26 Sep 2019 | Published: 26 Sep 2019

Smarsh

ZS Solves Office 365 Security Issue with PortSys TAC
sponsored by PortSys
CASE STUDY: ZS, a consulting and professional services firm, faced a challenge when making the transition to Microsoft Office 365. In order to solve their problem, ZS decided to implement PortSys' Zero Trust Access Management product, Total Access Control (TAC). In this case study, explore the benefits that ZS saw after implementing TAC.
Posted: 13 Aug 2019 | Published: 13 Aug 2019

PortSys

10 Questions to Ask About Your Office 365 Deployment
sponsored by Mimecast
ANALYST REPORT: Providing robust email security is a critical best practice for any organization in an era of increasingly sophisticated email-borne attacks. While Office 365 provides some native protections, there are limitations to consider. In this research report, explore key issues to consider when evaluating the email security capabilities of Office 365.
Posted: 05 Aug 2019 | Published: 30 Jun 2019

Mimecast

Is Microsoft O365 Good Enough Protection & Recovery Webinar?
sponsored by Mimecast
WEBCAST: Many organizations are asking themselves, "Is Microsoft Office 365 good enough protection and recovery?" According to Gartner, investing in third-party tools for "faster, more-flexible recovery options" is a good idea. In this webinar, Shane Harris and Glenn Brown of Mimecast discuss where your biggest risks are and how to mitigate them.
Posted: 01 Aug 2019 | Premiered: Aug 1, 2019

Mimecast

Why Training Is Not Enough to Stop Phishing Emails
sponsored by Inky Technology
RESOURCE: According to the FBI, phishing-based email accounted for more than $12 billion in fraud in just the last 5 years. In this blog, learn how Inky Phish Fence can help your organization prevent phishing attacks by scanning every internal and external email.
Posted: 27 Jun 2019 | Published: 27 Jun 2019

Inky Technology

Are You Getting Phishing Attacks in Outlook?
sponsored by Inky Technology
RESOURCE: IT security and infrastructure personnel are seeing a high volume of phishing attacks every day. This is why phishing alerts and anti-phishing software are so important. However, even if your organization uses phishing alerts in Outlook, they might not be solving the problem. In this blog, learn how INKY can help solve your phishing attack problem.
Posted: 26 Jun 2019 | Published: 26 Jun 2019

Inky Technology

Proofpoint Helps Largest Nordic Building Association OBOS Construct Superior Email Security
sponsored by Proofpoint
CASE STUDY: From its beginnings, OBOS has become the largest Nordic cooperative building association. However, as OBOS began to grow they needed to expand their email security protection. In this case study, learn why OBOS decided to deploy Proofpoint's Enterprise Protection and Targeted Attack Protection.
Posted: 10 Jun 2019 | Published: 10 Jun 2019

Proofpoint

Stripping The Malware Threat Out Of Powershell With Ensilo
sponsored by enSilo
WHITE PAPER: While intended for system administration and the automation of daily maintenance and management tasks, PowerShell has become a preferred tool for cybercriminals. In this white paper, learn more about how PowerShell is being leveraged by cyberattackers and how enSilo can protect your endpoints against this increasing threat.
Posted: 21 May 2019 | Published: 04 Apr 2018


Conversational Office 365 Risk Mitigation
sponsored by Mimecast
EBOOK: Although Microsoft has more control over Office 365 because it's hosted in their cloud, there are still gaps. There are risks. And these reside primarily in the areas of security, data assurance, continuity and backup/recovery. In this e-book, learn more about these risks and discover ways to mitigate them.
Posted: 15 Apr 2019 | Published: 15 Apr 2019

Mimecast

Updates: The next evolution of operating systems
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide we take a look at how operating systems are evolving with the help of continuous updates. Learn about how the Spectre and Meltdown microprocessor flaws have led to improved, more secure processors being released and how Microsoft is evolving its Windows desktop operating system.
Posted: 16 Jan 2018 | Published: 16 Jan 2018

ComputerWeekly.com

Make the Most of Windows 10: How User Training Can Help
sponsored by Citrix
EGUIDE: Download this e-guide to find out how proper training can help make the most of your Windows 10 deployment.
Posted: 25 Oct 2017 | Published: 20 Oct 2017

Citrix

Five Windows 10 security risks that are easy to overlook
sponsored by vmware airwatch
EGUIDE: As more organizations upgrade from Windows 7, the time is right to think about how to create the perfect Windows 10 security setup. But before upgrading to Windows 10, understand these 5 security risks that are easy to overlook.
Posted: 27 Mar 2017 | Published: 17 Mar 2017

vmware airwatch

Why a Windows Security Scan Isn't Enough to Protect your Workstations
sponsored by HP & Intel
EGUIDE: There are a lot of moving parts, and there's no simple fix for Windows security. That said, there are things you can do to reduce desktop vulnerabilities. This e-guide helps you understand the common flaws exploited in Windows security scans and provides 4 ways to take vulnerability management to the next level.
Posted: 24 Aug 2016 | Published: 24 Aug 2016

HP & Intel

Windows 10: Top 10 Features IT Pros Will Love
sponsored by Microsoft
EGUIDE: This expert e-guide describes the 10 most crucial Windows 10 features that IT pros need to know about, including mobile device management, work folders that regulate access to corporate content, the return of the Start Menu, and 7 more.
Posted: 10 Feb 2016 | Published: 03 Feb 2016

Microsoft

Windows 8 Security: Know All You Need to Know
sponsored by IBM
EBOOK: This expert e-book describes how to best take advantage of the security features in Windows 8 and 8.1.
Posted: 06 Jan 2015 | Published: 06 Jan 2015

IBM

Windows Shopping: Will 8.1 Meet Your Security Needs?
sponsored by SearchSecurity.com
EBOOK: Microsoft Windows 8.1 attempts to respond to a demand for new security features for network endpoints and user devices. This technical guide offers a concise review of its security features and whether MS Windows 8.1 fills its promises.
Posted: 12 Sep 2014 | Published: 12 Sep 2014

SearchSecurity.com

DLL Side-loading: A Thorn in the Side of the Anti-Virus Industry
sponsored by FireEye
WHITE PAPER: This informative whitepaper explores the history of DLL side-loading and its role in the malware arena – affecting your enterprise security.
Posted: 30 May 2014 | Published: 30 May 2014

FireEye

Audits, Compliance and Security: IT Pros Share Their Experience
sponsored by Dell Software
WHITE PAPER: In this white paper, IT pros share how a smarter approach to auditing enabled them to strengthen their security posture and simplify their change monitoring process.
Posted: 16 May 2014 | Published: 16 May 2014

Dell Software

How to Limit the Risk of Attack on your XP Assets
sponsored by AT&T Cybersecurity
WEBCAST: This webinar describes the new threats facing organizations that are still using Windows XP now that support for the operating system has ended. It also highlights a solution that can be implemented to make sure Windows XP assets remain protected.
Posted: 08 May 2014 | Premiered: May 8, 2014

AT&T Cybersecurity

Windows XP Migration: Protect and Secure Critical Data
sponsored by Commvault
WHITE PAPER: This informative whitepaper explores strategies for protecting and securing your data when migrating from Windows XP to your new operating system.
Posted: 30 Apr 2014 | Published: 30 Apr 2014

Commvault

Webroot SecureAnywhere Business Endpoint Protection vs. Seven Competitors (February 2014)
sponsored by Webroot
WHITE PAPER: This resource outlines testing results of 8 competing endpoint security software products and breaks down how each perform in relation to a wide variety of criteria.
Posted: 18 Apr 2014 | Published: 28 Feb 2014

Webroot

Secunia Vulnerability Review 2014
sponsored by Secunia
WHITE PAPER: This guide reviews vulnerabilities for 2014 and discusses key figures and facts from a global IT security perspective.
Posted: 21 Mar 2014 | Published: 26 Feb 2014

Secunia

Secunia PSI Country Report - Q4 2013 Germany
sponsored by Secunia
WHITE PAPER: This informative report explores the current state of cybercrime targeting German PCs and what can be done to stop them.
Posted: 20 Mar 2014 | Published: 20 Mar 2014

Secunia

The Windows XP Era's Coming to an End: What You Can Do to Prepare
sponsored by Citrix
WHITE PAPER: This brief resource reviews the security threats and cost issues you will face following the end of support date.
Posted: 13 Dec 2013 | Published: 13 Dec 2013

Citrix

SharePoint Security Should Not Be an Afterthought
sponsored by Thawte Inc.
EGUIDE: This expert guide from SearchSecurity.com will help you understand the top security issues facing SharePoint and how to ensure that you are deploying this system securely. Read on to learn more.
Posted: 20 May 2013 | Published: 20 May 2013

Thawte Inc.
1 - 25 of 57 Matches Previous Page    1 2 3    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement