IT Management  >   Systems Operations  >   Security  >   Application Security  >  

Windows Security

RSS Feed   
ALSO CALLED: Windows Vulnerabilities, Windows Flaws, Microsoft Windows Security, Windows Vista Security
DEFINITION: Microsoft Antigen is a set of programs that provides security and e-mail filtering for network servers. Antigen can provide layered, multiple-scan protection against viruses, worms, spyware and other forms of malware. Antigen can also filter e-mail to minimize inappropriate content and malicious attachments according to user or administrator preferences. There are several versions of the package including:  … 

Windows Security definition sponsored by SearchEnterpriseDesktop.com, powered by WhatIs.com an online computer dictionary
Windows Security Reports
1 - 25 of 55 Matches Previous Page  |  Next Page
Why Your Company Needs Third-Party Security for Office 365
sponsored by Symantec
RESEARCH CONTENT: Office 365 is a robust platform; however it has some significant security limitations. This Osterman Research Report indicates that many third-party security technologies often present a better alternative to some of the native security capabilities. In this report, learn how third-party vendors can help to bridge Office 365's security gaps.
Posted: 24 Apr 2019 | Published: 28 Feb 2019

Symantec

Conversational Office 365 Risk Mitigation
sponsored by Mimecast
EBOOK: Although Microsoft has more control over Office 365 because it's hosted in their cloud, there are still gaps. There are risks. And these reside primarily in the areas of security, data assurance, continuity and backup/recovery. In this e-book, learn more about these risks and discover ways to mitigate them.
Posted: 15 Apr 2019 | Published: 15 Apr 2019

Mimecast

Windows Server on Azure: The Ultimate Guide
sponsored by Microsoft
WHITE PAPER: A lot of business functions rely on Windows Server. While this isn't a surprising fact considering its place as the OS of choice for most enterprises, it's starting to enter its final days of compatibility. Find out how to leverage your existing Windows Server expertise to give your organization a leg up in the age of cloud computing.
Posted: 09 Apr 2019 | Published: 09 Apr 2019

Microsoft

Enhancing Security for State and Local Government Agencies
sponsored by Lenovo
RESOURCE: The digital revolution has impacted every type of organization, including state and local government entities. There is also a greater focus on cybersecurity issues, since many government agencies have access to private or sensitive information. In this article, learn about how the state and local government are improving their cybersecurity.
Posted: 26 Mar 2019 | Published: 26 Mar 2019

Lenovo

Meeting Corporate Requirements for Comprehensive Security for Users and Their Devices
sponsored by Lenovo
RESOURCE: Perhaps the single most common point of attack is user devices. With inconsistent security tools and many PCs running insecure software stacks, there are numerous ways these devices are compromised. In this article, learn how combining more secure operating systems and devices that automate key security processes can help protect your organization.
Posted: 21 Mar 2019 | Published: 21 Mar 2019

Lenovo

Basics (and Beyond) of Patch Management
sponsored by ConnectWise
EBOOK: With new vulnerabilities being discovered almost daily, keeping systems up-to-date with patches is often a full-time job, especially in larger environments. In this eBook, learn about the 6 step patch management process for reconciling the deployment state of an operating system and third party software updates.
Posted: 05 Mar 2019 | Published: 05 Mar 2019

ConnectWise

Protecting Linux, AIX, and Windows File Workloads
sponsored by Rubrik
WHITE PAPER: This white paper provides a walkthrough of using a backup method that protects Linux, AIX, and Windows file sets by automating how copy data is stored, managed, and recovered—no matter if data is running on physical or virtual machines. Read on for more.
Posted: 24 Jul 2018 | Published: 24 Jul 2018

Rubrik

Updates: The next evolution of operating systems
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide we take a look at how operating systems are evolving with the help of continuous updates. Learn about how the Spectre and Meltdown microprocessor flaws have led to improved, more secure processors being released and how Microsoft is evolving its Windows desktop operating system.
Posted: 16 Jan 2018 | Published: 16 Jan 2018

ComputerWeekly.com

CW Buyer's Guide: Windows 8
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 11 page buyer's guide looks at the implications of Windows 8 for corporate IT.
Posted: 23 Oct 2012 | Published: 23 Oct 2012

ComputerWeekly.com

Make the Most of Windows 10: How User Training Can Help
sponsored by Citrix
EGUIDE: Download this e-guide to find out how proper training can help make the most of your Windows 10 deployment.
Posted: 25 Oct 2017 | Published: 20 Oct 2017

Citrix

Five Windows 10 security risks that are easy to overlook
sponsored by vmware airwatch
EGUIDE: As more organizations upgrade from Windows 7, the time is right to think about how to create the perfect Windows 10 security setup. But before upgrading to Windows 10, understand these 5 security risks that are easy to overlook.
Posted: 27 Mar 2017 | Published: 17 Mar 2017

vmware airwatch

Why a Windows Security Scan Isn't Enough to Protect your Workstations
sponsored by HP & Intel
EGUIDE: There are a lot of moving parts, and there's no simple fix for Windows security. That said, there are things you can do to reduce desktop vulnerabilities. This e-guide helps you understand the common flaws exploited in Windows security scans and provides 4 ways to take vulnerability management to the next level.
Posted: 24 Aug 2016 | Published: 24 Aug 2016

HP & Intel

Windows 10: Top 10 Features IT Pros Will Love
sponsored by Microsoft
EGUIDE: This expert e-guide describes the 10 most crucial Windows 10 features that IT pros need to know about, including mobile device management, work folders that regulate access to corporate content, the return of the Start Menu, and 7 more.
Posted: 10 Feb 2016 | Published: 03 Feb 2016

Microsoft

Windows 8 Security: Know All You Need to Know
sponsored by IBM
EBOOK: This expert e-book describes how to best take advantage of the security features in Windows 8 and 8.1.
Posted: 06 Jan 2015 | Published: 06 Jan 2015

IBM

Windows Shopping: Will 8.1 Meet Your Security Needs?
sponsored by SearchSecurity.com
EBOOK: Microsoft Windows 8.1 attempts to respond to a demand for new security features for network endpoints and user devices. This technical guide offers a concise review of its security features and whether MS Windows 8.1 fills its promises.
Posted: 12 Sep 2014 | Published: 12 Sep 2014

SearchSecurity.com

DLL Side-loading: A Thorn in the Side of the Anti-Virus Industry
sponsored by FireEye
WHITE PAPER: This informative whitepaper explores the history of DLL side-loading and its role in the malware arena – affecting your enterprise security.
Posted: 30 May 2014 | Published: 30 May 2014

FireEye

Audits, Compliance and Security: IT Pros Share Their Experience
sponsored by Dell Software
WHITE PAPER: In this white paper, IT pros share how a smarter approach to auditing enabled them to strengthen their security posture and simplify their change monitoring process.
Posted: 16 May 2014 | Published: 16 May 2014

Dell Software

How to Limit the Risk of Attack on your XP Assets
sponsored by AT&T Cybersecurity
WEBCAST: This webinar describes the new threats facing organizations that are still using Windows XP now that support for the operating system has ended. It also highlights a solution that can be implemented to make sure Windows XP assets remain protected.
Posted: 08 May 2014 | Premiered: May 8, 2014

AT&T Cybersecurity

Windows XP Migration: Protect and Secure Critical Data
sponsored by Commvault
WHITE PAPER: This informative whitepaper explores strategies for protecting and securing your data when migrating from Windows XP to your new operating system.
Posted: 30 Apr 2014 | Published: 30 Apr 2014

Commvault

Webroot SecureAnywhere Business Endpoint Protection vs. Seven Competitors (February 2014)
sponsored by Webroot
WHITE PAPER: This resource outlines testing results of 8 competing endpoint security software products and breaks down how each perform in relation to a wide variety of criteria.
Posted: 18 Apr 2014 | Published: 28 Feb 2014

Webroot

Secunia Vulnerability Review 2014
sponsored by Secunia
WHITE PAPER: This guide reviews vulnerabilities for 2014 and discusses key figures and facts from a global IT security perspective.
Posted: 21 Mar 2014 | Published: 26 Feb 2014

Secunia

Secunia PSI Country Report - Q4 2013 Germany
sponsored by Secunia
WHITE PAPER: This informative report explores the current state of cybercrime targeting German PCs and what can be done to stop them.
Posted: 20 Mar 2014 | Published: 20 Mar 2014

Secunia

The Windows XP Era's Coming to an End: What You Can Do to Prepare
sponsored by Citrix
WHITE PAPER: This brief resource reviews the security threats and cost issues you will face following the end of support date.
Posted: 13 Dec 2013 | Published: 13 Dec 2013

Citrix

SharePoint Security Should Not Be an Afterthought
sponsored by Thawte Inc.
EGUIDE: This expert guide from SearchSecurity.com will help you understand the top security issues facing SharePoint and how to ensure that you are deploying this system securely. Read on to learn more.
Posted: 20 May 2013 | Published: 20 May 2013

Thawte Inc.

Active Directory Maintenance & Cleanup
sponsored by STEALTHbits Technologies
WHITE PAPER: Active Directory (AD) plays a central role for many organizations’ Windows Domain architecture and access control, so it’s essential to maintain a clean and correct AD to avoid any potential security and operational risks. View now to explore the risks and challenges of AD that organizations face today and uncover best practices to address them.
Posted: 23 Apr 2012 | Published: 20 Apr 2012

STEALTHbits Technologies
1 - 25 of 55 Matches Previous Page    1 2 3    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement