IT Management  >   Systems Operations  >   Security  >   Application Security  >  

Windows Vista Security

RSS Feed   
Windows Vista Security Reports
 
How to Limit the Risk of Attack on your XP Assets
sponsored by AlienVault
WEBCAST: This webinar describes the new threats facing organizations that are still using Windows XP now that support for the operating system has ended. It also highlights a solution that can be implemented to make sure Windows XP assets remain protected.
Posted: 08 May 2014 | Premiered: May 8, 2014

AlienVault

Windows 8 Security: Know All You Need to Know
sponsored by IBM
EBOOK: This expert e-book describes how to best take advantage of the security features in Windows 8 and 8.1.
Posted: 06 Jan 2015 | Published: 06 Jan 2015

IBM

The Seven Common Challenges of Administering Active Directory
sponsored by NetIQ Europe
WHITE PAPER: This white paper will out line the 7 common challenges you might face while trying to implement Active Directory securely. You will also learn some helpful tips that will assist you with these difficulties.
Posted: 18 May 2011 | Published: 18 May 2011

NetIQ Europe

How to collect Windows Event logs to detect a targeted attack
sponsored by M86 Security
EGUIDE: Targeted attacks are growing, and eventually your enterprise will be a target. In this e-guide, expert Richard Bejtlich covers how to collect Windows Event logs to detect an intrusion.
Posted: 13 Jul 2011 | Published: 13 Jul 2011

M86 Security

GFI LANguard Security Event Log Monitor - Downloads
sponsored by GFI Software
TRIAL SOFTWARE: GFI LANguard S.E.L.M. ships with a security event analysis engine which takes into account the type of security event, security level of each computer, when event occurred, role of computer and its operation system.
Posted: 02 May 2006 | Premiered: 01 May 2006

GFI Software

Presentation Transcript: The Real Deal about Windows Server 2008 R2, Part 1 - Latest Security Enhancements
sponsored by Dell EMC and Microsoft
PRESENTATION TRANSCRIPT: This presentation transcript compares the first and second releases of Windows Server 2008. Discover security improvements to this enhanced operating system and learn how they impact your small or mid-sized business.
Posted: 19 Nov 2010 | Published: 19 Nov 2010

Dell EMC and Microsoft

Windows Shopping: Will 8.1 Meet Your Security Needs?
sponsored by SearchSecurity.com
EBOOK: Microsoft Windows 8.1 attempts to respond to a demand for new security features for network endpoints and user devices. This technical guide offers a concise review of its security features and whether MS Windows 8.1 fills its promises.
Posted: 12 Sep 2014 | Published: 12 Sep 2014

SearchSecurity.com

SharePoint E-Zine Volume 11: Managing Documents By Content Type
sponsored by SearchWinIT
EZINE: SharePoint has made some parts of content management much easier, but it falls short on document classification. In this month's issue, learn different approaches to categorize documents. The best time to apply security to SharePoint is right from the start. Zero in on access control, application security and content security as part of your...
Posted: 19 Jun 2009 | Published: 19 Jun 2009

SearchWinIT

Make the Most of Windows 10: How User Training Can Help
sponsored by Citrix
EGUIDE: Download this e-guide to find out how proper training can help make the most of your Windows 10 deployment.
Posted: 25 Oct 2017 | Published: 20 Oct 2017

Citrix

Active Directory Maintenance & Cleanup
sponsored by STEALTHbits Technologies
WHITE PAPER: Active Directory (AD) plays a central role for many organizations’ Windows Domain architecture and access control, so it’s essential to maintain a clean and correct AD to avoid any potential security and operational risks. View now to explore the risks and challenges of AD that organizations face today and uncover best practices to address them.
Posted: 23 Apr 2012 | Published: 20 Apr 2012

STEALTHbits Technologies
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement