Windows Security Research
-
E-Book: Technical Guide on Combatting Emerging Web Threats
Sponsored by: TechTarget SecurityAttackers are almost exclusively targeting enterprises with hacks perpetrated over the Web. As most enterprises move operations and functionality online, Web-based applications become a tempting threat vector for cybercriminals. Read this e-book for a look at Web threats and vulnerabilities – and how to protect your organization against them.
-
E-Book: Technical Guide on Vulnerability Management
Sponsored by: TechTarget SecuritySearchSecurity.com presents a comprehensive guide to vulnerability management. Our experts cover all the angles with authoritative technical advice on: application security testing methods; leveraging vulnerability assessment results; analysis and correlation of pen test results; Windows patch management; and how to best assess your security state.
-
Information Security Magazine: May 2010 - Data: Do you know where it’s going?
Sponsored by: Information Security MagazineThis month’s cover story deals with database activity monitoring and how to keep vigilant watch over your data. Other features cover new stealthy and sophisticated malware that aims at hijacking business banking accounts and Windows 7 operating system security improvements. Read on and take a look at all three featured articles and much more.
-
Presentation Transcript: What Windows 7 Professional Offers Your Business
Sponsored by: Dell, Inc. and Microsoft Windows 7Uncertain of how the new features of Windows 7 Professional can benefit your organization? This presentation transcript explores several of the new capabilities of this operating system in-depth. Learn how to leverage these new features to improve efficiency, productivity and security
-
Guide: Patch Authority Ultimate
Sponsored by: ScriptLogic CorporationWith exploits for known vulnerabilities unleashed on the Internet within as little as 5 days from the release of new patches from Microsoft, it is imperative your desktops and servers be regularly updated to keep them safe from attack.
-
SharePoint E-Zine Volume 11: Managing Documents By Content Type
Sponsored by: TechTarget Search Windows ServerSharePoint has made some parts of content management much easier, but it falls short on document classification. In this month's issue, learn different approaches to categorize documents. The best time to apply security to SharePoint is right from the start. Zero in on access control, application security and content security as part of your...
-
A Guide to Utilizing Virtualization in a Disaster Recovery Strategy
Sponsored by: Dell EMC and MicrosoftIn this expert E-Guide, brought to you by SearchServerVirtualization.com and Dell, you will discover the steps essential for effectively integrating server virtualization into your disaster recovery strategy.
-
Presentation Transcript: Managing Windows with IT Search
Sponsored by: SplunkRead this presentation transcript of the “Managing Windows with IT Search” podcast with Windows Specialist and Director of Product Management at Splunk, Johnathon Cervelli, to learn how IT Search can help you dramatically simplify Windows Systems Management.
-
The Modern Security Threat and Regulatory Compliance
Sponsored by: Bytware, Inc.SOX-style legislation and the evolving threat from viruses is challenging the ability of IT management to keep up with security requirements. This webcast explains why so many systems are at risk and what you can do to mitigate these threats.
-
Patch Management 2.0: Evolving Your Patch Management Technology to Proactively Combat Security Challenges
Sponsored by: LumensionRead this white paper to get up-to-date technology alternatives to help better manage your patch management environment.
-
Best Practices for Windows Vista Planning, Migration, and Ongoing Management
Sponsored by: Symantec CorporationIt is vital to ensure PC system and data security during migration to Windows Vista. This white paper highlights considerations that must be addressed over the entire migration process.
-
5 Steps to a Successful Vista Migration: How Network Assurance Minimizes Business Risk
Sponsored by: Lumeta CorporationJoin IT expert David Arbeitel and listen to the Podcast, "5 Steps to a Successful Vista Migration: How Network Assurance Minimizes Business Risk" and discover how to make the most of your Vista migration.
-
Symantec Internet Security Threat Report
Sponsored by: Symantec CorporationThis Internet Security Threat Report details the issues related to online fraud and examines current trends in the internet security landscape. Read this paper today and learn about the future of internet attacks and what to expect in the coming years.
-
Mail Security for Microsoft Exchange Server
Sponsored by: Symantec CorporationThis Podcast explores the key features and benefits of Mail Security 5.0 including a new user interface, an enhanced content filtering rules, new user group based rules, and windows cluster support.
-
BareTail
Sponsored by: Bare Metal SoftwareFree real-time log file monitoring tool for Windows.
-
Justifying an Active Directory Disaster Recovery Plan
Sponsored by: Dell SoftwareActive Directory (AD) downtime can be disastrous to organizations. Learn the risks, costs and unexpected consequences associated with AD interruptions, the importance of an AD recovery plan and the pitfalls of relying solely on native recovery methods.
-
PrimalScript Professional 4.0
Sponsored by: SAPIEN Technologies, Inc.PrimalScript Professional 4.0 now with a host of advanced features targeted at reducing script development time and effort and introducing PrimalScope, PrimalScript's truly built-in debugger for Windows scripting.
-
Internet Security and Acceleration Server 2006
Sponsored by: MicrosoftISA Server 2006 from Microsoft helps protect your IT environment from Internet-based threats while providing your users with fast and secure remote access to applications and data.
-
Microsoft Forefront Security for Exchange Server Beta
Sponsored by: MicrosoftForefront Security for Exchange helps protect your email infrastructure from infection and downtime through an approach that emphasizes layered defenses, optimization of Exchange Server performance and availability, and simplified management control.
-
Symantec IM Manager
Sponsored by: Symantec CorporationSymantec IM Manager 8.2 seamlessly manages, secures, logs, and archives corporate instant-messaging traffic with certified support for public and enterprise IM networks.
-
GFI LANguard Security Event Log Monitor - Downloads
Sponsored by: GFI SoftwareGFI LANguard S.E.L.M. ships with a security event analysis engine which takes into account the type of security event, security level of each computer, when event occurred, role of computer and its operation system.
-
How to Perform Network-wide Security Event Log Monitoring
Sponsored by: GFI SoftwareThis white paper explains the need to monitor security event logs network-wide and how you can achieve this using GFI LANguard S.E.L.M.