Windows Security White Papers
-
Updates: The next evolution of operating systems
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide we take a look at how operating systems are evolving with the help of continuous updates. Learn about how the Spectre and Meltdown microprocessor flaws have led to improved, more secure processors being released and how Microsoft is evolving its Windows desktop operating system.
-
E-Book: Technical Guide on Combatting Emerging Web Threats
Sponsored by: TechTarget SecurityAttackers are almost exclusively targeting enterprises with hacks perpetrated over the Web. As most enterprises move operations and functionality online, Web-based applications become a tempting threat vector for cybercriminals. Read this e-book for a look at Web threats and vulnerabilities – and how to protect your organization against them.
-
MicroScope – December 2022: Dealing with rising prices
Sponsored by: MicroScopeWith prices rising, many are looking at what costs to cut – yet in the channel, the opposite might prove for better business. In this issue, read about how to navigate the cost issue, learn about the growing area of security, and learn about how to create a more appealing employment experience to attract talent
-
Make the Most of Windows 10: How User Training Can Help
Sponsored by: CitrixDownload this e-guide to find out how proper training can help make the most of your Windows 10 deployment.
-
Five Windows 10 security risks that are easy to overlook
Sponsored by: vmware airwatchAs more organizations upgrade from Windows 7, the time is right to think about how to create the perfect Windows 10 security setup. But before upgrading to Windows 10, understand these 5 security risks that are easy to overlook.
-
Why a Windows Security Scan Isn't Enough to Protect your Workstations
Sponsored by: HP & IntelThere are a lot of moving parts, and there's no simple fix for Windows security. That said, there are things you can do to reduce desktop vulnerabilities. This e-guide helps you understand the common flaws exploited in Windows security scans and provides 4 ways to take vulnerability management to the next level.
-
Windows 10: Top 10 Features IT Pros Will Love
Sponsored by: MicrosoftThis expert e-guide describes the 10 most crucial Windows 10 features that IT pros need to know about, including mobile device management, work folders that regulate access to corporate content, the return of the Start Menu, and 7 more.
-
Windows 8 Security: Know All You Need to Know
Sponsored by: IBMThis expert e-book describes how to best take advantage of the security features in Windows 8 and 8.1.
-
Windows Shopping: Will 8.1 Meet Your Security Needs?
Sponsored by: TechTarget SecurityMicrosoft Windows 8.1 attempts to respond to a demand for new security features for network endpoints and user devices. This technical guide offers a concise review of its security features and whether MS Windows 8.1 fills its promises.
-
DLL Side-loading: A Thorn in the Side of the Anti-Virus Industry
Sponsored by: FireEyeThis informative whitepaper explores the history of DLL side-loading and its role in the malware arena – affecting your enterprise security.
-
Audits, Compliance and Security: IT Pros Share Their Experience
Sponsored by: Dell SoftwareIn this white paper, IT pros share how a smarter approach to auditing enabled them to strengthen their security posture and simplify their change monitoring process.
-
Webroot SecureAnywhere Business Endpoint Protection vs. Seven Competitors (February 2014)
Sponsored by: OpenText Security SolutionsThis resource outlines testing results of 8 competing endpoint security software products and breaks down how each perform in relation to a wide variety of criteria.
-
Secunia Vulnerability Review 2014
Sponsored by: SecuniaThis guide reviews vulnerabilities for 2014 and discusses key figures and facts from a global IT security perspective.
-
Secunia PSI Country Report - Q4 2013 Germany
Sponsored by: SecuniaThis informative report explores the current state of cybercrime targeting German PCs and what can be done to stop them.
-
The Windows XP Era's Coming to an End: What You Can Do to Prepare
Sponsored by: CitrixThis brief resource reviews the security threats and cost issues you will face following the end of support date.
-
SharePoint Security Should Not Be an Afterthought
Sponsored by: Thawte Inc.This expert guide from SearchSecurity.com will help you understand the top security issues facing SharePoint and how to ensure that you are deploying this system securely. Read on to learn more.
-
Active Directory Maintenance & Cleanup
Sponsored by: STEALTHbits TechnologiesActive Directory (AD) plays a central role for many organizations’ Windows Domain architecture and access control, so it’s essential to maintain a clean and correct AD to avoid any potential security and operational risks. View now to explore the risks and challenges of AD that organizations face today and uncover best practices to address them.
-
Windows 7 Migrations Provide the Ideal Time to Lock Down Endpoints
Sponsored by: ViewfinityRather than deploying yet another desktop operating system without addressing endpoint security problems, the smarter choice may be to deal with the issue once and for all during your Windows 7 system migrations. In this resource, explore 6 frequently asked questions to help you on your way.
-
Computer Weekly 8 November 2011: Read this week's issue of the UK's leading technology publication, with the news, analysis and opinion that matters to IT managers.
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we report from the London Cyberspace Conference where world leaders gathered to discuss internet security. We examine the tools available to help migrate from Windows XP to Windows 7; and hear from Royal Bank of Scotland about how to build a business case for virtual desktops. Download the new issue now.
-
Technical Guide on Windows Security
Sponsored by: TechTarget SecuritySearchSecurity.com presents a comprehensive guide to Windows security. Our experts help you discover all of the security enhancements made to Windows 7, including BitLocker, AppLocker, DirectAccess and the Win7 Firewall. You’ll learn how to use these tools to help your organization better manage your Windows security efforts.
-
How to collect Windows Event logs to detect a targeted attack
Sponsored by: M86 SecurityTargeted attacks are growing, and eventually your enterprise will be a target. In this e-guide, expert Richard Bejtlich covers how to collect Windows Event logs to detect an intrusion.
-
The Seven Common Challenges of Administering Active Directory
Sponsored by: NetIQ EuropeThis white paper will out line the 7 common challenges you might face while trying to implement Active Directory securely. You will also learn some helpful tips that will assist you with these difficulties.
-
Presentation Transcript: The Real Deal about Windows Server 2008 R2, Part 1 - Latest Security Enhancements
Sponsored by: Dell EMC and MicrosoftThis presentation transcript compares the first and second releases of Windows Server 2008. Discover security improvements to this enhanced operating system and learn how they impact your small or mid-sized business.
-
Elektroskandia Achieves 65% Annual Savings by Moving To a Modern, Cost-Effective Windows Environment
Sponsored by: Micro Focus, LtdRead this case study to learn how Elektroskandia Achieves 65% Annual Savings by Moving To a Modern, Cost-Effective Windows Environment.
-
Presentation Transcript: The Real Deal about Windows Server 2008 R2, Part 1 - Latest Security Enhancements
Sponsored by: Dell EMC and MicrosoftThis presentation transcript compares the first and second releases of Windows Server 2008. Discover security improvements to this enhanced operating system and learn how they impact your small or mid-sized business.