Microsoft Windows Security Reports

SharePoint E-Zine Volume 11: Managing Documents By Content Type
sponsored by TechTarget Search Windows Server
EZINE: SharePoint has made some parts of content management much easier, but it falls short on document classification. In this month's issue, learn different approaches to categorize documents. The best time to apply security to SharePoint is right from the start. Zero in on access control, application security and content security as part of your...
Posted: 19 Jun 2009 | Published: 19 Jun 2009

TechTarget Search Windows Server

Presentation Transcript: Managing Windows with IT Search
sponsored by Splunk
PRESENTATION TRANSCRIPT: Read this presentation transcript of the “Managing Windows with IT Search” podcast with Windows Specialist and Director of Product Management at Splunk, Johnathon Cervelli, to learn how IT Search can help you dramatically simplify Windows Systems Management.
Posted: 01 Apr 2009 | Published: 01 Apr 2009

Splunk

Secunia PSI Country Report - Q4 2013 Germany
sponsored by Secunia
WHITE PAPER: This informative report explores the current state of cybercrime targeting German PCs and what can be done to stop them.
Posted: 20 Mar 2014 | Published: 20 Mar 2014

Secunia

A Guide to Utilizing Virtualization in a Disaster Recovery Strategy
sponsored by Dell EMC and Microsoft
EGUIDE: In this expert E-Guide, brought to you by SearchServerVirtualization.com and Dell, you will discover the steps essential for effectively integrating server virtualization into your disaster recovery strategy.
Posted: 20 Apr 2009 | Published: 20 Apr 2009

Dell EMC and Microsoft

Active Directory Maintenance & Cleanup
sponsored by STEALTHbits Technologies
WHITE PAPER: Active Directory (AD) plays a central role for many organizations’ Windows Domain architecture and access control, so it’s essential to maintain a clean and correct AD to avoid any potential security and operational risks. View now to explore the risks and challenges of AD that organizations face today and uncover best practices to address them.
Posted: 23 Apr 2012 | Published: 20 Apr 2012

STEALTHbits Technologies

Five Windows 10 security risks that are easy to overlook
sponsored by vmware airwatch
EGUIDE: As more organizations upgrade from Windows 7, the time is right to think about how to create the perfect Windows 10 security setup. But before upgrading to Windows 10, understand these 5 security risks that are easy to overlook.
Posted: 27 Mar 2017 | Published: 17 Mar 2017

vmware airwatch

Information Security Magazine: May 2010 - Data: Do you know where it’s going?
sponsored by Information Security Magazine
EZINE: This month’s cover story deals with database activity monitoring and how to keep vigilant watch over your data. Other features cover new stealthy and sophisticated malware that aims at hijacking business banking accounts and Windows 7 operating system security improvements. Read on and take a look at all three featured articles and much more.
Posted: 03 May 2010 | Published: 03 May 2010

Information Security Magazine

Internet Security and Acceleration Server 2006
sponsored by Microsoft
TRIAL SOFTWARE: ISA Server 2006 from Microsoft helps protect your IT environment from Internet-based threats while providing your users with fast and secure remote access to applications and data.
Posted: 26 Sep 2006 | Premiered: 25 Sep 2006

Microsoft

Why a Windows Security Scan Isn't Enough to Protect your Workstations
sponsored by HP & Intel
EGUIDE: There are a lot of moving parts, and there's no simple fix for Windows security. That said, there are things you can do to reduce desktop vulnerabilities. This e-guide helps you understand the common flaws exploited in Windows security scans and provides 4 ways to take vulnerability management to the next level.
Posted: 24 Aug 2016 | Published: 24 Aug 2016

HP & Intel

Webroot SecureAnywhere Business Endpoint Protection vs. Seven Competitors (February 2014)
sponsored by OpenText Security Solutions
WHITE PAPER: This resource outlines testing results of 8 competing endpoint security software products and breaks down how each perform in relation to a wide variety of criteria.
Posted: 18 Apr 2014 | Published: 28 Feb 2014

OpenText Security Solutions