Windows Vulnerabilities Reports

The Seven Common Challenges of Administering Active Directory
sponsored by NetIQ Europe
WHITE PAPER: This white paper will out line the 7 common challenges you might face while trying to implement Active Directory securely. You will also learn some helpful tips that will assist you with these difficulties.
Posted: 18 May 2011 | Published: 18 May 2011

NetIQ Europe

5 Steps to a Successful Vista Migration: How Network Assurance Minimizes Business Risk
sponsored by Lumeta Corporation
PODCAST: Join IT expert David Arbeitel and listen to the Podcast, "5 Steps to a Successful Vista Migration: How Network Assurance Minimizes Business Risk" and discover how to make the most of your Vista migration.
Posted: 27 Apr 2007 | Premiered: Apr 27, 2007, 09:00 EDT (13:00 GMT)

Lumeta Corporation

SharePoint E-Zine Volume 11: Managing Documents By Content Type
sponsored by TechTarget Search Windows Server
EZINE: SharePoint has made some parts of content management much easier, but it falls short on document classification. In this month's issue, learn different approaches to categorize documents. The best time to apply security to SharePoint is right from the start. Zero in on access control, application security and content security as part of your...
Posted: 19 Jun 2009 | Published: 19 Jun 2009

TechTarget Search Windows Server

E-Book: Technical Guide on Combatting Emerging Web Threats
sponsored by TechTarget Security
EBOOK: Attackers are almost exclusively targeting enterprises with hacks perpetrated over the Web. As most enterprises move operations and functionality online, Web-based applications become a tempting threat vector for cybercriminals. Read this e-book for a look at Web threats and vulnerabilities – and how to protect your organization against them.
Posted: 09 Jun 2010 | Published: 09 Jun 2010

TechTarget Security

Information Security Magazine: May 2010 - Data: Do you know where it’s going?
sponsored by Information Security Magazine
EZINE: This month’s cover story deals with database activity monitoring and how to keep vigilant watch over your data. Other features cover new stealthy and sophisticated malware that aims at hijacking business banking accounts and Windows 7 operating system security improvements. Read on and take a look at all three featured articles and much more.
Posted: 03 May 2010 | Published: 03 May 2010

Information Security Magazine

E-Book: Technical Guide on Vulnerability Management
sponsored by TechTarget Security
EBOOK: SearchSecurity.com presents a comprehensive guide to vulnerability management. Our experts cover all the angles with authoritative technical advice on: application security testing methods; leveraging vulnerability assessment results; analysis and correlation of pen test results; Windows patch management; and how to best assess your security state.
Posted: 03 Jun 2010 | Published: 03 Jun 2010

TechTarget Security

Webroot SecureAnywhere Business Endpoint Protection vs. Seven Competitors (February 2014)
sponsored by OpenText Security Solutions
WHITE PAPER: This resource outlines testing results of 8 competing endpoint security software products and breaks down how each perform in relation to a wide variety of criteria.
Posted: 18 Apr 2014 | Published: 28 Feb 2014

OpenText Security Solutions

Active Directory Maintenance & Cleanup
sponsored by STEALTHbits Technologies
WHITE PAPER: Active Directory (AD) plays a central role for many organizations’ Windows Domain architecture and access control, so it’s essential to maintain a clean and correct AD to avoid any potential security and operational risks. View now to explore the risks and challenges of AD that organizations face today and uncover best practices to address them.
Posted: 23 Apr 2012 | Published: 20 Apr 2012

STEALTHbits Technologies

How to Limit the Risk of Attack on your XP Assets
sponsored by AT&T Cybersecurity
WEBCAST: This webinar describes the new threats facing organizations that are still using Windows XP now that support for the operating system has ended. It also highlights a solution that can be implemented to make sure Windows XP assets remain protected.
Posted: 08 May 2014 | Premiered: May 8, 2014

AT&T Cybersecurity

BareTail
sponsored by Bare Metal Software
TRIAL SOFTWARE: Free real-time log file monitoring tool for Windows.
Posted: 05 Dec 2006 | Premiered: 19 Jun 2007

All resources sponsored by Bare Metal Software