EGUIDE:
Targeted attacks are growing, and eventually your enterprise will be a target. In this e-guide, expert Richard Bejtlich covers how to collect Windows Event logs to detect an intrusion.
EBOOK:
SearchSecurity.com presents a comprehensive guide to vulnerability management. Our experts cover all the angles with authoritative technical advice on: application security testing methods; leveraging vulnerability assessment results; analysis and correlation of pen test results; Windows patch management; and how to best assess your security state.
TRIAL SOFTWARE:
ISA Server 2006 from Microsoft helps protect your IT environment from Internet-based threats while providing your users with fast and secure remote access to applications and data.
EGUIDE:
SearchSecurity.com presents a comprehensive guide to Windows security. Our experts help you discover all of the security enhancements made to Windows 7, including BitLocker, AppLocker, DirectAccess and the Win7 Firewall. You’ll learn how to use these tools to help your organization better manage your Windows security efforts.
EGUIDE:
In this expert E-Guide, brought to you by SearchServerVirtualization.com and Dell, you will discover the steps essential for effectively integrating server virtualization into your disaster recovery strategy.
TRIAL SOFTWARE:
Forefront Security for Exchange helps protect your email infrastructure from infection and downtime through an approach that emphasizes layered defenses, optimization of Exchange Server performance and availability, and simplified management control.
WEBCAST:
SOX-style legislation and the evolving threat from viruses is challenging the ability of IT management to keep up with security requirements. This webcast explains why so many systems are at risk and what you can do to mitigate these threats.
WHITE PAPER:
This informative whitepaper explores the history of DLL side-loading and its role in the malware arena – affecting your enterprise security.