EGUIDE:
Targeted attacks are growing, and eventually your enterprise will be a target. In this e-guide, expert Richard Bejtlich covers how to collect Windows Event logs to detect an intrusion.
EZINE:
In this week's Computer Weekly, we report from the London Cyberspace Conference where world leaders gathered to discuss internet security. We examine the tools available to help migrate from Windows XP to Windows 7; and hear from Royal Bank of Scotland about how to build a business case for virtual desktops. Download the new issue now.
PRODUCT LITERATURE:
This white paper explains the need to monitor security event logs network-wide and how you can achieve this using GFI LANguard S.E.L.M.
EBOOK:
Microsoft Windows 8.1 attempts to respond to a demand for new security features for network endpoints and user devices. This technical guide offers a concise review of its security features and whether MS Windows 8.1 fills its promises.
EBOOK:
SearchSecurity.com presents a comprehensive guide to vulnerability management. Our experts cover all the angles with authoritative technical advice on: application security testing methods; leveraging vulnerability assessment results; analysis and correlation of pen test results; Windows patch management; and how to best assess your security state.
TRIAL SOFTWARE:
Symantec IM Manager 8.2 seamlessly manages, secures, logs, and archives corporate instant-messaging traffic with certified support for public and enterprise IM networks.
TRIAL SOFTWARE:
Forefront Security for Exchange helps protect your email infrastructure from infection and downtime through an approach that emphasizes layered defenses, optimization of Exchange Server performance and availability, and simplified management control.