Windows Vulnerabilities Reports

SharePoint E-Zine Volume 11: Managing Documents By Content Type
sponsored by TechTarget Search Windows Server
EZINE: SharePoint has made some parts of content management much easier, but it falls short on document classification. In this month's issue, learn different approaches to categorize documents. The best time to apply security to SharePoint is right from the start. Zero in on access control, application security and content security as part of your...
Posted: 19 Jun 2009 | Published: 19 Jun 2009

TechTarget Search Windows Server

Presentation Transcript: What Windows 7 Professional Offers Your Business
sponsored by Dell, Inc. and Microsoft Windows 7
PRESENTATION TRANSCRIPT: Uncertain of how the new features of Windows 7 Professional can benefit your organization? This presentation transcript explores several of the new capabilities of this operating system in-depth. Learn how to leverage these new features to improve efficiency, productivity and security
Posted: 04 Mar 2010 | Published: 24 Feb 2010

Dell, Inc. and Microsoft Windows 7

Secunia PSI Country Report - Q4 2013 Germany
sponsored by Secunia
WHITE PAPER: This informative report explores the current state of cybercrime targeting German PCs and what can be done to stop them.
Posted: 20 Mar 2014 | Published: 20 Mar 2014

Secunia

DLL Side-loading: A Thorn in the Side of the Anti-Virus Industry
sponsored by FireEye
WHITE PAPER: This informative whitepaper explores the history of DLL side-loading and its role in the malware arena – affecting your enterprise security.
Posted: 30 May 2014 | Published: 30 May 2014

FireEye

Five Windows 10 security risks that are easy to overlook
sponsored by vmware airwatch
EGUIDE: As more organizations upgrade from Windows 7, the time is right to think about how to create the perfect Windows 10 security setup. But before upgrading to Windows 10, understand these 5 security risks that are easy to overlook.
Posted: 27 Mar 2017 | Published: 17 Mar 2017

vmware airwatch

Windows 10: Top 10 Features IT Pros Will Love
sponsored by Microsoft
EGUIDE: This expert e-guide describes the 10 most crucial Windows 10 features that IT pros need to know about, including mobile device management, work folders that regulate access to corporate content, the return of the Start Menu, and 7 more.
Posted: 10 Feb 2016 | Published: 03 Feb 2016

Microsoft

Internet Security and Acceleration Server 2006
sponsored by Microsoft
TRIAL SOFTWARE: ISA Server 2006 from Microsoft helps protect your IT environment from Internet-based threats while providing your users with fast and secure remote access to applications and data.
Posted: 26 Sep 2006 | Premiered: 25 Sep 2006

Microsoft

Mail Security for Microsoft Exchange Server
sponsored by Symantec Corporation
PODCAST: This Podcast explores the key features and benefits of Mail Security 5.0 including a new user interface, an enhanced content filtering rules, new user group based rules, and windows cluster support.
Posted: 19 Feb 2007 | Premiered: Feb 1, 2007

Symantec Corporation

Computer Weekly 8 November 2011: Read this week's issue of the UK's leading technology publication, with the news, analysis and opinion that matters to IT managers.
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we report from the London Cyberspace Conference where world leaders gathered to discuss internet security. We examine the tools available to help migrate from Windows XP to Windows 7; and hear from Royal Bank of Scotland about how to build a business case for virtual desktops. Download the new issue now.
Posted: 07 Nov 2011 | Published: 04 Nov 2011

TechTarget ComputerWeekly.com

Technical Guide on Windows Security
sponsored by TechTarget Security
EGUIDE: SearchSecurity.com presents a comprehensive guide to Windows security. Our experts help you discover all of the security enhancements made to Windows 7, including BitLocker, AppLocker, DirectAccess and the Win7 Firewall. You’ll learn how to use these tools to help your organization better manage your Windows security efforts.
Posted: 04 Nov 2011 | Published: 04 Nov 2011

TechTarget Security