Windows Security White Papers, Videos, Webcasts, Podcasts and Case Studies

Java Development Research Library

SEARCH the Research Library: WHAT'S POPULAR
IT Management  >  Systems Operations  >  Security  >  

Windows Security

 All   White Papers   Multimedia   IT Downloads 
Limit Results:
Sort by:
1 - 15 of 65 Matches
DLL Side-loading: A Thorn in the Side of the Anti-Virus Industry
sponsored by FireEye
White Paper: | Posted: 30 May 2014
Published:30 May 2014
Summary:This informative whitepaper explores the history of DLL side-loading and its role in the malware arena – affecting your enterprise security.
Get This Now

Audits, Compliance and Security: IT Pros share their experience
sponsored by Dell Software
White Paper: | Posted: 16 May 2014
Published:16 May 2014
Summary:Changes to your Windows environment can be dangerous to your network and applications, but event logging and change reporting can be time-consuming and ineffective. Fortunately, this helpful white paper introduces a way to audit changes from a central web-based console, saving time, reducing risk, and quickly identifying security violations.
Get This Now
Dell Software

Windows® XP Migration: Protect and Secure Critical Data
sponsored by CommVault Systems, Inc.
White Paper: | Posted: 30 Apr 2014
Published:30 Apr 2014
Summary:This informative whitepaper explores strategies for protecting and securing your data when migrating from Windows XP to your new operating system.
Get This Now
CommVault Systems, Inc.

Detecting Zero-Day Exploits in the Wild
sponsored by Websense
White Paper: | Posted: 28 Mar 2014
Published:28 Mar 2014
Summary:This report outlines the methodology used to research Windows Error Reporting (WER) – and explains its potential implications for your organization's cyber security.
Get This Now

The New Windows Security: Achieving PC Lockdown without User Backlash in Five Easy Steps
sponsored by Dell and Microsoft
White Paper: | Posted: 25 Mar 2014
Published:16 Sep 2013
Summary:Read this informative white paper and discover 5 easy steps for achieving PC security without affecting your end user experience.
Get This Now
Dell and Microsoft

A Prescription for IT Efficiency
sponsored by Dell, Inc. and Windows 8 Pro
White Paper: | Posted: 04 Nov 2013
Published:04 Nov 2013
Summary:This resource examines new risks and threats that are making Windows XP unsafe for use in a healthcare setting, and details the essential security capabilities and benefits offered by Windows 7 and Windows 8.
Get This Now
Dell, Inc. and Windows 8 Pro

CW Buyer's Guide: Windows 8
sponsored by
Essential Guide: | Posted: 23 Oct 2012
Published:23 Oct 2012
Summary:This 11 page buyer's guide looks at the implications of Windows 8 for corporate IT.
Get This Now

How to Limit the Risk of Attack on your XP Assets - Vendor Webcast
sponsored by AlienVault
Webcast: | Posted: 08 May 2014
Premiered:May 8, 2014
Summary:This webinar describes the new threats facing organizations that are still using Windows XP now that support for the operating system has ended. It also highlights a solution that can be implemented to make sure Windows XP assets remain protected.
Get This Now

Webroot SecureAnywhere Business Endpoint Protection vs. Seven Competitors (February 2014)
sponsored by Webroot
White Paper: | Posted: 18 Apr 2014
Published:28 Feb 2014
Summary:This resource outlines testing results of 8 competing endpoint security software products and breaks down how each perform in relation to a wide variety of criteria.
Get This Now

Secunia Vulnerability Review 2014
sponsored by Secunia
White Paper: | Posted: 21 Mar 2014
Published:26 Feb 2014
Summary:This guide reviews vulnerabilities for 2014 and discusses key figures and facts from a global IT security perspective.
Get This Now

Secunia PSI Country Report - Q4 2013 Germany
sponsored by Secunia
White Paper: | Posted: 20 Mar 2014
Published:20 Mar 2014
Summary:This informative report explores the current state of cybercrime targeting German PCs and what can be done to stop them.
Get This Now

The Windows XP Era's Coming to an End: What You Can Do to Prepare
sponsored by Citrix
White Paper: | Posted: 13 Dec 2013
Published:13 Dec 2013
Summary:This brief resource reviews the security threats and cost issues you will face following the end of support date.
Get This Now

SharePoint Security Should Not Be an Afterthought
sponsored by Thawte Inc.
eGuide: | Posted: 20 May 2013
Published:20 May 2013
Summary:This expert guide from will help you understand the top security issues facing SharePoint and how to ensure that you are deploying this system securely. Read on to learn more.
Get This Now
Thawte Inc.

Active Directory Maintenance & Cleanup
sponsored by STEALTHbits Technologies
White Paper: | Posted: 23 Apr 2012
Published:20 Apr 2012
Summary:Active Directory (AD) plays a central role for many organizations’ Windows Domain architecture and access control, so it’s essential to maintain a clean and correct AD to avoid any potential security and operational risks. View now to explore the risks and challenges of AD that organizations face today and uncover best practices to address them.
Get This Now
STEALTHbits Technologies

Ensuring High Availability for Active Directory - Vendor Webcast
sponsored by Dell Software
Webcast: | Posted: 01 Apr 2012
Premiered:Mar 20, 2012
Summary:This Quest Software webcast explains the symptoms of a failing or failed domain or forest. It also discusses how you can best prepare for this failure, and compares manual forest recovery procedures with a powerful automated solution.
Get This Now
Dell Software

1 - 15 of 65 Matches

Library Home | Advertise with Us | Partner with Us
Powered by Bitpipe
Java Development Research Library Copyright © 1998-2010 Bitpipe, Inc. All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.
Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.