Microsoft Windows Security Reports

Presentation Transcript: The Real Deal about Windows Server 2008 R2, Part 1 - Latest Security Enhancements
sponsored by Dell EMC and Microsoft
PRESENTATION TRANSCRIPT: This presentation transcript compares the first and second releases of Windows Server 2008. Discover security improvements to this enhanced operating system and learn how they impact your small or mid-sized business.
Posted: 15 Jun 2010 | Published: 21 May 2010

Dell EMC and Microsoft

Presentation Transcript: The Real Deal about Windows Server 2008 R2, Part 1 - Latest Security Enhancements
sponsored by Dell EMC and Microsoft
PRESENTATION TRANSCRIPT: This presentation transcript compares the first and second releases of Windows Server 2008. Discover security improvements to this enhanced operating system and learn how they impact your small or mid-sized business.
Posted: 19 Nov 2010 | Published: 19 Nov 2010

Dell EMC and Microsoft

Mail Security for Microsoft Exchange Server
sponsored by Symantec Corporation
PODCAST: This Podcast explores the key features and benefits of Mail Security 5.0 including a new user interface, an enhanced content filtering rules, new user group based rules, and windows cluster support.
Posted: 19 Feb 2007 | Premiered: Feb 1, 2007

Symantec Corporation

Windows Shopping: Will 8.1 Meet Your Security Needs?
sponsored by TechTarget Security
EBOOK: Microsoft Windows 8.1 attempts to respond to a demand for new security features for network endpoints and user devices. This technical guide offers a concise review of its security features and whether MS Windows 8.1 fills its promises.
Posted: 12 Sep 2014 | Published: 12 Sep 2014

TechTarget Security

How to collect Windows Event logs to detect a targeted attack
sponsored by M86 Security
EGUIDE: Targeted attacks are growing, and eventually your enterprise will be a target. In this e-guide, expert Richard Bejtlich covers how to collect Windows Event logs to detect an intrusion.
Posted: 13 Jul 2011 | Published: 13 Jul 2011

M86 Security

The Seven Common Challenges of Administering Active Directory
sponsored by NetIQ Europe
WHITE PAPER: This white paper will out line the 7 common challenges you might face while trying to implement Active Directory securely. You will also learn some helpful tips that will assist you with these difficulties.
Posted: 18 May 2011 | Published: 18 May 2011

NetIQ Europe

Secunia Vulnerability Review 2014
sponsored by Secunia
WHITE PAPER: This guide reviews vulnerabilities for 2014 and discusses key figures and facts from a global IT security perspective.
Posted: 21 Mar 2014 | Published: 26 Feb 2014

Secunia

E-Book: Technical Guide on Combatting Emerging Web Threats
sponsored by TechTarget Security
EBOOK: Attackers are almost exclusively targeting enterprises with hacks perpetrated over the Web. As most enterprises move operations and functionality online, Web-based applications become a tempting threat vector for cybercriminals. Read this e-book for a look at Web threats and vulnerabilities – and how to protect your organization against them.
Posted: 09 Jun 2010 | Published: 09 Jun 2010

TechTarget Security

BareTail
sponsored by Bare Metal Software
TRIAL SOFTWARE: Free real-time log file monitoring tool for Windows.
Posted: 05 Dec 2006 | Premiered: 19 Jun 2007

All resources sponsored by Bare Metal Software

Windows 10: Top 10 Features IT Pros Will Love
sponsored by Microsoft
EGUIDE: This expert e-guide describes the 10 most crucial Windows 10 features that IT pros need to know about, including mobile device management, work folders that regulate access to corporate content, the return of the Start Menu, and 7 more.
Posted: 10 Feb 2016 | Published: 03 Feb 2016

Microsoft