Software  >   Systems Software  >  

Auditing Software (Security)

RSS Feed    Add to Google    Add to My Yahoo!
Auditing Software (Security) White Papers (View All Report Types)
 
Protection from Targeted Attacks
sponsored by Mimecast
WHITE PAPER: This white paper introduces a comprehensive form of threat protection that will keep out even today's advanced hacks.
Posted: 11 Sep 2015 | Published: 31 Dec 2014

Mimecast

A New Approach to Endpoint Security
sponsored by Webroot
WHITE PAPER: Access this white paper to learn how you can take a new approach to security that provides unmatched protection for your devices and those of your customers.
Posted: 03 Sep 2015 | Published: 03 Sep 2015

Webroot

Rethinking Security: Replacing the Traditional Firewall
sponsored by F5 Networks
WHITE PAPER: This white paper discusses how firewalls need to evolve in order to stay relevant and what you can do to embrace that evolution.
Posted: 16 Sep 2015 | Published: 16 Sep 2015

F5 Networks

Layered Security Strategies for a Mobile-First World
sponsored by Microsoft
WHITE PAPER: This security value paper reveals strategies to keep users productive and connected, without compromising corporate security posture. Discover why an integrated approach is an effective one.
Posted: 03 Feb 2016 | Published: 27 Nov 2015

Microsoft

10 Reasons You Need Endpoint Security
sponsored by TechData Corporation
WHITE PAPER: In this white paper, you will discover 10 reasons why upgrading your security platform will save you time and effort managing your convoluted endpoint controls.
Posted: 28 Jan 2016 | Published: 11 Dec 2015

TechData Corporation

Perimeter Security Can’t Protect Your Cloud Workloads
sponsored by CloudPassage
WHITE PAPER: This white paper explains how implementing an automated, cloud-centric security platform can help you keep you cloud infrastructure secure from any threat.
Posted: 15 Jul 2015 | Published: 15 Jul 2015

CloudPassage

Distilling Alert Noise to Find Real Problems
sponsored by Prelert
WHITE PAPER: Read this brief article to discover how anomaly detection programs can lower your rates of false positives and make security management much more efficient.
Posted: 24 Mar 2015 | Published: 04 Mar 2015

Prelert

Five Security Considerations for the Mobile Age
sponsored by IBM
WHITE PAPER: While mobility presents today's organizations with new business opportunities, it also introduces alarming security risks. This guide counts down five key security issues you need to consider in order to drive mobile success.
Posted: 17 May 2013 | Published: 31 Dec 2012

IBM

Webroot SecureAnywhere Business Endpoint Protection vs. Seven Competitors
sponsored by Webroot
WHITE PAPER: This performance benchmark report reveals the results of an objective performance test conducted on eight endpoint security software products. Inside, learn which solutions are leading the pack for endpoint protection.
Posted: 30 May 2013 | Published: 17 Jan 2013

Webroot

Network Security Report: The State of Network Security in Schools
sponsored by Threat Track Security
WHITE PAPER: Access this comprehensive resource to learn how to overcome the challenges of securing school networks. Discover ways to control sources of vulnerability that are inherently difficult to control. Additionally, achieve a better understanding of the ever-changing landscape of technology and malware.
Posted: 26 Apr 2013 | Published: 26 Apr 2013

Threat Track Security
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement