IT Management  >   Systems Operations  >  

Closed Loop Security

RSS Feed    Add to Google    Add to My Yahoo!
Closed Loop Security White Papers (View All Report Types)
 
IBM Data Protection for Virtual Environments
sponsored by IBM
WHITE PAPER: Server virtualization can be quite beneficial, but it presents just as many challenges. Read on to learn about an independent research group's findings about how one major company's service sets about tackling these challenges to protect data for virtual environments.
Posted: 24 May 2016 | Published: 31 Jul 2015

IBM

The Mobile Enterprise: Is Ease of Use Overriding Security?
sponsored by BlackBerry
WHITE PAPER: Enterprises are relying on native applications to mobilize their Microsoft environments despite major security threats. A recent survey displays the decision-making process when balancing the advantages and trade-offs associated with the four primary methods of mobilizing those apps.
Posted: 15 Apr 2016 | Published: 31 Mar 2016

BlackBerry

For Enterprise IT: Extend Your VPN to Bring Better Security, Performance, Reliability to the Cloud
sponsored by AT&T
WHITE PAPER: As clouds are increasingly being used to store business-critical applications and data, they become more likely targets for attacks. Using public Internet to access your clouds is like leaving a window open. Access this white paper to learn how to ensure security and shut attackers out with VPN-based connectivity for the cloud.
Posted: 29 Apr 2016 | Published: 20 Apr 2016

AT&T

Advance Enterprise Analytics with Self-Service and Governance
sponsored by Pyramid Analytics
WHITE PAPER: Self-service BI can help business users quickly create data models and enable better decision-making, but this can't be achieved without centralized, managed security. Discover a highly scalable BI platform that can balance self-service BI with complete governance.
Posted: 19 May 2016 | Published: 19 May 2016

Pyramid Analytics

The Digital Workplace
sponsored by Aruba Networks
WHITE PAPER: Trends in mobility, IoT, BYOD, cloud-based computing and more are changing the way that business is done. This poses a lot of network and security issues. Access this resource to explore four steps that will guide you through this evolutionary phase and into a digital workplace.
Posted: 16 May 2016 | Published: 29 Feb 2016

Aruba Networks

Why Application Delivery Matters in the Digital Economy
sponsored by Citrix
WHITE PAPER: Users are demanding instant access to apps and data from any device and any location. As a result, application delivery defines your organization's ability to generate growth, revenue and profit. This white paper highlights the four factors determining your success and the challenges surrounding them.
Posted: 20 Apr 2016 | Published: 30 Sep 2015

Citrix

Workplace Mobility, Consumerization, and Cloud Drive End-user Computing Transformation
sponsored by VMware
WHITE PAPER: The presence of mobility in the workplace is going to continue its steady rise. We need to ensure that this is remains a benefit rather than a hinderance. Read on to learn about how end-users are the driving force in an ongoing mobility transformation and what this means for the future of mobility in the workplace.
Posted: 20 May 2016 | Published: 29 Jan 2016

VMware

Your Legal Liability Following a Cybersecurity Breach
sponsored by SurfWatch Labs
WHITE PAPER: This resource explores recent legal rulings that put more pressure on organizations to develop a comprehensive cyber risk management program. Read on to discover how an effective threat intelligence strategy can enable you to defend against the growing litigation that inevitably results from being the victim of a cyberattack.
Posted: 01 Apr 2016 | Published: 01 Apr 2016

SurfWatch Labs

Mobilize Your Corporate Content and Apps
sponsored by IBM MaaS360
WHITE PAPER: Mobile collaboration holds the key to unlocking tremendous productivity, but many organizations have only begun to scratch the surface of mobile strategies. Discover how developing custom applications will greatly benefit your organization over current technologies filled with pitfalls.
Posted: 18 May 2016 | Published: 31 Mar 2016

IBM MaaS360

Protect Patient Data with Strong Desktop Security
sponsored by Aventura
WHITE PAPER: Learn how to build a security wall around PHI by addressing desktop security vulnerabilities. Unveil 7 ways to strengthen desktop security and access management in order to keep patient data safe.
Posted: 20 May 2016 | Published: 20 May 2016

Aventura
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement