IT Management  >   Systems Operations  >  

Closed Loop Security

RSS Feed    Add to Google    Add to My Yahoo!
Closed Loop SecurityWhite Papers (View All Report Types)
 
Detecting Cyber Attacks in a Mobile and BYOD Organization
sponsored by Vectra Networks
WHITE PAPER: This solution brief sets out to explore the challenges, understand the needs,evaluate mobile device management as an approach to detecting attacks. Read on to learn more.
Posted: 10 Dec 2014 | Published: 10 Dec 2014

Vectra Networks

5 Steps to Reduce the Complexity of PCI Security Assessments
sponsored by Bit9, Inc.
WHITE PAPER: This helpful white paper outlines 5 steps for reducing the complexity of PCI assessments, lowering administration costs, and accelerating the attainment of a compliant and secure environment.
Posted: 16 Dec 2014 | Published: 16 Dec 2014

Bit9, Inc.

Encrypt Your Virtual and Cloud-Based Data Centers with SafeNet ProtectV
sponsored by SafeNet, Inc.
WHITE PAPER: This white paper introduces a solution that offers persistent, secured storage for structured and unstructured data, wherever it resides.
Posted: 11 Dec 2014 | Published: 15 Aug 2013

SafeNet, Inc.

Rethinking Data Discovery and Data Classification
sponsored by Digital Guardian
WHITE PAPER: This white paper discusses data discovery and classification, two essential but often overlooked initiatives that lay the foundation for protecting data. Read on to access a three-part framework for data security and control, created by Forrester to help S&R professionals adapt to the new data economy.
Posted: 26 Nov 2014 | Published: 01 Oct 2014

Digital Guardian

Email Security Checklist: Eight Steps for Healthcare Organizations
sponsored by Mimecast
WHITE PAPER: This white paper explains how you can embrace email as a core communication tool while still adhering to HIPAA guidelines.
Posted: 18 Dec 2014 | Published: 18 Dec 2014

Mimecast

Defeat Malware and Botnet Infections with a DNS Firewall
sponsored by BlueCat
WHITE PAPER: This paper reveals a threat protection solution that can help you address any holes in enterprise security.
Posted: 10 Dec 2014 | Published: 10 Dec 2014

BlueCat

Addressing Changes in the Healthcare IT Legislative and Regulatory Environment
sponsored by Dell
WHITE PAPER: Access this white paper to discover how cloud client computing solutions supported by VDI provide a flexible, integrated, and virtualized IT environment to tackle the challenges faced by healthcare providers.
Posted: 25 Nov 2014 | Published: 25 Nov 2014

Dell

Understanding the Cyber Attack "Kill Chain" and Attack Model
sponsored by Websense
WHITE PAPER: This white paper describes the seven stages of advanced threats that comprise "kill chains" and explains how cybercriminals use them in attacks.
Posted: 03 Dec 2014 | Published: 16 Oct 2013

Websense

Integrated Network Security Architecture: Threat-Focused Next-Generation Firewall
sponsored by Cisco
WHITE PAPER: This exclusive whitepaper explores the need for an interoperable network security architecture to combat today's security threats.
Posted: 25 Nov 2014 | Published: 24 Sep 2014

Cisco

Cloud Security Solutions You Can Trust
sponsored by Intel Corporation
WHITE PAPER: This white paper explains how cloud security solutions from Intel and VMware can enable your organization to confidently deploy a cloud infrastructure by safeguarding your sensitive data and strengthening regulatory compliance.
Posted: 20 Nov 2014 | Published: 30 Apr 2013

Intel Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement