IT Management  >   Systems Operations  >  

Closed Loop Security

RSS Feed    Add to Google    Add to My Yahoo!
Closed Loop Security White Papers (View All Report Types)
Building a Security Incident Response Plan That Works
sponsored by IBM
WHITE PAPER: This white paper can help you avoid ten of the most common mistakes organizations make during a security incident.
Posted: 08 Sep 2015 | Published: 31 Jan 2014


Enabling the Connected Campus: Mobility Best Practices for Higher Education
sponsored by VMware, Inc.
WHITE PAPER: IT teams on college campuses won't want to miss this helpful resource, which explores the following steps to protecting students' financial and personal information from the risks of BYOD in higher education. View now to learn how to choose the right EMM solution, prepare your network infrastructure, manage apps and content, and more.
Posted: 15 Sep 2015 | Published: 15 Sep 2015

VMware, Inc.

Encrypted Traffic Management for Dummies
sponsored by Blue Coat Systems
WHITE PAPER: In this e-book, you'll learn everything you need to know about keeping SSL-encrypted traffic both private and secure.
Posted: 11 Sep 2015 | Published: 11 Sep 2015

Blue Coat Systems

Critical Security Controls for SSL/TLS Management
sponsored by Venafi
WHITE PAPER: In this SANS report, you'll find specific recommendations for managing SSL/TLS security and protecting your keys and certificates.
Posted: 18 Sep 2015 | Published: 30 Jun 2015


Removing the Complexity and Guesswork from Your PKI Refresh
sponsored by Venafi
WHITE PAPER: This white paper discusses the challenges of PKI refresh and their impact on security. Read on to learn how you can bolster security with a simplified and streamlined PKI refresh process.
Posted: 15 Sep 2015 | Published: 15 Sep 2015


Behind the Mask: The Changing Face of Hacking
sponsored by Hewlett-Packard Company
WHITE PAPER: This new report will help you learn more about hackers and how they work. Read it to understand what attack methods hackers use, why simple approaches like phishing still work, and more.
Posted: 08 Sep 2015 | Published: 30 Jun 2015

Hewlett-Packard Company

2015 Cyberthreat Defense Report
sponsored by Imperva
WHITE PAPER: What are the emerging cyberthreats that companies should be most concerned about? How do you overcome the organizational barriers that inhibit IT security? Read the "2015 Cyberthreat Defense Report" to learn what matters most to the over 800 North American and European IT security decision makers surveyed.
Posted: 05 Oct 2015 | Published: 05 Oct 2015


IT's Confidence in Threat Defenses May Be Misplaced
sponsored by McAfee, Inc.
WHITE PAPER: This white paper uses survey results to discuss just how prepared the average organization is for a hack, and businesses need to do if they truly want to stay safe.
Posted: 29 Sep 2015 | Published: 29 Sep 2015

McAfee, Inc.

Case Study: A Profile of Cyber-Extortion
sponsored by Akamai
WHITE PAPER: This white paper provides an in-depth look at a cyber-extortion group, showing you what their attacks look like and what you can do to stop them.
Posted: 17 Sep 2015 | Published: 09 Sep 2015


Close the Door on Cryptographic Key and Certificate Threats
sponsored by Venafi
WHITE PAPER: This white paper explores how exploits use cryptographic keys and certificates to compromise organizations, and how businesses can reduce their attack surface by securing them.
Posted: 10 Sep 2015 | Published: 31 Dec 2013

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement