IT Management  >   Systems Operations  >  

Closed Loop Security

RSS Feed    Add to Google    Add to My Yahoo!
Closed Loop Security White Papers (View All Report Types)
 
Endpoint Data Protection: A Buyer's Checklist
sponsored by CommVault
WHITE PAPER: This exclusive white paper takes an in-depth look a end point security for enterprise mobility, and why end point data backup is critical for organizations today. Read on to learn more.
Posted: 14 Jan 2015 | Published: 14 Jan 2015

CommVault

The Current Chaotic State of Data Traffic Security
sponsored by Certes Networks
WHITE PAPER: This white paper explores the results of a survey of more than 6 million IT professionals that aimed to discover how companies across the globe handle data in motion and other IT security issues. The results made one thing apparent: Data traffic encryption is a mess.
Posted: 06 Jan 2015 | Published: 16 Dec 2014

Certes Networks

Stagnate or Automate; How to make the right File Transfer Choices
sponsored by Ipswitch File Transfer
WHITE PAPER: This white paper highlights several tips for combatting file transfer challenges, and why automation is the way to go.
Posted: 15 Jan 2015 | Published: 31 Dec 2014

Ipswitch File Transfer

Delivering Enterprise Information Securely on Android, Apple iOS and Microsoft Windows Tablets and Smartphones
sponsored by Citrix
WHITE PAPER: This exclusive white paper takes an in-depth look at how IT security has changed with the introduction of consumerization and BYOD in the enterprise. Read on to learn more.
Posted: 29 Dec 2014 | Published: 29 Dec 2014

Citrix

How Extended Validation SSL Brings Confidence to Online Sales and Transactions
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses the importance of increasing customer confidence in the security of online business transactions, and introduces Symantec Extended Validation SSL Certificates as a potential solution to this challenge.
Posted: 15 Jan 2015 | Published: 31 Oct 2013

Symantec Corporation

Creating a successful road map for cloud deployment
sponsored by IBM
WHITE PAPER: View this informative resource to access critical steps needed on the journey to meet your business needs and long-term career goals.
Posted: 05 Jan 2015 | Published: 01 Nov 2014

IBM

A Smarter Approach to Network Encryption
sponsored by Certes Networks
WHITE PAPER: This white paper explores how enterprises can make network encryption easier to set up and manage, as well as transparent to network and application performance and behavior.
Posted: 09 Jan 2015 | Published: 16 Dec 2014

Certes Networks

Protecting DNS Infrastructure
sponsored by Cloudmark
WHITE PAPER: This exclusive white paper details key factors about the DNS threat landscape and offers a look at different security risks and types of attacks hackers are using to disrupt the network today. Read on to learn more.
Posted: 13 Jan 2015 | Published: 13 Jan 2015

Cloudmark

What does the Cloud mean to Enterprise Security?
sponsored by Zscaler
WHITE PAPER: Download this exclusive white paper now to learn about the evolution of security threats and the role of the cloud in fighting back.
Posted: 27 Jan 2015 | Published: 27 Jan 2015

Zscaler

How Remote Access Solutions Deliver Business Value in UNIX/Linux Environments
sponsored by OpenText
WHITE PAPER: Inside this white paper, explore reasons why organizations should adopt remote access solutions for UNIX and Linux environments. Discover what capabilities to look for in a remote access solution for UNIX/Linux environments to enable a reliable, secure, high-performing access to applications.
Posted: 23 Jan 2015 | Published: 23 Jan 2015

OpenText
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement