IT Management  >   Systems Operations  >  

Closed Loop Security

RSS Feed    Add to Google    Add to My Yahoo!
Closed Loop Security White Papers (View All Report Types)
 
Encrypting data with confidence, across the enterprise and beyond
sponsored by IBM
WHITE PAPER: This white paper discusses an integrated approach for easily managing the lifecycle of encryption keys. It also explains how organizations can feel more confident about encrypting mission-critical data across the enterprise, in the cloud and beyond.
Posted: 20 Mar 2015 | Published: 31 Jul 2013

IBM

Global Manufacturer Reduces Risk Across 30,000 Domains in Eight Days
sponsored by Veracode, Inc.
WHITE PAPER: A global 100 manufacturer faced the problem of securing an increasing number of applications. How they solved this problem can provide insights for other large enterprises seeking to do the same.
Posted: 19 Mar 2015 | Published: 19 Mar 2015

Veracode, Inc.

Quarterly Cybercrime Report
sponsored by IBM
WHITE PAPER: This security report will help you stay up to date on changing cybercrime trends.
Posted: 20 Mar 2015 | Published: 30 Nov 2014

IBM

4 Steps to Address Vulnerabilities Before a Breach
sponsored by IBM
WHITE PAPER: This white paper addresses how vulnerabilities can go undetected and gives you advice for mitigating these vulnerabilities.
Posted: 16 Mar 2015 | Published: 31 Dec 2014

IBM

A Comprehensive Security Intelligence Platform
sponsored by IBM
WHITE PAPER: Download this paper to discover the pros and cons of an SIEM platform and to determine if this is the one that meets your needs.
Posted: 23 Mar 2015 | Published: 30 Sep 2014

IBM

Introducing Amazon RDS for Aurora
sponsored by Global Knowledge
WHITE PAPER: Discover how the enhanced performance and reliability of Amazon Aurora will help AWS customers reduce performance bottlenecks in their applications. The relatively low cost of Aurora will tempt many customers to migrate workloads to this implementation of RDS.
Posted: 03 Mar 2015 | Published: 27 Feb 2015

Global Knowledge

St. Joseph Health Mobilizes Patient Care with MobileIron Solutions
sponsored by MobileIron
WHITE PAPER: This whitepaper provides valuable information on mobile device management and security.
Posted: 11 Mar 2015 | Published: 11 Mar 2015

MobileIron

Ensuring Secure Mobility for Healthcare Organizations
sponsored by Insight
WHITE PAPER: Access this white paper to learn how to develop a comprehensive mobile security framework. Lock out potential cyber thieves and ensure users have easy, reliable and secure access to essential data and services through their mobile devices.
Posted: 19 Mar 2015 | Published: 19 Mar 2015

Insight

Stop DDoS Attacks with DNS Protection
sponsored by Efficientip
WHITE PAPER: Access this white paper now to read about effective DNS protection and to learn how you can shield yourself from DDoS attacks.
Posted: 09 Mar 2015 | Published: 31 Dec 2014

Efficientip

Leverage the AWS Dataflow To Improve Your Security
sponsored by Cloudcheckr
WHITE PAPER: This white paper highlights a technology that helps to manage this data and surface the most critical and actionable components. Find out how this technology assists each of the three services offered by AWS and help organizations to fulfill all of their security policies and compliance mandates.
Posted: 10 Mar 2015 | Published: 10 Mar 2015

Cloudcheckr
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement