IT Management  >   Systems Operations  >   Security  >  

Computer Security Management

RSS Feed    Add to Google    Add to My Yahoo!
Computer Security Management White Papers (View All Report Types)
 
Becoming a Managed Security Service Provider: Why a Layered Approach to Security is Essential
sponsored by LogicNow
WHITE PAPER: This white paper suggests the kinds of services that a managed service provider (MSP) can offer to clients that will help them develop a managed security service. Access now to explore the kinds of attacks that service providers can help customers avoid.
Posted: 06 Apr 2016 | Published: 06 Apr 2016

LogicNow

For Enterprise IT: Extend Your VPN to Bring Better Security, Performance, Reliability to the Cloud
sponsored by AT&T
WHITE PAPER: As clouds are increasingly being used to store business-critical applications and data, they become more likely targets for attacks. Using public Internet to access your clouds is like leaving a window open. Access this white paper to learn how to ensure security and shut attackers out with VPN-based connectivity for the cloud.
Posted: 29 Apr 2016 | Published: 20 Apr 2016

AT&T

Cloud Security: Advanced, Efficient, and Trusted
sponsored by Unisys
WHITE PAPER: Yesterday's security has fallen behind the needs of today. Here are better ways to address threats by keeping security up to speed with the cloud.
Posted: 17 May 2016 | Published: 17 May 2016

Unisys

How Integrated Services Reduce Risk and the Impact of a Security Breach to Organizations
sponsored by Dell SecureWorks
WHITE PAPER: This white paper presents the advantages of a single-outsourced solution for managed security services and incident response. Discover how combining your capabilities with an MSSP can enable you to improve your overall security by reducing investigation time with real-time data access and enhancing remediation solutions with cyberintelligence.
Posted: 25 Mar 2016 | Published: 25 Mar 2016

Dell SecureWorks

Security that Plays Well with Others
sponsored by Intel Security
WHITE PAPER: As cyberattacks increase in volume and sophistication, organizations need to present a unified coordinated defense. Discover how an open, integrated security architecture can help you coordinate your siloed legacy security products and simplify the threat defense lifecycle.
Posted: 06 May 2016 | Published: 31 Dec 2015

Intel Security

Anatomy of a Cyber-Attack
sponsored by Dell Software
WHITE PAPER: You need to understand the enemy -- and their malware -- before you can defeat them. Discover a comprehensive strategy to counter every stage of cyber-attacks and eliminate every type of malware from disrupting your network.
Posted: 20 May 2016 | Published: 20 May 2016

Dell Software

Defend Against The Undetected
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper shows you a complete, cohesive automated framework that covers all parts of your network from cloud to the perimeter to the endpoints. Access now to learn the three elements you must focus on to ensure the security of your data.
Posted: 28 Apr 2016 | Published: 31 Dec 2015

Fortinet, Inc.

How Cloud Services Giant Exostar Protected Sensitive Data and Applications
sponsored by VMware, Inc.
WHITE PAPER: In this white paper, you'll learn how micro-segmentation helps you move beyond perimeter security to contain and halt threats inside your data center in order to keep your data safe. Access now to learn whether a software-defined data center architecture is right for your business.
Posted: 12 Apr 2016 | Published: 12 Apr 2016

VMware, Inc.

Ditching Legacy Tokens
sponsored by BlackBerry
WHITE PAPER: While legacy tokens still hold 70% of the user authentication market, Gartner predicts a shift towards the phone as a token. Discover why legacy tokens are falling short and how mobile authentication will retain all the security of legacy solutions while reducing costs and simplifying the end-user experience.
Posted: 14 Apr 2016 | Published: 31 Mar 2016

BlackBerry

Next-Generation Endpoint Security Market Sizing and Forecast 2016–2020
sponsored by Carbon Black
WHITE PAPER: This EMA research report provides "beyond the surface" insight on variety of enterprise-capable solution providers. Access this report now and learn about research focused on solution providers providing proactive next-generation endpoint security services covering prevention, detection and response.
Posted: 29 Mar 2016 | Published: 29 Feb 2016

Carbon Black
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement