IT Management  >   Systems Operations  >   Security  >  

Computer Security Management

RSS Feed    Add to Google    Add to My Yahoo!
Computer Security Management White Papers (View All Report Types)
10 Reasons You Should Consider Commvault for Data Protection
sponsored by Commvault
WHITE PAPER: Discover how to make the right choices in data center backup and recovery software. You'll learn 10 reasons why choosing the right vendor is critical to your organization's future and how to be prepared for virtually every technology transition ahead.
Posted: 21 Nov 2016 | Published: 31 Oct 2016


Evolving Threats Call For Integrated Endpoint, Comprehensive Security Strategies
sponsored by Trend Micro
WHITE PAPER: IT departments have increasingly prioritized preventing, detecting, and controlling threats. Learn why your peers believe this interconnected threat mitigation structure is important, and how this sentiment is increasing across the enterprise.
Posted: 18 Nov 2016 | Published: 18 Nov 2016

Trend Micro

Persistence Technology and Securing Every Device
sponsored by Absolute
WHITE PAPER: Learn how your security leadership can reach out and secure lost or stolen enterprise hardware. With the capacity to remotely secure potentially vulnerable endpoints, you can finally embrace a mobile workforce without exhausting concerns about security.
Posted: 07 Nov 2016 | Published: 31 Dec 2015


Managed Security Services Provider (MSSP) Decision Guide
sponsored by Trustwave
WHITE PAPER: What key areas should you be thinking about when making the critical decision to ally with a Managed Security Service Provider (MSSP)? This decision guide offers key questions and considerations to help you select an MSSP and evaluate their solutions to best secure your business.
Posted: 15 Nov 2016 | Published: 31 Oct 2016


Designing an IAM Program Optimized for Your Business
sponsored by IBM
WHITE PAPER: Discover a step-by-step process on how to revamp your IAM and access policies to ensure that business objectives related to security, productivity or compliance can be met, both in the short term and as your organization continues to evolve in the future.
Posted: 07 Dec 2016 | Published: 07 Dec 2016


Dangerous Threats Require Backup for Data Protection and Recovery
sponsored by Code42
WHITE PAPER: Discover the intricacies of data leakage and theft, the motivations and tactics of a wide range of attackers, and guidance for effective action against their machinations.
Posted: 17 Nov 2016 | Published: 30 Nov 2015


Best Practices for Securing Microsoft Azure Hybrid Clouds
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This white paper discusses the best practices for securing your Microsoft Azure Cloud environment. Learn how to provide uncompromising protection against even the most sophisticated cyberattacks now.
Posted: 09 Nov 2016 | Published: 31 May 2016

Check Point Software Technologies Ltd.

Automating Advanced Security for the Software Defined Data Center
sponsored by Fortinet, Inc.
WHITE PAPER: Discover how to protect your data centers, eliminate the need for manual intervention when it comes to deploying an ever-expanding infrastructure, and not let strong security measures get in the way of growth.
Posted: 04 Nov 2016 | Published: 04 Nov 2016

Fortinet, Inc.

2016 Security Report: Staying One Step Ahead
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This in-depth security report looks at what enterprises are encountering in known and unknown malware, attack trends, and the impact of mobile devices on the enterprise. Learn recommendations for staying a step ahead of cybercriminals.
Posted: 07 Nov 2016 | Published: 07 Nov 2016

Check Point Software Technologies Ltd.

앱 및 데스크탑 가상화를 통해 보안을 강화해야 하는 10가지 이유
sponsored by Citrix
WHITE PAPER: 데스크탑 가상화를 통해 정보 보안을 강화해야 하는 10가지 이유 [백서] 보안 및 규제 준수를 보장하면서 사용자가 요구하는 유연성과 생산성을 제공합니다. 보안 제품을 추가로 구축하여 보안을 강화하라는 말이 아닙니다. 근본적으로 안전한 가상 아키텍처로 전환함으로써 앱, 데스크탑 및 데이터 딜리버리 방식을 변화시키면 됩니다. 시트릭스의 앱 및 데스크탑 가상화 기술은 안전한 앱, 데스크탑 및 데이터 딜리버리를 통해 직원 생산성을 유지하면서도 데이터 센터에 모든 것을 안전하게 보관할 수 있도록 지원합니다. 백서를 읽고 시트릭스가 위험 노출 없이 액세스할 수 있도록 지원하는 방법에 대해 확인하십시오.
Posted: 10 Nov 2016 | Published: 11 Nov 2016

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement