Business of Information Technology  >   Business Management  >   Financial Management  >   Budgeting  >   IT Spending  >  

Corporate Security Spending

RSS Feed    Add to Google    Add to My Yahoo!
Corporate Security Spending White Papers (View All Report Types)
 
Threat Intelligence Platforms: A Research Report
sponsored by AlienVault
WHITE PAPER: Find how a social media-esque, community-focused approach to threat intelligence has proven to be effective at identifying and analyzing emerging threats.
Posted: 17 Nov 2016 | Published: 12 Oct 2016

AlienVault

Anatomy of a Hack Disrupted
sponsored by LogRhythm, Inc.
WHITE PAPER: What if there was a way to solve these potentially devastating problems before they occurred in the first place? Access this paper to uncover a real-life situation, in which a malware attack took place but was mitigated before any damage took place.
Posted: 31 Aug 2016 | Published: 31 Aug 2016

LogRhythm, Inc.

8 Reasons why Users are Rethinking their SIEM Strategy
sponsored by LogRhythm, Inc.
WHITE PAPER: This brief yet informative infographic highlights eight reasons why having the right SIEM approach is critical to productivity, compliance and ROI. Read on to determine if your current SIEM practices are doing the most for your network security.
Posted: 11 Jan 2016 | Published: 11 Jan 2016

LogRhythm, Inc.

Market Analysis for 18 Featured Endpoint Protection Platforms
sponsored by Trend Micro
WHITE PAPER: Endpoint protection platforms (EPPs) provide a collection of security capabilities to protect PCs, smartphones and tablets. Learn from analysts about 18 featured EPPs with capabilities such as anti-malware, personal firewall, and more.
Posted: 22 Nov 2016 | Published: 01 Feb 2016

Trend Micro

Cloud Security Playbook: Strategies & Best Practices for Today's Volatile Threat Landscape
sponsored by ThreatStack
WHITE PAPER: Learn strategies, best practices, and expert advice to help your company thrive amidst today's volatile cloud threat landscape.
Posted: 02 Nov 2016 | Published: 02 Nov 2016

ThreatStack

3 Key Components of a Risk-Based Security Plan
sponsored by Foundstone, Inc.
WHITE PAPER: This whitepaper takes a look at the different components of an effective security plan, and provides a perspective on how enterprises that are serious about their information security budgets should rethink their security plan.
Posted: 02 Jun 2008 | Published: 02 Jun 2008

Foundstone, Inc.

Taking Charge of Security in a Hyperconnected World
sponsored by RSA
WHITE PAPER: Access this resource to uncover the top mistakes IT managers are making in their security strategies, and why they need a more continuous approach to improving defense systems in today's ever changing threat landscape.
Posted: 06 Dec 2013 | Published: 31 Oct 2013

RSA

Protecting the Dynamic Datacenter
sponsored by Trend Micro
WHITE PAPER: Trend Micro server and application protection addresses the challenging operational security and compliance needs of today’s dynamic datacenter. We provide comprehensive protection, greater operational efficiency, superior platform support, and tighter integration with existing investments. Read this paper to learn more!
Posted: 17 Mar 2010 | Published: 01 Aug 2009

Trend Micro

Next-Generation Authentication: Keys to Balancing Security and Convenience
sponsored by SafeNet Asia Ltd
WHITE PAPER: This white paper highlights the top characteristics and requirements for next-generation authentication that's built to endure a constantly evolving and risk-filled IT landscape.
Posted: 09 Jan 2014 | Published: 28 Oct 2013

SafeNet Asia Ltd

Enterprise Information Security in Transition
sponsored by IBM
WHITE PAPER: This white paper boils the reasons behind current issues in the information security field down into four major causes, and also lays out a list of specific, detailed changes that need to be made to the enterprise security model for these core issues to be resolved.
Posted: 28 Jul 2014 | Published: 31 Oct 2012

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement