Business of Information Technology  >   Business Management  >   Financial Management  >   Budgeting  >   IT Spending  >  

Corporate Security Spending

RSS Feed    Add to Google    Add to My Yahoo!
Corporate Security Spending White Papers (View All Report Types)
 
Scaling Application Vulnerability Management Across the Enterprise
sponsored by IBM
WHITE PAPER: This case study reveals the solution that one organization chose to help improve application security testing efficiencies at a reduced cost.
Posted: 15 Apr 2014 | Published: 28 Feb 2013

IBM

9 Simple (but Critical) Tips for Effective Patch Management
sponsored by Dell, Inc. and IntelĀ®
WHITE PAPER: This resource offers 9 patch management best practices. Click now to reveal a comprehensive solution that will help you achieve effective patch management without suffering high costs.
Posted: 18 Mar 2014 | Published: 31 Dec 2013

Dell, Inc. and IntelĀ®

Continuous Cyber Situational Awareness
sponsored by Lumeta Corporation
WHITE PAPER: This informative paper takes an in-depth look at continuous monitoring, describing how you can successfully deploy the technology and how it can increase visibility and streamline your security management.
Posted: 10 Feb 2014 | Published: 10 Feb 2014

Lumeta Corporation

Next-Generation Authentication: Keys to Balancing Security and Convenience
sponsored by SafeNet Asia Ltd
WHITE PAPER: This white paper highlights the top characteristics and requirements for next-generation authentication that's built to endure a constantly evolving and risk-filled IT landscape.
Posted: 09 Jan 2014 | Published: 28 Oct 2013

SafeNet Asia Ltd

Cover Your SaaS!
sponsored by BitGlass
WHITE PAPER: This white paper reveals the top 5 cloud security solutions to invest in to best protect your virtualized assets.
Posted: 17 Jun 2014 | Published: 17 Jun 2014

BitGlass

Security-In-Depth Using Integrated Risk-Conscious Controls
sponsored by Tripwire, Inc.
WHITE PAPER: This white paper explores how your organization can change the way it protects its critical data, combining preventive, detective and corrective controls to stop breaches from happening, detect threats as they arise, and correct settings that introduce security risk or non-compliance. Read now to learn more.
Posted: 28 Sep 2012 | Published: 30 Dec 2011

Tripwire, Inc.

How Can I Address Identity and Access Governance Within My Organization to Reduce Risks?
sponsored by CA Technologies.
WHITE PAPER: Gain insight into an identity and access governance that combines an integrated lifecycle approach with process automation and powerful analytics to provide insurmountable security and cost-efficiency.
Posted: 23 Jul 2013 | Published: 29 Feb 2012

CA Technologies.

Stopping data leakage: Making the most of your security budget
sponsored by Sophos UK
WHITE PAPER: This paper demonstrates the need for a high-profile acceptable use policy to prevent data leakage, gives practical guidance on how to use your security budget effectively to protect data at the gateway and endpoint, and highlights the benefits of encryption in securing data in the event that it does get stolen or lost.
Posted: 16 Mar 2009 | Published: 16 Mar 2009

Sophos UK

Fact or Fiction Security Survival Guide
sponsored by Lumension
WHITE PAPER: This guide serves as a good first step in preparing us from falling into the trap of security misconceptions and sets the record straight about each misconception that are most likely to encounter while talking to colleagues or vendors.
Posted: 02 Feb 2009 | Published: 02 Feb 2009

Lumension

Rethinking Your Enterprise Security
sponsored by Hewlett-Packard Company
WHITE PAPER: If you stop to ask yourself how your security strategy is doing, more likely than not you'd say it's going fine, right? This resource is a prime opportunity to conduct a personal security report card to double check that all of your security i's are dotted and t's crossed.
Posted: 30 Sep 2013 | Published: 31 May 2012

Hewlett-Packard Company
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement