IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Device Security Policies

RSS Feed    Add to Google    Add to My Yahoo!
Device Security Policies White Papers (View All Report Types)
 
Security and Privacy on the Encrypted Network
sponsored by Blue Coat Systems
WHITE PAPER: This white paper discusses the challenges of decryption and gives advice on how you can implement it more effectively.
Posted: 17 Sep 2015 | Published: 20 Jan 2015

Blue Coat Systems

Digital Guardian Data Loss Prevention
sponsored by Digital Guardian
WHITE PAPER: Continue reading this white paper to discover how you can gain the deepest visibility, fine-grained control and the industry's broadest data protection coverage
Posted: 02 Feb 2016 | Published: 31 Dec 2015

Digital Guardian

Secure-by-Design Protection for Application and Desktop Virtualization
sponsored by Citrix
WHITE PAPER: This white paper highlights a "secure-by-design" solution that not only simplifies data protection, access control, user provisioning, and compliance for virtualized applications and desktops, but reduces the tools needed to protect them.
Posted: 14 Sep 2015 | Published: 22 May 2014

Citrix

Security Information and Event Management FAQs
sponsored by AccelOps Inc.
WHITE PAPER: In this white paper, review the top SIEM strategy evaluation FAQs to better understand what products offer what services and help your organization choose the right approach. View now to learn how one SIEM strategy differs from the others and what to expect from the offerings on the market.
Posted: 20 Nov 2015 | Published: 30 Nov 2011

AccelOps Inc.

The Insider Threat: From Risk to Detection
sponsored by Interset Software Inc.
WHITE PAPER: In this white paper, you will learn the 3 most common types of insider attacks and how to build an effective defense against them.
Posted: 12 Jan 2016 | Published: 30 Dec 2015

Interset Software Inc.

Secure Any Data, Anywhere
sponsored by Vera
WHITE PAPER: In this white paper, you will learn how to effectively protect any kind of data. Find out how you can track, audit and manage the policies in real-time and secure your data no matter what device, person, cloud or application it travels to.
Posted: 25 Jan 2016 | Published: 01 Dec 2015

Vera

5 Steps to Empowering Employees for Secure Cloud Service Usage
sponsored by IBM
WHITE PAPER: This brief infographic highlights five necessary steps to secure cloud service usage. Find out how you can discover, identify, and track cloud application usage and ultimately empower employees to safely use cloud services.
Posted: 07 Dec 2015 | Published: 07 Dec 2015

IBM

Create Your Own Private ISAC: Tips for Sharing Threat Intelligence
sponsored by SurfWatch Labs
WHITE PAPER: This white paper discusses how cyber security professionals can build an information sharing and analysis center (ISAC) to disseminate security intelligence and insights among partners.
Posted: 10 Jul 2015 | Published: 10 Jul 2015

SurfWatch Labs

Personally Identifiable Information (PII) and Personal Health Information (PHI)
sponsored by Voltage Security, Inc.
WHITE PAPER: This white paper features an encrypted email solution that eliminates the need for paper-driven information sharing processes, and ensures secure, compliant transfers.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

Voltage Security, Inc.

Cover Your SaaS!
sponsored by BitGlass
WHITE PAPER: This white paper reveals the top 5 cloud security solutions to invest in to best protect your virtualized assets.
Posted: 17 Jun 2014 | Published: 17 Jun 2014

BitGlass
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement