IT Management  >   Systems Operations  >   Security  >  

IT Security Management

RSS Feed    Add to Google    Add to My Yahoo!
IT Security Management White Papers (View All Report Types)
 
Achieve Business Continuity with Secure and Reliable Unified Communications
sponsored by ThinkingPhones
WHITE PAPER: This white paper provides 5 steps to educating yourself on the common pitfalls when investing in a unified communications platform. Access this paper now to get insight into achieving long-term security and stability with UC.
Posted: 02 Sep 2015 | Published: 02 Sep 2015

ThinkingPhones

Detect Threats in Real Time with SaaS Endpoint Protection
sponsored by CrowdStrike
WHITE PAPER: This brochure describes how a cloud-based platform can enhance your endpoint security capabilities.
Posted: 03 Aug 2015 | Published: 03 Aug 2015

CrowdStrike

Safeguarding Access in the Distributed Network
sponsored by HID
WHITE PAPER: This white paper introduces a method of identity management that will safeguard any access point, even mobile and virtual ones.
Posted: 18 Aug 2015 | Published: 12 Feb 2013

HID

Authentication That Keeps Your Mobile Devices Secure
sponsored by HID
WHITE PAPER: This white paper introduces a way for you to boost mobile security by enhancing your authentication practices.
Posted: 18 Aug 2015 | Published: 20 Feb 2013

HID

5 Best Practices to Make Security Everyone's Business
sponsored by Citrix
WHITE PAPER: This white paper presents the five steps you can take to help your end users advance your security strategy instead of hindering it.
Posted: 30 Jul 2015 | Published: 30 Jul 2015

Citrix

Strong Authentication for Secure Employee Access
sponsored by Gemalto
WHITE PAPER: This white paper describes how to enable two-factor authentication to all users and resources using a single automated backend—either from the cloud or on-premises. Download now to see how your organization could benefit from strong authentication.
Posted: 20 Aug 2015 | Published: 20 Aug 2015

Gemalto

A Zero-Day Agnostic Approach to Defending Against Advanced Threats
sponsored by Digital Guardian
WHITE PAPER: This webinar transcript discusses how information security products have changed and why these changes are essential for tackling advanced threats.
Posted: 14 Aug 2015 | Published: 14 Aug 2015

Digital Guardian

Forrester: Use Actionable Threat Intelligence to Protect Your Digital Business
sponsored by Symantec Corporation
WHITE PAPER: Download this report from Forrester to figure out the key characteristic of actionable threat intelligence and learn how to maximize threat intelligence to protect your digital business from targeted cyber-attacks.
Posted: 14 Aug 2015 | Published: 14 Aug 2014

Symantec Corporation

The Evolution of Ransomware
sponsored by Symantec Corporation
WHITE PAPER: The white paper gives you an extensive look at the origins, development, and functioning of ransomware.
Posted: 14 Aug 2015 | Published: 06 Aug 2015

Symantec Corporation

The State of Enterprise Mobile Threats
sponsored by Lookout
WHITE PAPER: This report examines the current state of security threats to iOS and Android devices in the workplace.
Posted: 18 Aug 2015 | Published: 18 Aug 2015

Lookout
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement