IT Management  >   Systems Operations  >   Security  >  

IT Security Management

RSS Feed    Add to Google    Add to My Yahoo!
IT Security Management White Papers (View All Report Types)
 
SANS: What are their Vulnerabilities? A Survey on Continuous Monitoring
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Continuous monitoring is among the latest approaches to keep your company safe from hackers, but most monitoring systems fall short of what it takes to keep hackers out. Read this SANS survey report to find out why.
Posted: 10 Jun 2016 | Published: 10 Jun 2016

Hewlett Packard Enterprise

A DevSecOps Playbook
sponsored by CloudPassage
WHITE PAPER: There is a fundamental struggle between the speed that cloud services provide and security. In this white paper discover the concept of DevSecOps, a departure from traditional thoughts about speed vs. security.
Posted: 19 Jul 2016 | Published: 31 Mar 2016

CloudPassage

Gain Capabilities to help you Protect, and Insight to Understand
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: As threats evolve, organizations must find ways to continuously detect, prevent, and respond quickly to attacks on the endpoint in order to limit damages. Discover a strategy that can help you protect endpoint devices against advanced and zero-day threats.
Posted: 10 Jun 2016 | Published: 10 Jun 2016

Check Point Software Technologies Ltd.

ShareFile Enterprise Security White Paper
sponsored by Citrix
WHITE PAPER: Access this white paper to learn about an enterprise follow-me data solution that enables IT to deliver a robust data sharing and sync service that meets the mobility and collaboration needs of users and the data security requirements of the enterprise.
Posted: 09 May 2016 | Published: 30 Dec 2015

Citrix

Move Your Email to the Cloud with Confidence
sponsored by Mimecast
WHITE PAPER: As Office 365 adoption grows, Microsoft and all of its customers become a more appealing target. Explore the top five reasons you need a "Plan B" when it comes to securing Office 365.
Posted: 24 May 2016 | Published: 24 May 2016

Mimecast

Cybersecurity for Banking and Financial Institutions
sponsored by Delta Risk
WHITE PAPER: Follow this primer for IT professionals who are looking to protect their organization and secure their networks from attack while remaining in compliance with evolving regulations. In addition to discussing the nature of the modern cyberthreat, it also discusses the numerous extra burdens specifically for banking and financial firms.
Posted: 08 Jun 2016 | Published: 08 Jun 2016

Delta Risk

Your Guide to Secure Access Architecture
sponsored by Fortinet, Inc.
WHITE PAPER: Evolving changes in usage, devices, and applications create an enormous challenge for IT organizations to protect the network from threat vectors. Explore ways to enable a secure network access architecture that helps keep internal enterprise assets safe, and protects users from cyber-attacks.
Posted: 23 Jun 2016 | Published: 23 Jun 2016

Fortinet, Inc.

QRadar SIEM
sponsored by IBM
WHITE PAPER: Protecting today's complex networks against malicious activities is a never-ending task. Learn how you can boost threat protection and compliance by developing security intelligence.
Posted: 15 Jun 2016 | Published: 20 Dec 2013

IBM

Security Reference Blueprint for Industrial Control Systems
sponsored by Palo Alto Networks
WHITE PAPER: Targeted attacks against national, critical infrastructure are a serious threat that must be addressed with the highest priority, given how these systems are responsible for controlling critical services. Learn ways to reduce operational risks, prevent system breaches, and become compliant with both government and internal governance.
Posted: 21 Jun 2016 | Published: 21 Jun 2016

Palo Alto Networks

Strengthen Desktop Virtualization Security by Minimizing Endpoint Attack Surfaces
sponsored by Dell, Inc.
WHITE PAPER: Explore some of today's challenges in endpoint security and how desktop virtualization strategies can significantly reduce risks and improve protection at endpoints. You'll also examine real-world examples of organizations using desktop virtualization architectures with thin clients to enhance security.
Posted: 22 Jun 2016 | Published: 22 Jun 2016

Dell, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement