IT Management  >   Systems Operations  >   Security  >  

IT Security Management

RSS Feed    Add to Google    Add to My Yahoo!
IT Security Management White Papers (View All Report Types)
5 Signs You Need A Mobile Security Game Plan
sponsored by Appthority
WHITE PAPER: Learn five signs that indicate you need to step up your mobile security game plan. If mobile security is your blind spot or you simply sense a breach on the horizon, the time to beef up mobile security is right now.
Posted: 05 Oct 2016 | Published: 30 Sep 2016


Tick! Tock! Have You Detected the Intruder Inside Your Network Yet?
sponsored by Dell Software
WHITE PAPER: In this precautionary white paper, get in the mind of a cyber attacker and learn the key ways for preventing a breach by quickly identifying suspicious behavior and containing the attackers inside your network. Also, learn about key benefits and limitations of both native tools and security information and event management (SIEM) solutions.
Posted: 03 Oct 2016 | Published: 01 Jul 2016

Dell Software

Executive Guide: Safely Adopting Office 365
sponsored by Symantec + Blue Coat
WHITE PAPER: To safely and effectively adopt 0ffice 365, you must budget and plan for additional security measures and you will probably need to provision up to accommodate higher internet traffic volumes. This executive guide provides key security and provisioning considerations to keep in mind during your move to Office 365.
Posted: 12 Oct 2016 | Published: 31 Aug 2016

Symantec + Blue Coat

2016 Mobile Security & Business Transformation Study
sponsored by IBM
WHITE PAPER: Enterprise mobility has transformed security and business practices. Access the 2016 Mobile Security & Business Transformation Study, and learn what 200 respondents had to say about how organizations like yours can conduct -- and secure -- enterprise mobility.
Posted: 20 Oct 2016 | Published: 20 Oct 2016


Insider Threat Spotlight Report
sponsored by Dell Software
WHITE PAPER: The increase in insider data theft highlights the need for better security practices. In fact, 40% of organizations don't even have the ability to detect insider threats. Access this spotlight report on insider threats to uncover more key trends that demonstrate the magnitude of this risk, and what you can do to prevent it.
Posted: 28 Sep 2016 | Published: 28 Sep 2016

Dell Software

Unisys Managed Security Services Featuring LogRhythm
sponsored by Unisys
WHITE PAPER: Many enterprises find the task of sifting through their vast stores of logs in order to identify critical security events a daunting task. Learn about a simplified way to not only monitor your network logs for malicious activity, but implement a fully-fledged security monitoring policy covering the entire holistic attack surface.
Posted: 07 Oct 2016 | Published: 16 Jul 2016


Application Security Assessment
sponsored by Kaspersky Lab
WHITE PAPER: Access this app security assessment to uncover and mitigate vulnerabilities throughout the app lifecycle. Discover how to detect security flaws for cloud, ERP, web, and mobile apps so that you can radically improve your ability to protect critical data and systems.
Posted: 26 Oct 2016 | Published: 31 Dec 2015

Kaspersky Lab

Why NGFWs Are Becoming the New Standard in Enterprise Security
sponsored by Fortinet, Inc.
WHITE PAPER: The next-generation firewall (NGFW) is quickly becoming the new standard approach for enterprise security. Discover how your organization can add a high performance, highly effective NGFW without slowing down daily business operations. Learn how you can achieve unparalleled protection, ease of use and ultrafast performance with your NGFW.
Posted: 12 Oct 2016 | Published: 30 Sep 2016

Fortinet, Inc.

Data Protection in Two Dimensions
sponsored by EOH IBM
WHITE PAPER: Discover a better approach to SSD data protection. Learn how to implement two independent dimensions of data protection, monitor your flash media's health, managed flash failures efficiently and optimize the utilization of all your flash resources.
Posted: 27 Oct 2016 | Published: 01 Jan 2016


Best Practices for Secure and Efficient Onboarding and Off-boarding
sponsored by RES Software
WHITE PAPER: Onboarding and off-boarding can be a nightmare when it comes to account and network permissions. Learn why provisioning identities and access in today's enterprise environment is inefficient and how to leverage the benefits of a workforce that consistently has the digital resources it needs.
Posted: 12 Oct 2016 | Published: 12 Oct 2016

RES Software
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement