IT Management  >   Systems Operations  >   Security  >  

IT Security Management

RSS Feed    Add to Google    Add to My Yahoo!
IT Security Management White Papers (View All Report Types)
 
Peer-to-Peer Peril: How Peer-to-Peer File Sharing Impacts Vendor Risk and Security Benchmarking
sponsored by BitSight
WHITE PAPER: BitSight recently observed the networks of 30,700 companies across all industries and found 23% of organizations were using the BitTorrent protocol for peer-¬to-¬peer file sharing. In this report you will learn which industries excel in mitigating the risks of file sharing, how P2P file sharing activity impacts security ratings and more.
Posted: 05 Feb 2016 | Published: 05 Feb 2016

BitSight

Protect Privileged Credentials Across Traditional and Virtual Data Centers, and all Cloud Environments
sponsored by CA Technologies.
WHITE PAPER: This white paper highlights a solution for privileged credential management that drives IT risk reduction and operational efficiency by supporting traditional, virtualized, and hybrid-cloud infrastructures. Read on to discover how this platform can allow your enterprise to protect and manage all your credentials.
Posted: 04 Feb 2016 | Published: 04 Feb 2016

CA Technologies.

Security Intelligence for the Modern Data Center
sponsored by AccelOps Inc.
WHITE PAPER: Organizations need an intelligent approach to understand data and proactively detect security threats and anomalies. In this white paper, learn how to consolidate security, performance, and compliance monitoring into a single pane of glass to improve protection across environments
Posted: 17 Nov 2015 | Published: 03 Nov 2015

AccelOps Inc.

Combat the Rise of Malware
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This resource discusses the growing malware threat and gives suggestions for combatting zero-day attacks, non-executable attacks, and more.
Posted: 13 Nov 2015 | Published: 26 Oct 2015

Check Point Software Technologies Ltd.

Security Information and Event Management FAQs
sponsored by AccelOps Inc.
WHITE PAPER: In this white paper, review the top SIEM strategy evaluation FAQs to better understand what products offer what services and help your organization choose the right approach. View now to learn how one SIEM strategy differs from the others and what to expect from the offerings on the market.
Posted: 20 Nov 2015 | Published: 30 Nov 2011

AccelOps Inc.

Best Practices for Securing Privileged Identities
sponsored by CA Technologies
WHITE PAPER: Baseline OS protection is not enough to protect from today's sophisticated attacks. Download now to examine how you can supplement your security system and reduce your risk with four key steps to effective security of privileged accounts.
Posted: 01 Feb 2016 | Published: 30 Jun 2015

CA Technologies

Top 5 Reasons to Combine Network and Security Operations Centers
sponsored by AccelOps Inc.
WHITE PAPER: This white paper outlines the 5 most important reasons why you should combine network and security operations centers. Read on to learn how this new structure can help your organizations with compliance, threat management, automation, and more.
Posted: 23 Dec 2015 | Published: 23 Dec 2015

AccelOps Inc.

Are Energy and Utilities at Risk of a Major Breach?
sponsored by BitSight
WHITE PAPER: This white paper discusses the security performance of six key industry sectors.
Posted: 02 Feb 2016 | Published: 30 Sep 2015

BitSight

The Insecurity of Network-Connected Printers: Address Hardcopy Document Security
sponsored by HP Limited
WHITE PAPER: In this exclusive report, you will examine the risks dredged up by insecure printers and other peripheral devices in your business, as well as discover several best-in-class action strategies and practices for addressing end-point device and hardcopy document security.
Posted: 12 Jan 2016 | Published: 31 Oct 2015

HP Limited

Case Study: Government Contractor Secures its Data with Enhanced Analytics
sponsored by Blue Coat Systems
WHITE PAPER: Access this case study to learn how a defense contractor cut down on security incidents and protected its sensitive assets by implementing an advanced security analytics platform.
Posted: 07 Dec 2015 | Published: 07 Dec 2015

Blue Coat Systems
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement