Business of Information Technology  >   Business Management  >   Financial Management  >   Budgeting  >   IT Spending  >  

IT Security Spending

RSS Feed    Add to Google    Add to My Yahoo!
IT Security Spending White Papers (View All Report Types)
 
Turn Identity into a Business Enabler, Not an IT Bottleneck
sponsored by Radiant Logic, Inc.
WHITE PAPER: This white paper highlights the benefits of a federated identity service that can help you to improve efficiencies, reduce risks, and maximize ROI.
Posted: 15 Apr 2014 | Published: 31 Dec 2013

Radiant Logic, Inc.

Protect Your Web Applications from the OWASP Top 10 Security Threats
sponsored by Imperva
WHITE PAPER: This white paper introduces a web application firewall (WAF) that protects companies' websites all over the world from a myriad of threats, including the OWASP Top 10, DDoS attacks, site scraping, and online fraud.
Posted: 08 Jul 2014 | Published: 31 Dec 2013

Imperva

9 Simple (but Critical) Tips for Effective Patch Management
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This resource offers 9 patch management best practices. Click now to reveal a comprehensive solution that will help you achieve effective patch management without suffering high costs.
Posted: 18 Mar 2014 | Published: 31 Dec 2013

Dell, Inc. and Intel®

Beginner's Guide to SSL Certificates: Making the Best Choice When Considering Your Online Security Options
sponsored by Symantec Corporation
WHITE PAPER: This helpful guide explains how the effective implementation of SSL certificates is critical to protecting your customers, earning their trust, and ensuring your success when it comes to conducting business online.
Posted: 08 Jan 2015 | Published: 10 Jun 2013

Symantec Corporation

Websense® Security Labs™: 8 Security Predictions for 2015
sponsored by Websense
WHITE PAPER: This must-read resource from Websense presents the top 8 security predictions for 2015.
Posted: 01 Dec 2014 | Published: 18 Nov 2014

Websense

Cover Your SaaS!
sponsored by BitGlass
WHITE PAPER: This white paper reveals the top 5 cloud security solutions to invest in to best protect your virtualized assets.
Posted: 17 Jun 2014 | Published: 17 Jun 2014

BitGlass

Security-In-Depth Using Integrated Risk-Conscious Controls
sponsored by Tripwire, Inc.
WHITE PAPER: This white paper explores how your organization can change the way it protects its critical data, combining preventive, detective and corrective controls to stop breaches from happening, detect threats as they arise, and correct settings that introduce security risk or non-compliance. Read now to learn more.
Posted: 28 Sep 2012 | Published: 30 Dec 2011

Tripwire, Inc.

2010 SMB Information Protection Survey by Symantec
sponsored by Symantec Corporation
WHITE PAPER: This year’s survey sheds light on precisely the risks small and midsized businesses (SMBs) are facing, what they are doing about it and how much it is costing them. It also provides some simple steps SMBs can take to improve their information protection footing.
Posted: 31 Aug 2010 | Published: 23 Jun 2010

Symantec Corporation

It’s Time Businesses Wake up to Mobile Security Reality
sponsored by Threat Track Security
WHITE PAPER: This resource underlines the importance of Mobile Device Management (MDM) in ensuring the security of your enterprise in the face of BYOD. Read now to learn how you can alleviate the pressure to account for, manage, and secure the wide range of new endpoints within your organization.
Posted: 29 Apr 2013 | Published: 29 Apr 2013

Threat Track Security

3 Key Components of a Risk-Based Security Plan
sponsored by Foundstone, Inc.
WHITE PAPER: This whitepaper takes a look at the different components of an effective security plan, and provides a perspective on how enterprises that are serious about their information security budgets should rethink their security plan.
Posted: 02 Jun 2008 | Published: 02 Jun 2008

Foundstone, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement