IT Management  >   Systems Operations  >   Security  >   Security Management  >  

ITM

RSS Feed    Add to Google    Add to My Yahoo!
ITMWhite Papers (View All Report Types)
 
Breaking down silos of protection: An integrated approach to managing application security
sponsored by IBM
WHITE PAPER: This resource explores the critical risks created by application growth, why point products are unable to offer adequate protection, and the value of taking an integrated approach to managing application security.
Posted: 05 Mar 2014 | Published: 31 Oct 2013

IBM

Multi-Layer Security Platforms: The New Definition of Best of Breed
sponsored by Fortinet, Inc.
WHITE PAPER: Significant changes in the threat, technology, and regulatory landscapes are forcing organizations to implement an array of security controls. This white paper explores the benefits of integrating multiple security layers into a single solution.
Posted: 01 Feb 2007 | Published: 01 Jun 2006

Fortinet, Inc.

A pragmatic approach to security - How to stay secure in 2012
sponsored by Dell SecureWorks UK
WHITE PAPER: While it can be tempting to simply buy new security technologies to solve your problems, they are unlikely to help if the basics of an effective security practice are not in place. In this white paper, discover how your organisation can apply pragmatism to IT security and do more with what you already have.
Posted: 18 Nov 2011 | Published: 18 Nov 2011

Dell SecureWorks UK

6 Tips for Choosing a UTM Solution
sponsored by Astaro
WHITE PAPER: Organizations today are replacing multiple, outdated and costly security appliances with a more simplified, single unified threat management (UTM) solution. Which one is best for your business? In this paper, gain key advice on how to choose a comprehensive UTM solution.
Posted: 13 Jan 2012 | Published: 13 Jan 2012

Astaro

WebPulse Collaborative Defense
sponsored by BlueCoat
WHITE PAPER: Malware is constantly evolving, so you need a dynamic security defense that can keep up with the latest web-based threats. Learn how the Blue Coat WebPulse™ collaborative defense powers Blue Coat's web security portfolio, delivering fast and effective Web 2.0 threat protection for 75 million users worldwide.
Posted: 04 Nov 2011 | Published: 04 Nov 2011

BlueCoat

Stopping Fake Antivirus: How to Keep Scareware off Your Network
sponsored by Sophos, Inc.
WHITE PAPER: This paper provides insight into where fake antivirus comes from and how it is distributed, what happens when a system is infected with fake antivirus, and how to stop this persistent threat from infecting your network and your users.
Posted: 04 Oct 2011 | Published: 01 Sep 2011

Sophos, Inc.

Beating the Bad Guys: Strategies to Mitigate the Malware Threat
sponsored by RSA, The Security Division of EMC
WHITE PAPER: While there is no silver bullet to eliminate cybercrime and malware, there are ways to mitigate risk, requiring a combination of multiple technologies to protect endpoints, online sessions and transactions. View this paper to examine the regulatory environment and uncover successful strategies for beating the bad guys.
Posted: 23 Nov 2011 | Published: 23 Nov 2011

RSA, The Security Division of EMC

Hybrid Clouds
sponsored by Trend Micro, Inc.
WHITE PAPER: Hybrid clouds offers the best of both worlds, but it also has the largest attack surface, requiring organizations to deploy security across both private and public cloud elements. This white paper explores the business benefits of hybrid clouds, security considerations, and how to mitigate risks.
Posted: 07 Oct 2011 | Published: 07 Oct 2011

Trend Micro, Inc.

Web Filtering: An Essential Part of a Consolidated Security System
sponsored by Fortinet, Inc.
WHITE PAPER: In spite of the billions of dollars invested in security, web-borne threats are still on the rise. Enterprises need a security system that can enforce granular web access policies on all devices used to access the web from inside and outside the network perimeter.
Posted: 01 Aug 2011 | Published: 29 Jul 2011

Fortinet, Inc.

Layered Security: Protecting Your Data in Today's Threat Landscape
sponsored by Tripwire, Inc.
WHITE PAPER: In this white paper, learn how threats have evolved over time, shortcomings of the perimeter-centric approach to security, steps to implementing a layered security approach to security, and much more.
Posted: 15 Nov 2011 | Published: 15 Nov 2011

Tripwire, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
ITM White Papers | ITM Multimedia | ITM IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement