IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Information Security Policies

RSS Feed    Add to Google    Add to My Yahoo!
Information Security Policies White Papers (View All Report Types)
 
There's Never Been A Better Time to Worry Less and Innovate More
sponsored by Cisco
WHITE PAPER: You need tools that fight digital vermin for you. Explore ways to leverage simple security, so your business can do what it does best: innovate and grow.
Posted: 13 Jun 2016 | Published: 13 Jun 2016

Cisco

Rethinking Data Discovery And Data Classification
sponsored by IBM
WHITE PAPER: Many see data discovery and classification as a Sisyphean task. This Forrester report breaks down why S&R pros struggle with data discovery and security and advises how to best approach data classification moving forward.
Posted: 25 Jul 2016 | Published: 01 Oct 2014

IBM

Staying ahead of threats with global threat intelligence and automated protection
sponsored by IBM
WHITE PAPER: In this white paper you will discover how to stay ahead of the ever evolving security landscape and keep your precious data safe.
Posted: 19 Jan 2016 | Published: 30 Jun 2015

IBM

The Art and Science of Value Realization in the Cloud
sponsored by Infor
WHITE PAPER: Discover how to optimize your enterprise's cloud expense and see just how much business value it creates. See such value added as physical records saving, workforce hours, and streamlined workloads.
Posted: 25 Jul 2016 | Published: 25 Jul 2016

Infor

Cybersecurity Predictions for 2016
sponsored by Global Knowledge
WHITE PAPER: Discover 10 cybersecurity predictions for 2016. Read on to prepare your enterprise for: digital extortion becoming fully automated, the inevitability of digital payment systems becoming compromised, wearables leading to data leaks, and more.
Posted: 16 Jun 2016 | Published: 16 Jun 2016

Global Knowledge

Build A High-Performance, Customer-Obsessed Security Organization
sponsored by AllClear ID
WHITE PAPER: This white paper provides CISOs with an end-to-end look at what it takes to build a high-performance security practice. Access now to learn how to build a risk management framework that's designed to support changing business models and retain customer trust.
Posted: 28 Apr 2016 | Published: 09 Feb 2016

AllClear ID

Sandbox Technology: Building an Effective Breach Detection and Response Strategy
sponsored by Fortinet, Inc.
WHITE PAPER: Security professionals need to detect threats and manage risks to avoid data breaches. Discover why sandboxing is an essential component of a comprehensive prevention, detection, and response strategy to mitigate future attacks.
Posted: 23 Jun 2016 | Published: 30 Oct 2015

Fortinet, Inc.

Mobile Threat Prevention Behavioral Risk Analysis
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Discover what it means to have an advanced approach to comprehensive mobile security. Learn how you can closely monitor new or updated apps installed on the device, use app reputation to eliminate malware false-positives, and more.
Posted: 13 Jul 2016 | Published: 13 Jul 2016

Check Point Software Technologies Ltd.

Gain Capabilities to help you Protect, and Insight to Understand
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: As threats evolve, organizations must find ways to continuously detect, prevent, and respond quickly to attacks on the endpoint in order to limit damages. Discover a strategy that can help you protect endpoint devices against advanced and zero-day threats.
Posted: 10 Jun 2016 | Published: 10 Jun 2016

Check Point Software Technologies Ltd.

Secure Enterprise Email on Mobile Devices
sponsored by IBM
WHITE PAPER: Discover the key to securing and controlling enterprise emails on mobile devices in a BYOD environment. Uncover the value of separating personal and corporate data on phones and tablets, using a single sign-on for authentication, and more.
Posted: 17 Jun 2016 | Published: 17 Jun 2016

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement