Business of Information Technology  >   Business Management  >   Financial Management  >   Budgeting  >   IT Spending  >  

Information Security Spending

RSS Feed    Add to Google    Add to My Yahoo!
Information Security Spending White Papers (View All Report Types)
 
Intergrated Mobile Security for Small and Midsize Businesses
sponsored by SearchSecurity.com
WHITE PAPER: This resource demonstrates how small and medium-sized business can combat the rapidly growing threats inherent in mobile computing. Read now to learn how cloud-based mobile protection can offer robust mobile protection while delivering noticeablecost efficiencies.
Posted: 17 May 2013 | Published: 17 May 2013

SearchSecurity.com

Guard Data In Government Environments by Implementing Continuous Diagnostics and Mitigation
sponsored by IBM
WHITE PAPER: This resource features a cost-effective automated diagnostics and mitigation security solution that offers continuous protection and is easily integrated with existing systems.
Posted: 09 May 2014 | Published: 31 Dec 2013

IBM

Real-time Monitoring, Alerts, and Analysis Offer In-Depth Security
sponsored by Dell SecureWorks
WHITE PAPER: This case study explores how implementing Dell SecureWorks enabled pharmaceutical firm ProStrakan to keep pace with an increasingly sophisticated threat landscape of malware and viruses, as well as complex security legislation across its multiple sites.
Posted: 01 Mar 2012 | Published: 01 Mar 2012

Dell SecureWorks

The New Face of Intrusion Prevention
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Check Point IPS Software Blade gives breakthrough performance and protection at a breakthrough price. For more details, check out this paper, which highlights the numerous benefits of Check Point intrusion prevention protection solutions.
Posted: 29 Sep 2009 | Published: 12 Jun 2009

Check Point Software Technologies Ltd.

Behavioral Analytics Applied to Security
sponsored by FileTrek
WHITE PAPER: This white paper details a new approach to threat detection that leverages big data and behavioral analytics technology to improve data protection and risk prevention.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

FileTrek

The Business Value of Integrated Anti-Virus Management
sponsored by IBM
WHITE PAPER: This white paper features an integrated anti-malware protection solution that not only improves identification and remediation across all endpoints, but also offers benefits to your bottom line.
Posted: 13 May 2014 | Published: 31 Jan 2014

IBM

Free yourself to do more, while securing your business simply and cost-effectively
sponsored by Sophos, Inc.
WHITE PAPER: It's vital for businesses to secure their systems and data against a growing field of threats. However, implementing and maintaining full-spectrum protection can be a heavy drain on financial and human resources if not done right. Read this whitepaper to learn how a more efficient approach to security can free up much needed resources.
Posted: 24 Jun 2009 | Published: 24 Jun 2009

Sophos, Inc.

Security-In-Depth Using Integrated Risk-Conscious Controls
sponsored by Tripwire, Inc.
WHITE PAPER: This white paper explores how your organization can change the way it protects its critical data, combining preventive, detective and corrective controls to stop breaches from happening, detect threats as they arise, and correct settings that introduce security risk or non-compliance. Read now to learn more.
Posted: 28 Sep 2012 | Published: 30 Dec 2011

Tripwire, Inc.

Quantifying the Impact of Network-Based Attacks
sponsored by Icomm Technologies
WHITE PAPER: In this informative whitepaper, explore in-depth guidelines that will help assess the impact of attacks on your organization, and they can affect your bottom line.
Posted: 18 Sep 2014 | Published: 18 Sep 2014

Icomm Technologies

Risk Management: Bridging Policies and Procedures - Fundamental Security Concepts
sponsored by Global Knowledge
WHITE PAPER: This white paper discusses risk management as a key process in designing security architectures, including a better way for security managers to approach the security ROI issue.
Posted: 10 Dec 2008 | Published: 11 Oct 2008

Global Knowledge
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement