IT Management  >   Systems Operations  >   Security  >  

Infosecurity

RSS Feed    Add to Google    Add to My Yahoo!
Infosecurity White Papers (View All Report Types)
 
Security Services: Security Information Management (SIM) Solutions
sponsored by Dell SecureWorks
WHITE PAPER: The intent of this paper is to provide an executive-level summary of the potential costs associated with managing information security in-house and highlights the advantages of using a Managed Security Services Provider (MSSP) to reduce costs and improve the quality of protection.
Posted: 24 Mar 2011 | Published: 24 Mar 2011

Dell SecureWorks

Secure Mobile Access for Enterprise Employees
sponsored by CA Technologies.
WHITE PAPER: This white paper explains the top 4 challenges of integrating corporate data with mobile applications for remote users. Click now to unveil a solution that acts as a mobile gateway and ensures data adaptation, performance optimization, security, and improved management for mobile developers.
Posted: 07 Feb 2014 | Published: 31 Dec 2012

CA Technologies.

How can Identity and Access Management Improve IT Security and Reduce Risk to Help Drive my Business?
sponsored by CA Technologies.
WHITE PAPER: IAM builds a foundation for effective security by helping ensure all users have only the appropriate level of access rights to all protected resources, and that those rights are enforced appropriately. Read this executive brief to learn more about taking control of IT operations and information security with Content-Aware IAM.
Posted: 25 Nov 2010 | Published: 01 Sep 2010

CA Technologies.

Analyst advice for IT security leaders
sponsored by IBM
WHITE PAPER: Business leaders around the world are increasingly concerned about the protection of intellectual property. In this informative Forrester report, view the results of a survey of 225 IT security leaders about their investments in information security.
Posted: 14 Nov 2013 | Published: 31 Mar 2013

IBM

Staying Ahead of Cyberthreats: Recommendations for Financial Institutions
sponsored by Dell SecureWorks
WHITE PAPER: Today’s investment firms and banks continue to struggle with the growing number of security and regulatory challenges they face. This paper explores the serious threats that financial institutions face and what they can do to address them.
Posted: 02 Mar 2012 | Published: 02 Mar 2012

Dell SecureWorks

What you didn’t know about Certificate-Based Authentication
sponsored by OpenTrust
WHITE PAPER: You may want to consider a next-generation Public Key Infrastructure (PKI) solution to improve IT security cost-effectively. Read this whitepaper to learn what you should know about next-gen PKI.
Posted: 29 Jun 2013 | Published: 29 Jun 2013

OpenTrust

Enterprises Have Room for Improvement in Secure IT Asset Disposition
sponsored by Iron Mountain
WHITE PAPER: Access this resource to learn why secure IT disposition is a must in order to prevent data loss and compliance violations.
Posted: 12 Dec 2013 | Published: 12 Dec 2013

Iron Mountain

Ovum: Corporate eGRC update
sponsored by RSA
WHITE PAPER: This report explores the state of E-Governance, Risk and Compliance (eGRC), studying over 340 senior executives responsible for eGRC activities in their organization. View now to uncover key findings regarding the integration of eGRC activities, ownership of eGRC strategy, and drivers for eGRC activities today and in the future.
Posted: 29 Mar 2012 | Published: 01 Dec 2010

RSA

Mapping Security for your Virtual Environment
sponsored by Hewlett-Packard Company
WHITE PAPER: Access this brief white paper that addresses the concern over managing virtual environment security with an enterprise-ready system that provides full visibility of physical and virtual data center and simplified security policy management.
Posted: 25 Sep 2013 | Published: 31 May 2012

Hewlett-Packard Company

How to Protect the Increasingly Vulnerable Energy Industry
sponsored by IBM
WHITE PAPER: Learn how an integrated security intelligence platform provides the necessary components to help energy and utilities companies automate compliance and risk management, detect and manage threats, and protect the smart grid from both security breaches and cyber-attacks.
Posted: 24 Mar 2014 | Published: 31 Jul 2013

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement