IT Management  >   Systems Operations  >   Security  >  

Infosecurity

RSS Feed    Add to Google    Add to My Yahoo!
Infosecurity White Papers (View All Report Types)
 
Anatomy of a Data Breach - Why Breaches Happen and What to Do About It
sponsored by Symantec Corporation
WHITE PAPER: This paper examines the three most common sources of data breaches, and offers a broad perspective on what can be done to stop data breaches, as well as specific recommendations to take preventive action.
Posted: 23 Aug 2010 | Published: 18 Aug 2010

Symantec Corporation

Microsoft Office 365: Strengthening Security, Compliance, and Control
sponsored by Mimecast
WHITE PAPER: This white paper discusses how third party enhancements focused on security, archiving, and encryption can provide more capable, granular services than Microsoft offers in Office 365.
Posted: 12 Jun 2014 | Published: 20 Feb 2014

Mimecast

Best Practices in eCatalog Management
sponsored by Ariba, Inc.
WHITE PAPER: At the heart of procurement systems is a catalog. Even in environments lacking automation, requisitioners consult a hard copy or customer service reps use a catalog at the other end of a phone line. Getting everyone to use the correct catalog from a preferred vendor at the contracted price will ensure that negotiated savings are actually realized.
Posted: 11 Jun 2010 | Published: 11 Jun 2010

Ariba, Inc.

Advanced Threats: The New World Order
sponsored by RSA
WHITE PAPER: This paper examines the state of advanced threats on the front lines, as seen by the companies, law enforcement officials and government leaders. View now to gain a better understanding of these emerging threats, its challenges to all organizations and how to defend against them.
Posted: 25 Oct 2011 | Published: 25 Oct 2011

RSA

Building Your Business Case for Managed File Transfer
sponsored by OpenText
WHITE PAPER: The following paper is designed to act as a resource for completing a business report for a Managed File Transfer Solution. The paper will begin by detailing some of the costs associated with traditional methods of file transfer, followed by benefits of having an MFT solution, and some resources for business report writing.
Posted: 15 Nov 2011 | Published: 11 Nov 2011

OpenText

Layered Security: Protecting Your Data in Today's Threat Landscape
sponsored by Tripwire, Inc.
WHITE PAPER: In this white paper, learn how threats have evolved over time, shortcomings of the perimeter-centric approach to security, steps to implementing a layered security approach to security, and much more.
Posted: 15 Nov 2011 | Published: 15 Nov 2011

Tripwire, Inc.

Network Security Technologies Technical Guide
sponsored by SearchSecurity.com
WHITE PAPER: Read this expert guide to learn about the latest trends and risks that threaten today's networks. Learn more about modern threat detection, device security, security assessments and more.
Posted: 03 Apr 2013 | Published: 31 Dec 2012

SearchSecurity.com

SANS Institute Making Database Security an IT Security Priority
sponsored by Oracle Corporation
WHITE PAPER: Tanya Baccum, SANS Institute analyst, discusses the importance of having an appropriate IT security strategy that mitigates risk to databases by introducing key steps and controls to effective database security.
Posted: 13 Jun 2011 | Published: 30 Nov 2009

Oracle Corporation

Global Threat Report: July 2010
sponsored by ESET
WHITE PAPER: Read this paper to get a full analysis of ESET’s ThreatSense.Net®, a sophisticated malware reporting and tracking system, which shows that the highest number of detections this month with almost 12.47% of the total was scored by the Win32/Conficker class of threat.
Posted: 13 Aug 2010 | Published: 13 Aug 2010

ESET

McAfee Endpoint Protection Suite
sponsored by Intel Security
WHITE PAPER: This whitepaper will introduce you to a security solution that addresses advanced malware, data loss, and other issues from a single, manageable environment and can help limit your exposure to Internet threats. Read on and discover how this solution can offer you advanced e-mail virus and spam protection, comprehensive device control, and more.
Posted: 31 May 2013 | Published: 31 May 2013

Intel Security
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement