IT Management  >   Systems Operations  >   Security  >  

Infosecurity

RSS Feed    Add to Google    Add to My Yahoo!
InfosecurityWhite Papers (View All Report Types)
 
Following the Rules, Reducing the Risk
sponsored by IBM
WHITE PAPER: This white paper discusses strategies for the often daunting challenge of meeting compliance requirements, including how to get your business' records in order, select technology to help with the task of information governance, and more.
Posted: 22 Oct 2014 | Published: 22 Oct 2014

IBM

Enterprises Have Room for Improvement in Secure IT Asset Disposition
sponsored by Iron Mountain
WHITE PAPER: Access this resource to learn why secure IT disposition is a must in order to prevent data loss and compliance violations.
Posted: 12 Dec 2013 | Published: 12 Dec 2013

Iron Mountain

9 Ways to Secure Your Store Systems and Ensure PCI Compliance
sponsored by Bit9, Inc.
WHITE PAPER: This white paper provides 9 strategies for retail security professionals to take control of their security posture and reduce the burden of achieving and maintaining PCI compliance.
Posted: 18 Dec 2014 | Published: 18 Dec 2014

Bit9, Inc.

How to tackle Enterprise Information Protection & Control
sponsored by ComputerWeekly.com
WHITE PAPER: Information protection needs to cover all data, from word processing documents to datawithin databases and executable code. It covers enterprise and personal data and is not justconfined to protecting entertainment media, which tends to be generically referred to as“Digital Rights Management” (DRM).
Posted: 20 Oct 2011 | Published: 09 Nov 2010

ComputerWeekly.com

Virtualization Security Report: 10 Ways to Regain Control and Reduce Risk
sponsored by Citrix
WHITE PAPER: This resource highlights the top 10 benefits of adding desktop virtualization to information security strategies for an increasingly diverse and expansive IT environment.
Posted: 05 May 2014 | Published: 31 May 2013

Citrix

Preventing Dangerous File-Sharing
sponsored by GlobalScape
WHITE PAPER: This resource offers 4 steps to help prevent employees from using unsecured consumer-grade file-sharing solutions.
Posted: 09 May 2014 | Published: 31 Dec 2013

GlobalScape

Taking the fear out of bringing Government Systems online
sponsored by IBM
WHITE PAPER: People are quickly navigating to a more mobile environment and many individuals are urging government agencies to develop online services. In the past, certain aspects of online sharing have caused government agencies to hesitate, but this white paper helps outline some of the benefits of online systems.
Posted: 27 Dec 2012 | Published: 24 Jul 2012

IBM

Getting Ahead of Advanced Threats - Achieving Intelligence-Driven Security
sponsored by RSA
WHITE PAPER: With today’s advancing threat landscape, traditional approaches to information security are no longer enough. Instead organizations need to take an intelligence-driven approach to more effectively detect and mitigate cyber attacks. View now to explore the growing need for intelligence-driven security and uncover a 6-step approach for achieving it.
Posted: 07 Mar 2012 | Published: 07 Mar 2012

RSA

Network Security Technologies Technical Guide
sponsored by SearchSecurity.com
WHITE PAPER: Read this expert guide to learn about the latest trends and risks that threaten today's networks. Learn more about modern threat detection, device security, security assessments and more.
Posted: 03 Apr 2013 | Published: 31 Dec 2012

SearchSecurity.com

Leveraging Security Intelligence for Energy and Utilities Companies
sponsored by IBM
WHITE PAPER: Learn how an integrated security intelligence platform provides the necessary components to help energy and utilities companies automate compliance and risk management, detect and manage threats, and protect the smart grid from both security breaches and cyber-attacks.
Posted: 24 Mar 2014 | Published: 31 Jul 2013

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement