IT Management  >   Systems Operations  >   Security  >  

Management of Security Information

RSS Feed    Add to Google    Add to My Yahoo!
Management of Security Information White Papers (View All Report Types)
Enhanced Access Control for the Healthcare Industry
sponsored by Imprivata
WHITE PAPER: This report takes a look at security designed for healthcare, discussing what single sign-on, virtual desktop access and more looks like when it complies with healthcare needs.
Posted: 25 Sep 2015 | Published: 31 Mar 2015


2015 Global DDoS Threat Landscape Report
sponsored by Imperva
WHITE PAPER: DDoS attacks against network infrastructures continue to grow in size and duration. Download the report and learn what to expect and how you can protect your website from such attacks.
Posted: 06 Oct 2015 | Published: 06 Oct 2015


Network Encryption and its Impact on Security
sponsored by Blue Coat Systems
WHITE PAPER: This research report looks at the prevalence of network traffic encryption and decryption, examining the challenges these practices present
Posted: 16 Sep 2015 | Published: 16 Sep 2015

Blue Coat Systems

Introduction to Managed Security Service Providers
sponsored by MASERGY
WHITE PAPER: This white paper introduces the basics of managed security services, giving you the facts you need to decide if security outsourcing makes sense for your business.
Posted: 17 Sep 2015 | Published: 17 Sep 2015


Five Reasons to Adopt a Managed Security Service
sponsored by MASERGY
WHITE PAPER: This white paper discusses the benefits of adopting an MSSP, listing five main reasons why it might be a good investment for you.
Posted: 21 Sep 2015 | Published: 21 Sep 2015


Streamline Endpoint Security with the Cloud
sponsored by Trustwave
WHITE PAPER: This white paper explains how putting endpoint security in the cloud can give you effective security that's both affordable and simple.
Posted: 02 Oct 2015 | Published: 31 Dec 2014


The Essential Guide to Building a Strong MDM Foundation
sponsored by IBM
WHITE PAPER: In this essential guide, you will learn the about 12 best practices for implementing mobile device management in your business. Read on here to start introducing these MDM strategies, taking your organization to the next level.
Posted: 09 Oct 2015 | Published: 09 Oct 2015


Dangers of the Deep, Dark Web
sponsored by IBM
WHITE PAPER: This white paper describes two of the most frequently used Deep Web networks and suggests how you can stay safe from attacks that originate there.
Posted: 11 Sep 2015 | Published: 31 May 2015


Build Security into Your Data Center's DNA with Micro-Segmentation
sponsored by VMware, Inc.
WHITE PAPER: This white paper introduces a new method of data center security that's based on integrating security controls with the hypervisors.
Posted: 02 Sep 2015 | Published: 02 Sep 2015

VMware, Inc.

Inside the Dyre Wolf Malware Campaign
sponsored by IBM
WHITE PAPER: This white paper gives a step-by-step outline of how the Dyre Wolf attack is accomplished and how organizations can detect and prevent compromise.
Posted: 08 Sep 2015 | Published: 30 Jun 2015

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement