IT Management  >   Systems Operations  >   Security  >  

Management of Security Information

RSS Feed    Add to Google    Add to My Yahoo!
Management of Security Information White Papers (View All Report Types)
 
How to Prevent Attacks from Ever Breaching You in the First Place
sponsored by Cisco and Dimension Data
WHITE PAPER: Discover how today's sophisticated attacks routinely evade conventional after-the-fact technologies such as firewalls and signature-based malware detection, and why it's now essential to adopt new measures that predictively neutralize these modern threats.
Posted: 21 Mar 2017 | Published: 21 Mar 2017

Cisco and Dimension Data

Fine-Tune Money Laundering Detection Tools with Analytics, Machine Learning
sponsored by BAE Systems
WHITE PAPER: Discover how to improve money laundering detection with analytics and machine-learning that can help you fine-tune anti-money laundering (AML) tools and test, simulate, and export AML models.
Posted: 28 Feb 2017 | Published: 03 Jan 2017

BAE Systems

Is Onboard Key Storage the Right Corporate Strategy?
sponsored by Gemalto
WHITE PAPER: Learn the answer to the question: "Is onboard key storage a 'good enough' solution, or is an external key management system something that should be deployed?"
Posted: 09 Mar 2017 | Published: 09 Mar 2017

Gemalto

Your Guide to the 2016 Global Threat Intelligence Report
sponsored by Cisco and Dimension Data
WHITE PAPER: Security isn't just beating today's threats: It's a matter of preparing for future threats and mitigating their effects. Dive into this global threat intelligence report and learn how to leverage deep insight into lessons learned from 2016 and 2015, what weaknesses the industry has yet to rectify, what hackers are targeting and where, and more.
Posted: 22 Mar 2017 | Published: 22 Mar 2017

Cisco and Dimension Data

Why Perimeter Defenses Fail in the Face of Modern Threats
sponsored by Gemalto
WHITE PAPER: Discover what security features businesses are focusing on, why perimeter defense is not a cure-all for data breaches, and the consequences for not proofing your organization adequately for the modern threat landscape.
Posted: 13 Mar 2017 | Published: 31 May 2016

Gemalto

The Rise of the Secure Internet Gateway
sponsored by Cisco and Dimension Data
WHITE PAPER: With the responsibility of preventing and mitigating the damage of breach risks falling heavily on the shoulders of IT pros, the reality of the cloud, a mobile workforce, and borderless networks can make their job seem nearly impossible. In this white paper learn how to change the game's rules when it comes to better protecting today's workforce.
Posted: 21 Mar 2017 | Published: 21 Mar 2017

Cisco and Dimension Data

Strategies to Ensure Success for your Privileged Management Project
sponsored by One Identity
WHITE PAPER: Learn how to properly secure, manage, and govern the accounts belonging to "superusers" – privileged accounts.
Posted: 10 Mar 2017 | Published: 10 Mar 2017

One Identity

Mitigate the Harm a Lack of Security Professionals Can Do
sponsored by Armor
WHITE PAPER: Cybersecurity is a tricky subject in today's threat landscape. Learn how to gain a significant cybersecurity advantage, providing your organization with proactive vulnerability scanning, continuous patching and monitoring, dedicated compliance expertise, and more.
Posted: 13 Mar 2017 | Published: 13 Mar 2017

Armor

The Importance of Threat Intelligence Services
sponsored by Dell SecureWorks
WHITE PAPER: Threat actors are upping the ante in their methods to penetrate your environment. Don't leave your IT environment prone to attack. Learn about detection tech and methods that can provide your organization with elite cyber threat intelligence, malware analysis and rapid incident response.
Posted: 09 Mar 2017 | Published: 30 Dec 2016

Dell SecureWorks

Myth vs. Reality: What You Need to Know About Microsoft Office 365 Backup
sponsored by Unitrends
WHITE PAPER: Learn how data loss occurs in cloud applications, as well as how to restore email in seconds instead of hours, recover files even after Office 365 purges, safeguard all of your users' data, and more.
Posted: 13 Mar 2017 | Published: 13 Mar 2017

Unitrends
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement