IT Management  >   Systems Operations  >   Security  >  

Management of Security

RSS Feed    Add to Google    Add to My Yahoo!
Management of Security White Papers (View All Report Types)
 
Defense-In-Depth with Internal Segmentation Firewalls
sponsored by Fortinet, Inc.
WHITE PAPER: Deployed at strategic points, internal segmentation firewalls (ISFWs) increase threat visibility and enhance breach discovery. Learn how to stop the uncontrollable spread of cyberthreats within your borderless network and prevent any single point from introducing vulnerability.
Posted: 08 Dec 2016 | Published: 30 Nov 2016

Fortinet, Inc.

Vendor Vulnerability: How to Prevent the Security Risk of Third-Party Suppliers
sponsored by Bomgar Corp.
WHITE PAPER: Learn the history of vendor ID theft and steps to mitigate its threat. Can you name the immediate and far-reaching concerns for vendor vulnerability? Find out what can be done on your end to ensure you manage (and prevent) this vulnerability.
Posted: 23 Nov 2016 | Published: 23 Nov 2016

Bomgar Corp.

The Top Cybersecurity Risks – And How Enterprises Are Responding
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Download this report, based on a 2016 Strategic Cybersecurity Survey of 300 IT and security professionals, to discover key strategies to promote smooth sailing when navigating your organization through the shifting threat management landscape, including also a risk assessment of cloud providers.
Posted: 23 Nov 2016 | Published: 31 Oct 2016

Arctic Wolf Networks, Inc.

Top Three Gaping Holes in Your Data Security
sponsored by Globalscape
WHITE PAPER: Regardless of efforts to secure your network from external threats, data breaches usually begin from inside. In this Globalscape paper, you'll learn: the 3 layers most targeted (the network, data & users), bad security practices, why Managed File Transfer is a critical component to combat bad practices, and more.
Posted: 08 Nov 2016 | Published: 08 Nov 2016

Globalscape

Turning Data Protection into a Game Changer for MSPs
sponsored by LogicNow
WHITE PAPER: Learn how to not only manage customers' hardware and software but also their data as well, protecting customer's confidential or regulated data, managing their vulnerabilities and demonstrating the value of these activities in easy to understand formats.
Posted: 07 Dec 2016 | Published: 07 Dec 2016

LogicNow

Why Digital Business Needs a New Approach to Information Security
sponsored by Entrust, Inc.
WHITE PAPER: Access this white paper to learn how companies are turning to new identity-centric, security technologies like PKI in order to extend the reach of their digital businesses and remain secure.
Posted: 30 Nov 2016 | Published: 30 Nov 2016

Entrust, Inc.

5 Ways to Achieve Big Data Protection
sponsored by Commvault
WHITE PAPER: Take a look at 5 key issues you must consider as you begin to embrace Big Data protection. Discover why organizations see Big Data protection as a huge challenge and learn the best strategies for protecting Big Data assets the same as you would "regular" data assets.
Posted: 15 Nov 2016 | Published: 31 Oct 2016

Commvault

Be Afraid of Your Shadow: What Is Shadow IT? And How to Reduce It
sponsored by Globalscape
WHITE PAPER: Are you sure that employees are only using IT-sanctioned ways of transferring data? If the answer is "no," then your sensitive data may be vulnerable. In this guide from Globalscape, you'll learn: what shadow IT is and its drawbacks, how to identify signs of a shadow IT problem, how to reduce shadow IT, and more.
Posted: 07 Nov 2016 | Published: 31 Oct 2016

Globalscape

How MDM Software Exposes Your Personal Data
sponsored by BitGlass
WHITE PAPER: Mobile device management software is widely used in organizations embracing the BYOD movement, but how much does it truly monitor? In this case study, several willing participants had MDM software installed on their personal devices. The outcome? Access this case study to find out.
Posted: 23 Nov 2016 | Published: 23 Nov 2016

BitGlass

Dangerous Threats Require Backup for Data Protection and Recovery
sponsored by Code42
WHITE PAPER: Discover the intricacies of data leakage and theft, the motivations and tactics of a wide range of attackers, and guidance for effective action against their machinations.
Posted: 17 Nov 2016 | Published: 30 Nov 2015

Code42
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement