IT Management  >   Systems Operations  >   Security  >  

Management of Security

RSS Feed    Add to Google    Add to My Yahoo!
Management of Security White Papers (View All Report Types)
 
Keep Your Customers Safe from Phishing
sponsored by Symantec Corporation
WHITE PAPER: This brief white paper presents one possible solution to the problem of phishing and helps you ensure the safety of your customers' data.
Posted: 20 Mar 2015 | Published: 31 Dec 2013

Symantec Corporation

Self-Assessment: How Prepared Are You for Advanced Attacks?
sponsored by FireEye
WHITE PAPER: Take this brief self-assessment for an estimate on how prepared you are and suggestions on how to improve.
Posted: 01 Apr 2015 | Published: 31 Dec 2014

FireEye

Enhanced Mobile Endpoint Security
sponsored by ESET
WHITE PAPER: This white paper describes a mobile endpoint security system that gives you anti-theft protection, drive security, application control and more.
Posted: 11 Mar 2015 | Published: 11 Mar 2015

ESET

Protect Your Data with Advanced Encryption
sponsored by ESET
WHITE PAPER: This resource introduces one way you can create unbreakable security for your data.
Posted: 12 Mar 2015 | Published: 31 Dec 2014

ESET

Anomaly Detection in Unstructured Data
sponsored by Prelert
WHITE PAPER: This article introduces an anomaly detection program aimed to aid with the analysis of unstructured data.
Posted: 23 Mar 2015 | Published: 27 Feb 2015

Prelert

Mitigate Your Biggest Security Risk: Business Users
sponsored by ObserveIT
WHITE PAPER: Do you know who poses the greatest security risk to your organization? Surprisingly, the answer is people closer than you think: your business users. In this white paper, discover five reasons why business users with access to critical applications are so risky.
Posted: 21 Mar 2015 | Published: 21 Mar 2015

ObserveIT

Stepping up the battle against advanced threats
sponsored by IBM
WHITE PAPER: This white paper examines how and why enterprises have failed to protect themselves against advanced threats and gives suggestions for better security.
Posted: 06 Mar 2015 | Published: 31 Jan 2015

IBM

7 Ways to Find Rogue Users
sponsored by Prelert
WHITE PAPER: This article gives you seven foolproof steps towards setting up insider security with less disruption and better accuracy.
Posted: 23 Mar 2015 | Published: 03 Apr 2014

Prelert

Security predictions for 2015
sponsored by Imperva
WHITE PAPER: With the insight of security experts and the help of analytics tools, this white paper presents five security predictions for the 2015 security landscape.
Posted: 27 Feb 2015 | Published: 31 Jan 2015

Imperva

How to Improve Your Threat Intelligence
sponsored by Threatstream
WHITE PAPER: This white paper discusses those problems and how threat intelligence is evolving to fix them.
Posted: 18 Mar 2015 | Published: 01 Jan 2015

Threatstream
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement