IT Management  >   Systems Operations  >   Security  >  

Managing IT Security

RSS Feed    Add to Google    Add to My Yahoo!
Managing IT Security White Papers (View All Report Types)
 
A Strategic Partner for Proactive Security
sponsored by CrowdStrike
WHITE PAPER: This brochure explains how choosing the right security partner can help you thrive in today's dangerous cybercrime environment.
Posted: 03 Aug 2015 | Published: 03 Aug 2015

CrowdStrike

Achieving Data-Drive Security Intelligence
sponsored by Splunk
WHITE PAPER: This white paper discusses how you can obtain the kind of data-driven security that's needed for combatting today's advanced threats.
Posted: 14 Aug 2015 | Published: 31 Dec 2014

Splunk

Secure Remote Data Collection for Better Data Use
sponsored by Splunk
WHITE PAPER: This white paper describes how a secure method of remote data collection can enable your enterprise to better analyze and leverage all the data in your network, not just the data generated in a central location.
Posted: 17 Aug 2015 | Published: 31 Dec 2014

Splunk

Four Steps to a Proactive Big Data Security Strategy
sponsored by IBM
WHITE PAPER: This white paper introduces four essential steps to proactively securing all the data in your enterprise.
Posted: 17 Aug 2015 | Published: 30 Jun 2014

IBM

Top 10 Data Security Tips to Safeguard Your Business
sponsored by Absolute
WHITE PAPER: This white paper describes ten steps you can take to increase your cybersecurity.
Posted: 06 Aug 2015 | Published: 06 Aug 2015

Absolute

Obtaining Network Information for Successful Security
sponsored by Splunk
WHITE PAPER: This white paper discusses how advanced network monitoring technologies can help you detect even the subtlest attacks.
Posted: 17 Aug 2015 | Published: 31 Dec 2014

Splunk

Why IT Professionals Need to Take Responsibility for Data Security
sponsored by Oracle Corporation
WHITE PAPER: This white paper presents the results of a survey that asked IT professionals about their data security practices, revealing the areas where most organizations need to improve.
Posted: 04 Aug 2015 | Published: 31 Oct 2014

Oracle Corporation

EMM Report Card: 10 Mobility Suites to Keep an Eye On
sponsored by IBM
WHITE PAPER: This white paper examines and compares 10 of the top EMM suites to look out for, highlighting the pros and cons to each. Read on to find out which dynamic suite best stacks up when it comes to the EMM magic quadrant of features.
Posted: 06 Aug 2015 | Published: 06 Aug 2015

IBM

Strong Authentication: Securing Identities and Enabling Productivity
sponsored by SafeNet, Inc.
WHITE PAPER: Access this informative white paper to learn how strong authentication methods like USB tokens and smart cards are helping organizations to stay ahead of the security curve.
Posted: 20 Aug 2015 | Published: 20 Aug 2015

SafeNet, Inc.

The ESG Cybersecurity Maturity Model
sponsored by Hewlett-Packard Company
WHITE PAPER: Based on their research, Enterprise Strategy Group has developed a cyber security maturity model that classifies organizations as basic, progressing, or advanced.
Posted: 18 Aug 2015 | Published: 22 Oct 2014

Hewlett-Packard Company
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement