IT Management  >   Systems Operations  >   Security  >  

Managing IT Security

RSS Feed    Add to Google    Add to My Yahoo!
Managing IT SecurityWhite Papers (View All Report Types)
 
Secure Network Access for Personal Mobile Devices
sponsored by Cisco
WHITE PAPER: This resource offers a solution to the challenges of mobility in the workplace, helping organizations realize the full benefits of BYOD without sacrificing strong security.
Posted: 31 Mar 2014 | Published: 30 Sep 2012

Cisco

DDOS Mitigation a Key Component in Network Security
sponsored by Ixia
WHITE PAPER: This expert e-guide explores why DDoS prevention needs to be a main part of your network security plan.
Posted: 27 Mar 2014 | Published: 27 Mar 2014

Ixia

Executive Guide to SYSPRO Security for Auditing Assurance and Control
sponsored by SYSPRO
WHITE PAPER: This white paper introduces an enterprise resource planning (ERP) system with the governance, risk, and compliance functionality you need to satisfy regulatory requirements and fuel security success.
Posted: 03 Apr 2014 | Published: 31 Dec 2013

SYSPRO

Financial Institutions, Merchants, and the Race Against Cyberthreats
sponsored by EMC Corporation
WHITE PAPER: Access this informative, in-depth white paper and discover why financial institutions and merchants are the most common targets for cyber-attacks, and what steps these businesses can take to protect themselves against attacks.
Posted: 04 Apr 2014 | Published: 31 Oct 2013

EMC Corporation

Best Practices for Selecting a Web Application Scanning (WAS) Solution
sponsored by Qualys
WHITE PAPER: This informative guide explores best practices for choosing a Web application scanning solution.
Posted: 15 Apr 2014 | Published: 16 May 2013

Qualys

A Practical "How-To" Guide for Creating Mobile Enterprise Programs
sponsored by IBM
WHITE PAPER: This informative paper discusses practical best practices for implementing effective mobile enterprise programs that can create significant value for employees, partners, and customers.
Posted: 08 Apr 2014 | Published: 30 Nov 2012

IBM

Two Great Ways to Protect Your Virtual Machines From Malware
sponsored by Sophos, Inc.
WHITE PAPER: This paper aims to help IT professionals, including security and virtualization specialists, understand and choose between two modern approaches to securing virtual environments.
Posted: 03 Apr 2014 | Published: 03 Apr 2014

Sophos, Inc.

What You Should Know About HIPPA and The Omnibus Final Rule
sponsored by Iron Mountain
WHITE PAPER: This resource explains the latest changes in HIPAA with the Omnibus Final Rule, and offers industry-leading advice on how to ensure compliance.
Posted: 09 Apr 2014 | Published: 31 Dec 2013

Iron Mountain

Cloud-based Enterprise Identity Management Using OAuth
sponsored by Forum Systems
WHITE PAPER: This resource highlights an authentication and authorization solution that offers protection beyond the username and password-only level.
Posted: 01 Apr 2014 | Published: 01 Apr 2014

Forum Systems

Open Hybrid Cloud: Meaningless Industry Jargon or the Future of Virtualization?
sponsored by Quru
WHITE PAPER: This whitepaper details the results of a study that looked at how much organizations really know about the hybrid cloud.
Posted: 08 Apr 2014 | Published: 16 Apr 2013

Quru
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement