IT Management  >   Systems Operations  >   Security  >  

Managing IT Security

RSS Feed    Add to Google    Add to My Yahoo!
Managing IT Security White Papers (View All Report Types)
Your Quick Reference Guide to Always-On SSL
sponsored by Symantec
WHITE PAPER: Learn in quick and easy bullet points and infographics what Always-On SSL is, why it works, and what it can do for your organization.
Posted: 30 Sep 2016 | Published: 30 Sep 2016


User Behavior Analysis in the Cloud
sponsored by Symantec + Blue Coat
WHITE PAPER: Visibility into real-time traffic, the apps users access, and the activity within these apps can help organizations keep risk out of their cloud environments. Learn more about the powerful combination of machine learning and cloud computing.
Posted: 12 Oct 2016 | Published: 12 Oct 2016

Symantec + Blue Coat

Streamlining Security Incident and Vulnerability Response
sponsored by ServiceNow
WHITE PAPER: The biggest obstacles to achieving "incident response excellence" are security and IT tool integration and coordinating incident response. Learn how the right security operations solution could simplify the coordination of incident response measures, effectively reducing your time-to-response.
Posted: 29 Sep 2016 | Published: 29 Sep 2016


The DDoS Factor: Cost, Facts & Insight into 2017's Most Advanced Cyberattack Vector
sponsored by A10 Networks
WHITE PAPER: In September 2016, cybersecurity journalist Brian Krebs fell victim to one of the largest DDoS attacks ever recorded. Learn about this incident as well as other organizations' DDoS hardships. Discover why DDoS attacks are so dangerous to every enterprise and see the financial impact these attacks have had in recent months.
Posted: 19 Oct 2016 | Published: 30 Sep 2016

A10 Networks

Assessing the Security of 10 Top Enterprise Apps
sponsored by Wandera
WHITE PAPER: 10 of the most popular business apps used on corporate-liable devices were put through an extensive security assessment using the Open Web App Security Project (OWASP) Mobile Security Risks as a foundation. Find out how these 10 apps performed on the OWASP tests so that you can better prepare your mobile security strategy for enterprise apps.
Posted: 18 Oct 2016 | Published: 31 May 2016


Transformative Technology in Document Security
sponsored by HP
WHITE PAPER: This IDC Insight reviews how 3rd platform technologies such as mobile, cloud, and big data play a role in technology suppliers expanding their print security service offerings.
Posted: 24 Oct 2016 | Published: 29 May 2015


Traditional Security Solutions Aren't Enough: Add Micro-Segmentation to your Virtual Network
sponsored by VMware
WHITE PAPER: In a recent survey, 60% of respondents said they had adopted network virtualization to help address concerns with data security. Learn how building micro-segmentation on your virtualized network can help you verify and secure all resources, limit and strictly enforce access control, and more.
Posted: 27 Oct 2016 | Published: 27 Oct 2016


Best Practices for Secure and Efficient Onboarding and Off-boarding
sponsored by RES Software
WHITE PAPER: Onboarding and off-boarding can be a nightmare when it comes to account and network permissions. Learn why provisioning identities and access in today's enterprise environment is inefficient and how to leverage the benefits of a workforce that consistently has the digital resources it needs.
Posted: 12 Oct 2016 | Published: 12 Oct 2016

RES Software

Best-of-Breed Next-Generation Security For the Mid-Market
sponsored by Barracuda Networks
WHITE PAPER: Discover a security framework that integrates purpose-built, highly scalable security solutions to protect users, networks, and data center applications. Learn how to secure your network against intrusions and protect against email and web threats.
Posted: 18 Oct 2016 | Published: 30 Sep 2016

Barracuda Networks

4 Ways Neustar Strengthens your DNS Security
sponsored by Neustar
WHITE PAPER: The once blue skies of cyber space have become the Wild West. Discover 4 steps you can take to protect DNS, lower business risk and defend your brand. Defend your organization against every new and existing malicious actor on the web to ensure customer safety and zero site downtime.
Posted: 10 Oct 2016 | Published: 31 Dec 2015

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement