IT Management  >   Systems Operations  >   Security  >  

Managing IT Security

RSS Feed    Add to Google    Add to My Yahoo!
Managing IT Security White Papers (View All Report Types)
 
GDPR Compliance: From a Compliance Burden to a Security Opportunity
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Uncover the complexities involved in complying with the GDPR, and why many organizations need to rethink their approach to processing personal data if they are going to mitigate the burden of compliance and avoid getting fined.
Posted: 08 Jun 2017 | Published: 08 Jun 2017

Symantec & Blue Coat Systems

Vulnerability Management Buyer's Guide
sponsored by Rapid7
WHITE PAPER: In this buyer's guide learn the 4 essential components in an effective vulnerability management (VM) program, as well as other considerations to take into account like the price, and ROI to take into account when shopping for your VM system.
Posted: 07 Jun 2017 | Published: 07 Jun 2017


The App is the Endpoint
sponsored by Blue Cedar
WHITE PAPER: Uncover 5 fundamental reasons why security leaders are moving away from a device management paradigm and instead are focusing on treating the app as the endpoint.
Posted: 14 Jun 2017 | Published: 31 Dec 2016

Blue Cedar

The State of Endpoint Security: Approaches, Opportunities and Conclusions
sponsored by TrendMicro
WHITE PAPER: Discover an overview and breakdown of approaches, opportunities and conclusions regarding of the current state of endpoint security.
Posted: 13 Jun 2017 | Published: 13 Jun 2017

TrendMicro

6 Security Facts You Should be Considering
sponsored by The Media Trust
WHITE PAPER: Learn 6 critical website security facts, shining light on how to keep your site safe in today's threat landscape.
Posted: 12 Jun 2017 | Published: 12 Jun 2017

The Media Trust

Protection and Productivity: Securing Privilege on the Endpoint
sponsored by CyberArk Software, Inc
WHITE PAPER: Explore the challenges surrounding the proper handling of privileged accounts to mitigate risk.
Posted: 31 May 2017 | Published: 31 May 2017

CyberArk Software, Inc

4 Critical Elements of a Successful GRC Implementation
sponsored by Rsam
WHITE PAPER: Uncover 4 critical factors organizations should consider before designing their GRC deployment so that they can properly satisfy key use case needs, mitigate risks, and meet compliance regulations.
Posted: 19 Jun 2017 | Published: 19 Jun 2017

Rsam

Mapping the Ransomware Landscape
sponsored by Fortinet, Inc.
WHITE PAPER: Learn how to deploy an advanced security approach to combat ransomware using next-generation firewalls, layered security, and proactive threat intelligence.
Posted: 06 Jun 2017 | Published: 06 Jun 2017

Fortinet, Inc.

Five DLP Tips from Security Executives
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Learn 5 tips to improve your organization's DLP, how to use DLP to protect regulated data and reduce business risk, and more.
Posted: 26 May 2017 | Published: 26 May 2017

Symantec & Blue Coat Systems

Ensure Success for Your IAM Project
sponsored by One Identity
WHITE PAPER: Discover how to achieve success with your IAM project. Learn about the 3 pillars of IAM functionality, 3 major reasons why IAM projects fail, how your peers struggle with IAM, and more.
Posted: 30 May 2017 | Published: 30 May 2017

One Identity
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement