IT Management  >   Systems Operations  >   Security  >  

Managing IT Security

RSS Feed    Add to Google    Add to My Yahoo!
Managing IT SecurityWhite Papers (View All Report Types)
 
Rising security concern for online and mobile banking
sponsored by HID
WHITE PAPER: This resource explains the rising security concern for online and mobile banking, especially apparent in today's evolving threat landscape.
Posted: 07 Aug 2014 | Published: 23 Jul 2014

HID

How to Create a Peripheral Firewall System for Multi-Tenant Clouds
sponsored by Zentera Systems Inc.
WHITE PAPER: Learn how Zentera zChamber creates peripheral firewall systems in mult-tenant cloud computing environments.
Posted: 21 Aug 2014 | Published: 21 Aug 2014

Zentera Systems Inc.

Use Case: Secure Internet Access for 71,000 Australian Students
sponsored by Websense, Inc.
WHITE PAPER: This white paper describes a use case involving an Australian educational in need of a centralized, scalable solution in order to distribute materials to 45,000 users per day in safe, easily accessible manner.
Posted: 07 Aug 2014 | Published: 07 Aug 2014

Websense, Inc.

Comparing Security Information and Event Management (SIEM) Technologies
sponsored by LogRhythm, Inc.
WHITE PAPER: Check out this Magic Quadrant report for security information and event management to see how leading vendors compare and contrast.
Posted: 29 Jul 2014 | Published: 25 Jun 2014

LogRhythm, Inc.

The Convergence of Security and Compliance
sponsored by Bit9, Inc.
WHITE PAPER: This informative paper highlights potential compliance and security gaps, what effect these gaps can have on your organization, and how to close these gaps to bolster the security of servers and endpoints. Additionally, explore a discussion around 5 core compliance controls.
Posted: 18 Aug 2014 | Published: 31 Jul 2014

Bit9, Inc.

Diversionary and Multivector DDoS Attacks
sponsored by Juniper Networks, Inc.
WHITE PAPER: In this essential white paper, you'll learn about the rise of these destructive attacks, why they are so difficult to block, and how an integrated security solution could help keep your organization protected.
Posted: 07 Aug 2014 | Published: 07 Aug 2014

Juniper Networks, Inc.

Move from Chaos to Control:  Creating a Mature File Transfer Process
sponsored by IBM
WHITE PAPER: When it comes to moving files between people, business, and other processes a majority of organizations are struggling. This webcast will show you how to defeat your file transfer demons.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

IBM

Privileged Account Security: Protect Your Data without Sacrificing Efficiency
sponsored by BeyondTrust Corporation
WHITE PAPER: Read this white paper to learn how new security solutions can help your business manage privileged account security without sacrificing efficiency.
Posted: 01 Aug 2014 | Published: 28 Feb 2014

BeyondTrust Corporation

The Heartbleed Bug: How To Protect Your Business
sponsored by Symantec Corporation
WHITE PAPER: In this in-depth white paper, learn how new security platforms can protect your data against Heartbleed and any future attacks with advanced tools like two-factor authentication.
Posted: 06 Aug 2014 | Published: 06 Aug 2014

Symantec Corporation

TMG Replacement Guide
sponsored by Sophos, Inc.
WHITE PAPER: This TMG replacement guide covers a few key areas of Microsoft's TMG, and addresses a unified threat management system that can replace TMG and improve your network protection. Discover more about this system's interface that simply works, and why you don't need to panic without Microsoft's TMG.
Posted: 11 Aug 2014 | Published: 31 Jul 2013

Sophos, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement