IT Management  >   Systems Operations  >   Security  >  

Managing IT Security

RSS Feed    Add to Google    Add to My Yahoo!
Managing IT Security White Papers (View All Report Types)
 
Device Fingerprinting: A New Tool for Enhanced Application Protection
sponsored by Radware
WHITE PAPER: Access this white paper to learn the five common factors challenging IP-based identification and how device fingerprinting can make it easier.
Posted: 10 Jul 2015 | Published: 29 May 2015

Radware

15 SIEM Products Analyzed and Reviewed
sponsored by IBM
WHITE PAPER: This resource objectively evaluates fifteen SIEM technologies and provides you with a detailed report of each one.
Posted: 24 Jun 2015 | Published: 25 Jun 2014

IBM

Get Control of Cloud Based File Synchronization Services
sponsored by Varonis
WHITE PAPER: In this white paper, discover how you can allow your employees to use file synchronization without putting your data at risk.
Posted: 25 Jun 2015 | Published: 31 Dec 2014

Varonis

Web Security Threat Report 2015
sponsored by Symantec
WHITE PAPER: By using data from the most comprehensive global intelligence network in the world, this resource provides a breakdown of each type of cyber-attack and how you can prevent it.
Posted: 28 Jul 2015 | Published: 28 Jul 2015

Symantec

Building Application Centric, Security-Enabled Data Centers
sponsored by Cisco Systems, Inc.
WHITE PAPER: Access this white paper to discover the Cisco solution that delivers application centric security automation in existing and next-generation data centers.
Posted: 20 Jul 2015 | Published: 29 Nov 2013

Cisco Systems, Inc.

Why IT Professionals Need to Take Responsibility for Data Security
sponsored by Oracle Corporation
WHITE PAPER: This white paper presents the results of a survey that asked IT professionals about their data security practices, revealing the areas where most organizations need to improve.
Posted: 04 Aug 2015 | Published: 31 Oct 2014

Oracle Corporation

The 10 Keys to Seeing 20/20 on Your EMM Vision
sponsored by Accelerite
WHITE PAPER: Mobile devices, BYOD initiatives, cloud applications, and new technologies have ushered in fundamental changes in the way corporate IT needs to think about and manage endpoints in businesses, schools, healthcare, and beyond. This white paper examines the must-have strategies for IT mobility management implementation in your organization.
Posted: 30 Jul 2015 | Published: 30 Jul 2015

Accelerite

Business-Critical Documents: Printing You Can Count On
sponsored by Nuance
WHITE PAPER: Improving your cost-effective printing is crucial. Whether printing from a desktop, mobile device or back office system, you can ensure critical and confidential documents are printed at the right place and time.
Posted: 28 Jul 2015 | Published: 27 Sep 2014

Nuance

Fast Detection & Deep Understanding: Responding Effectively to Cyber Attacks
sponsored by BAE Systems Applied Intelligence (formerly SilverSky)
WHITE PAPER: This white paper discusses the importance of the relationship between threat identification and security intelligence, and gives tips on how you can improve both of these factors.
Posted: 07 Jul 2015 | Published: 31 Dec 2013

BAE Systems Applied Intelligence (formerly SilverSky)

Perimeter Security Can’t Protect Your Cloud Workloads
sponsored by CloudPassage
WHITE PAPER: This white paper explains how implementing an automated, cloud-centric security platform can help you keep you cloud infrastructure secure from any threat.
Posted: 15 Jul 2015 | Published: 15 Jul 2015

CloudPassage
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement