Business of Information Technology  >   Business Management  >  

Managing Risk

RSS Feed    Add to Google    Add to My Yahoo!
Managing Risk White Papers (View All Report Types)
 
Eliminating Security Weak Points with Next-Gen NAC
sponsored by ForeScout Technologies, Inc.
WHITE PAPER: Access this white paper to learn how next-gen network access control (NAC) empowers you to define, implement, and enforce granular access policies for connecting endpoints based on user identity, role, device, location, and other factors.
Posted: 23 Feb 2015 | Published: 04 Dec 2014

ForeScout Technologies, Inc.

Security predictions for 2015
sponsored by Imperva
WHITE PAPER: With the insight of security experts and the help of analytics tools, this white paper presents five security predictions for the 2015 security landscape.
Posted: 27 Feb 2015 | Published: 31 Jan 2015

Imperva

Reducing Data Center Complexity with a Unified DCIM Platform
sponsored by IBM
WHITE PAPER: View this white paper to learn about a data center infrastructure management (DCIM) platform that unifies systems and operations and provides you with a single-pane-of-glass view into your hardware and software. Read on now to learn how a DCIM platform simplifies virtual environments management, automates more manual tasks, and mitigates risk.
Posted: 29 Jan 2015 | Published: 01 Aug 2014

IBM

8 Things You're Doing Now that Will Get You Audited
sponsored by Avalara
WHITE PAPER: Explore this exclusive white paper to uncover 8 things that can increase your company's sales tax audit risk so you can optimize accordingly.
Posted: 19 Jan 2015 | Published: 19 Jan 2015

Avalara

Why DNS Security is Essential
sponsored by Cloudmark
WHITE PAPER: This white paper covers exactly how attackers use DNS to compromise a network.
Posted: 25 Feb 2015 | Published: 25 Feb 2015

Cloudmark

A Clear View into User Activities with Identity Intelligence
sponsored by IBM
WHITE PAPER: Access this white paper to learn about an identity intelligence platform that can help better manage and secure users as a key line of defense across infrastructure perimeters.  Additionally, view now to read several case stories of organizations who have had success with this identity intelligence platform.
Posted: 25 Feb 2015 | Published: 17 Sep 2014

IBM

NAC Vendor Face-off
sponsored by ForeScout Technologies, Inc.
WHITE PAPER: In this white paper, learn everything you need to know about NAC and endpoint security to protect your data. Read on to uncover an NAC vendor comparison, the pros and cons of each platform, and which system may be right for your cyber defense strategy.
Posted: 19 Feb 2015 | Published: 07 Jan 2015

ForeScout Technologies, Inc.

Discover the Capabilities of a Next Generation Firewall
sponsored by Cisco Systems, Inc.
WHITE PAPER: This in-depth white paper provides a close look at a next generation firewall, describing each of its capabilities in detail.
Posted: 18 Feb 2015 | Published: 31 Dec 2014

Cisco Systems, Inc.

Strategies to Mitigate Business Risk
sponsored by Hewlett-Packard Company
WHITE PAPER: View this white paper to learn how automating repetitive tasks and utilizing a single-pane-of-glass view into your infrastructure can reduce downtime costs by up to 60%. Read on to learn how new servers can protect your business from risk.
Posted: 07 Jan 2015 | Published: 13 Aug 2014

Hewlett-Packard Company

Behavior-based Protection Strategies from the Network to Remote Endpoints.
sponsored by IBM
WHITE PAPER: This white paper looks at behavior-based protection, a comprehensive security system that fights the latest threats.
Posted: 24 Feb 2015 | Published: 31 Oct 2014

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement