IT Management  >   Systems Operations  >   Security  >  

Managing Security

RSS Feed    Add to Google    Add to My Yahoo!
Managing Security White Papers (View All Report Types)
 
A New Approach to Data Center Security
sponsored by VMware, Inc.
WHITE PAPER: In the following brief resource, learn how businesses are deepening their data center security strategies and effectiveness through micro-segmentation. View now and learn how this strategy enables security from the base level and can tie security directly into workloads as well as automatically provision policies when needed most.
Posted: 15 Apr 2016 | Published: 15 Apr 2016

VMware, Inc.

Mobile Security Checklist: Plan for Security and Compliance
sponsored by Sierraware
WHITE PAPER: BYOD is becoming the norm in today's business landscape and it is a major security threat. Access this white paper to learn about internet exploits, insider abuse, regulatory compliance and a checklist of steps you can take to ensure secure mobile networking.
Posted: 13 Apr 2016 | Published: 01 Apr 2016

Sierraware

CEO Fraud: How to Stop Impersonation Attacks
sponsored by Mimecast
WHITE PAPER: The following resource shows the results of 500 surveyed organizations that were victimized by whaling attacks. Access now to identify the impact of whaling attacks on other companies, so you can take the right safeguards in place.
Posted: 25 May 2016 | Published: 25 May 2016

Mimecast

Client Virtualization Solutions Deliver Enhanced Security and Compliance While Lowering Costs
sponsored by Dell, Inc., Intel and VMware
WHITE PAPER: As a financial services institution, you need to make data security, audit compliance, and risk mitigation a top priority while also adapting to highly demanding and increasingly mobile customers. Find our how client virtualization allows you to control your data safely in a data center while enabling mobile access to data and apps.
Posted: 03 May 2016 | Published: 03 May 2016

Dell, Inc., Intel and VMware

The CIO’s Guide to EMM
sponsored by BlackBerry
WHITE PAPER: Developing and evolving a proper mobile strategy can spell the difference between success and failure in today's business landscape. Are you sure your mobile strategy is meeting the requirements for success in the evolving enterprise mobility landscape?
Posted: 14 Apr 2016 | Published: 04 Apr 2016

BlackBerry

Managing Critical Security Controls
sponsored by Splunk
WHITE PAPER: In this e-book, you'll learn what security professionals find suitable to support access controls. Discover ways to verify incoming data, execute the requirements needed, and support human activities associated with a control.
Posted: 27 Apr 2016 | Published: 27 Apr 2016

Splunk

Why Traditional Data and Network Security is Not Good Enough
sponsored by Unisys
WHITE PAPER: Learn now about a security innovation that can eliminate the tradeoff between cost and risk, improve agility by strengthening data protection, and reduce reliance on physical technology infrastructure.
Posted: 13 May 2016 | Published: 13 May 2016

Unisys

Make More Money with Enterprise Mobility Suite Part 1
sponsored by Microsoft
WHITE PAPER: Enterprise mobility suite (EMS) is the next tool that is going to be making its mark on the business landscape. This white paper will teach you the basics of EMS, who it will benefit, and pain points that are being addressed.
Posted: 25 Mar 2016 | Published: 27 Nov 2015

Microsoft

Protect Your Network From the Inside-Out: Internal Segmentation Firewall (ISFW)
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper teaches you about Internal Segmentation Firewalls (ISFW), which can be deployed rapidly with minimum disruption to business operations. Access now and learn how to gain instant visibility and protection for your internal network.
Posted: 27 Apr 2016 | Published: 31 Dec 2015

Fortinet, Inc.

Understanding Cyberthreat Motivations to Improve Defense
sponsored by Intel Security
WHITE PAPER: Find out why you must add cyber-criminal motivation to your threat taxonomy in order to understand what causes a threat agent to commit harmful acts. Read on to discover in detail the elements of this new parameter and how this crucial understating of the hacker's mind can help protect your entire infrastructure.
Posted: 06 May 2016 | Published: 06 May 2016

Intel Security
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement