Business of Information Technology  >   Business Management  >   Financial Management  >   Budgeting  >   IT Spending  >  

Network Security Spending

RSS Feed    Add to Google    Add to My Yahoo!
Network Security Spending White Papers (View All Report Types)
 
Defending Against Rogue Users, Devices, and Applications
sponsored by ForeScout Technologies, Inc.
WHITE PAPER: This white paper explains how NAC technologies help to ensure that only appropriate users, devices, and applications have access to your network resources, enabling you to support your users in a secure, efficient way.
Posted: 17 Feb 2015 | Published: 29 Aug 2014

ForeScout Technologies, Inc.

IT Security: Creating Heroes Instead of Headaches
sponsored by BitDefender
WHITE PAPER: In this white paper, discover insights on how you can transform your security system into one that not only protects your business, but propels it forward as well.
Posted: 28 Apr 2015 | Published: 28 Apr 2015

BitDefender

Taking Charge of Security in a Hyperconnected World
sponsored by RSA
WHITE PAPER: Access this resource to uncover the top mistakes IT managers are making in their security strategies, and why they need a more continuous approach to improving defense systems in today's ever changing threat landscape.
Posted: 06 Dec 2013 | Published: 31 Oct 2013

RSA

Quantifying the Impact of Network-Based Attacks
sponsored by Icomm Technologies
WHITE PAPER: In this informative whitepaper, explore in-depth guidelines that will help assess the impact of attacks on your organization, and they can affect your bottom line.
Posted: 18 Sep 2014 | Published: 18 Sep 2014

Icomm Technologies

Risk Management: Bridging Policies and Procedures - Fundamental Security Concepts
sponsored by Global Knowledge
WHITE PAPER: This white paper discusses risk management as a key process in designing security architectures, including a better way for security managers to approach the security ROI issue.
Posted: 10 Dec 2008 | Published: 11 Oct 2008

Global Knowledge

The Danger Deepens: Neustar Annual DDoS Attacks and Impact Report
sponsored by Neustar┬«
WHITE PAPER: This resource analyzes survey results regarding distributed denial of service (DDoS) attacks to see how they've evolved into an even great threat. Click through to learn how you should prepare.
Posted: 02 May 2014 | Published: 02 May 2014

Neustar®

Verity Credit Union Streamlines Application Access, Reduces Helpdesk Costs and Improves Customer Service
sponsored by Imprivata
WHITE PAPER: This case study shares one credit union's experience with an authentication solution that helped it efficiently manage user access across all applications without hindering productivity or adding costs.
Posted: 11 Apr 2014 | Published: 28 Feb 2010

Imprivata

Creating a Culture of Change Management
sponsored by Tripwire, Inc.
WHITE PAPER: Download this paper and discover how to create a culture of change management in your organization that mitigates the risk of malicious changes and provides security staff with a reliable, objective view of change across your entire enterprise.
Posted: 01 Mar 2007 | Published: 01 Feb 2007

Tripwire, Inc.

Next-Generation Authentication: Keys to Balancing Security and Convenience
sponsored by SafeNet Asia Ltd
WHITE PAPER: This white paper highlights the top characteristics and requirements for next-generation authentication that's built to endure a constantly evolving and risk-filled IT landscape.
Posted: 09 Jan 2014 | Published: 28 Oct 2013

SafeNet Asia Ltd

First Annual Cost of Cyber Crime Study
sponsored by ArcSight, an HP Company
WHITE PAPER: Despite widespread awareness of the impact of cybercrime, cyber attacks continue to occur frequently and result in serious financial consequences for businesses and government institutions.
Posted: 07 Feb 2011 | Published: 07 Feb 2011

ArcSight, an HP Company
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement