Public Policy Making

RSS Feed    Add to Google    Add to My Yahoo!
Public Policy Making White Papers (View All Report Types)
25 Matches
The Hidden Costs of Self-Signed SSL Certificates
sponsored by Symantec Corporation
WHITE PAPER: Many IT professionals believe that self-signed SSL certificates can help lower security costs. Unfortunately, aside from the certificate itself, there are a number of other costs. This paper uncovers the true total cost of ownership for self-signed SSL certificates and why they are costlier and riskier than working with a trusted security vendor.
Posted: 09 May 2012 | Published: 09 May 2012

Symantec Corporation

E-Guide: Physical Security Awareness and Smartphone Security Policy
sponsored by SearchSecurity.com
EGUIDE: In this e-guide, gain key insight for establishing better physical security and employee awareness for device usage. View now to uncover best practices and technologies that can help you lock down devices, and how to put device responsibility back in the hands of the employee.
Posted: 13 Feb 2012 | Published: 13 Feb 2012

SearchSecurity.com

Preventing Malware Attacks
sponsored by Websense, Inc.
EGUIDE: As new technologies emerge, so do new, and often defenseless avenues for malware attacks. In this expert guide, uncover proactive security measures for malware defense as well as gain best social networking practices for preventing social network malware.
Posted: 13 Feb 2012 | Published: 13 Feb 2012

Websense, Inc.

Workplace of the Future: DIY IT
sponsored by Hewlett-Packard Limited
WHITE PAPER: Explore the latest surrounding the trend of consumerization and uncover what your IT department can do to empower users while simultaneously protecting the organization.
Posted: 11 Dec 2012 | Published: 11 Dec 2012

Hewlett-Packard Limited

BYOPC Strategy: Policies and Problem Solving
sponsored by SearchSecurity.com
EGUIDE: Creating a bring your own PC (BYOPC) policy before implementation is crucial to the success of the initiative. In this E-Guide from SearchConsumerization.com, get help creating a policy that fulfills your employees' and your organizations' needs alike.
Posted: 13 Dec 2012 | Published: 13 Dec 2012

SearchSecurity.com

Websense® Security Labs™: 8 Security Predictions for 2015
sponsored by Websense
WHITE PAPER: This must-read resource from Websense presents the top 8 security predictions for 2015.
Posted: 01 Dec 2014 | Published: 18 Nov 2014

Websense

eGuide:Mitigating malicious advertisement malware
sponsored by SearchSecurity.com
EGUIDE: More than one million websites were infected by malicious advertisements, also known as malvertisements, in the last quarter of 2010. This expert guide explains why and how this form of attack is quickly spreading and offers technical advice on how to avoid infection.
Posted: 24 Jun 2011 | Published: 24 Jun 2011

SearchSecurity.com

Leveraging Security Intelligence for Energy and Utilities Companies
sponsored by IBM
WHITE PAPER: Learn how an integrated security intelligence platform provides the necessary components to help energy and utilities companies automate compliance and risk management, detect and manage threats, and protect the smart grid from both security breaches and cyber-attacks.
Posted: 24 Mar 2014 | Published: 31 Jul 2013

IBM

Protecting Against Web Application Threats Using SSL
sponsored by Symantec Corporation
WHITE PAPER: In this resource, readers learn about the many factors that leave web applications vulnerable to attack; how SSL encryption can help to prevent the risk of data loss; how to assess their current state of vulnerability; and much more.
Posted: 19 Jan 2015 | Published: 28 Feb 2014

Symantec Corporation

WLAN Best Practices: 10 Questions to Ask When Evaluating Solutions
sponsored by SearchSecurity.com
EGUIDE: Read this e-guide from our experts at SearchNetworking.com to gain a better understanding of WLAN solutions and how to evaluate them. Inside you'll find critical questions you should ask when exploring solutions as well as a discussion about the myths surrounding cloud-managed WLANs.
Posted: 20 May 2013 | Published: 20 May 2013

SearchSecurity.com

CW Special report on Symantec
sponsored by ComputerWeekly.com
WHITE PAPER: This in-depth profile from Computer Weekly, updated for 2013, gives you the key facts on Symantec's products, financial performance and strategy.
Posted: 14 May 2013 | Published: 14 May 2013

ComputerWeekly.com

Mobile NFC in Transport
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This in-depth report from the GSMA explains the opportunities for NFC Mobile communications in transport.
Posted: 23 Nov 2012 | Published: 23 Nov 2012

ComputerWeekly.com

New UC Threats Leaving Your UC Platform Vulnerable
sponsored by SearchSecurity.com
EGUIDE: This expert E-Guide from SearchUnifiedCommunications.com explores three emerging security threats that can leave your UC platform extremely vulnerability to security issues.
Posted: 21 May 2012 | Published: 18 May 2012

SearchSecurity.com

The Ten Principals of BYOD
sponsored by Fiberlink
WHITE PAPER: Uncover the top ten Bring Your Own Device (BYOD) considerations to keep in mind when composing a BYOD policy to ensure a productive and secure environment which allows your employees to use their consumer-based devices to complete day to day tasks.
Posted: 28 Jun 2012 | Published: 28 Jun 2012

Fiberlink

Technical Guide on Emerging Threats
sponsored by SearchSecurity.com
EGUIDE: It takes time and money to adjust IT security in response to evolving attack tactics. As defenders gradually update their security measures, attackers respond accordingly. Such arms-race dynamics lead to threats of increasing sophistication and efficiency.
Posted: 16 Feb 2011 | Published: 16 Feb 2011

SearchSecurity.com

Protecting against modern password cracking
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Thesis series explains just how insecure passwords are and offers advice on alternative methods of security.
Posted: 24 Apr 2013 | Published: 24 Apr 2013

ComputerWeekly.com

Reducing the Risks of Social Media
sponsored by SearchSecurity.com
EGUIDE: Social Media can enhance brand reputation, build connections with external customers, improve collaboration and more. However using social media also carries risks. Fortunately, this expert e-guide explores the potential identity, security and privacy threats associated with social media.
Posted: 15 Nov 2013 | Published: 15 Nov 2013

SearchSecurity.com

Guide to Mobile Device Management Software
sponsored by SearchSecurity.com
EGUIDE: This expert E-guide is set to be your guide to mobile device management (MDM) software, explaining what it is, why you need it, and what it should include. Read now to uncover how you can avoid potential pitfalls and ensure MDM success.
Posted: 19 Sep 2012 | Published: 19 Sep 2012

SearchSecurity.com

Tablets and Smartphones in the Enterprise: Risks and Management Concerns
sponsored by SearchSecurity.com
EBOOK: This IT Handbook from SearchConsumerization.com offers a number of ways that you can incorporate BYOD into your company without compromising security – giving your employees what they want and keeping your environment safe and manageable at the same time.
Posted: 21 Aug 2012 | Published: 21 Aug 2012

SearchSecurity.com

Mobile Application Management in the BYOD Era
sponsored by SearchSecurity.com
EGUIDE: This expert E-Guide from SearchConsumerization.com serves as the Enterprise Mobile Application Management Guide, exploring the strategies and tools available for managing the security of your BYOD applications.
Posted: 29 Mar 2013 | Published: 29 Mar 2013

SearchSecurity.com

Avoiding BYO Policy and Security Pitfalls
sponsored by Citrix
WHITE PAPER: When employees use their own technology for business purposes, they gain mobility and productivity but pose a new threat for IT security, as well as other policy pitfalls.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

Citrix

Enterprise Device Management: A Brave New World
sponsored by SearchSecurity.com
EGUIDE: Learn how implementing a strong mobile device management solution can help you avoid security risks and compliance violations while allowing access by your users personal devices.
Posted: 06 Feb 2012 | Published: 06 Feb 2012

SearchSecurity.com

IT Handbook : Smartphones & Tablets in the Enterprise
sponsored by SearchSecurity.com
EGUIDE: This IT Handbook from SearchConsumerization.com explores the growing trend of consumerization and how you can embrace it in your organization.
Posted: 10 Apr 2012 | Published: 10 Apr 2012

SearchSecurity.com

Software-Defined Networking Could Make Network-as-a-Service a Reality
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchNetworking.com explores the topic of Network-as-a-Service and how software-defined networking could help make this new network paradigm for the cloud a reality.
Posted: 05 Nov 2012 | Published: 09 Apr 2012

SearchSecurity.com

E-Guide: Software-Defined Networking Could Make Network-as-a-Service a Reality
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchNetworking.com explores the reality of Network-as-a-Service and how it may be coming soon to a data center near you.
Posted: 09 Apr 2012 | Published: 09 Apr 2012

SearchSecurity.com
25 Matches
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement