Software  >   Systems Software  >   Security Software  >  

Resource Access Control Facility

RSS Feed    Add to Google    Add to My Yahoo!
Resource Access Control Facility White Papers (View All Report Types)
 
Managing Critical Security Controls
sponsored by Splunk
WHITE PAPER: In this e-book, you'll learn what security professionals find suitable to support access controls. Discover ways to verify incoming data, execute the requirements needed, and support human activities associated with a control.
Posted: 27 Apr 2016 | Published: 27 Apr 2016

Splunk

Self-Encrypting Drives
sponsored by Micron Technology
WHITE PAPER: This white paper explains encryption and different encryption processes.
Posted: 11 Dec 2014 | Published: 31 Dec 2013

Micron Technology

Cyberthreat Intelligence: How Organizations are Using Analytics on Data Left Behind by Hackers
sponsored by LogRhythm, Inc.
WHITE PAPER: One barrier to understanding the merits of cyberthreat intelligence (CTI) is confusion about what it is and what it isn't. Access this article to gain an insider's perspective on what CTI really has to offer, who needs it, and how to find the right vendor.
Posted: 07 Mar 2016 | Published: 07 Mar 2016

LogRhythm, Inc.

Make Security Part of Your Client Systems Refresh
sponsored by Dell, Inc. and Intel®
WHITE PAPER: To address security challenges while sufficiently supporting business processes and modern workflows, your secure data strategy should keep up. Uncover an approach that is designed to help your organization protect, comply, and enable.
Posted: 21 Mar 2016 | Published: 21 Mar 2016

Dell, Inc. and Intel®

MSPs: Improve Your Performance with the Right Software
sponsored by Solarwinds N-able
WHITE PAPER: This resource introduces a suite of software essential for an effective MSP.
Posted: 29 May 2015 | Published: 29 May 2015

Solarwinds N-able

Mobile Malware Hits ActiveSynch-Only Devices
sponsored by MobileIron
WHITE PAPER: In this white paper, learn about four major threats to mobile device security, including: Stagefright, XcodeGhost, and 2 more. Additionally, learn how an enterprise mobility management provider can protect your business by detecting and mitigating threats to mobile devices.
Posted: 11 Feb 2016 | Published: 11 Feb 2016

MobileIron

Mobile Device Management for Retail
sponsored by IBM
WHITE PAPER: Access this white paper to learn about the new age of mobility in the retail space, as well as how to overcome security challenges with centralized device control, compliance, system updates, and disaster recovery.
Posted: 13 Jul 2015 | Published: 26 Dec 2014

IBM

How to Sync, Share & Control Data Securely
sponsored by Commvault
WHITE PAPER: Cloud computing has introduced great security risks in the business world. Access this resource and discover ways to achieve data security in the world of cloud file sharing.
Posted: 03 Jun 2015 | Published: 03 Jun 2015

Commvault

One Test Data Manager Solution, Rated and Reviewed
sponsored by CA Technologies
WHITE PAPER: Learn how four organizations who invested wisely in test data management were able to reduce IT project costs that benefitted the entirety of the development lifecycle.
Posted: 15 Feb 2016 | Published: 31 Dec 2015

CA Technologies

Storage Provider Profile: Red Hat
sponsored by Red Hat
WHITE PAPER: The following white paper profiles a scale-out, open source object-based storage software solution and the benefits it provides for businesses looking for a middle road when integrating data.
Posted: 30 Jun 2014 | Published: 30 Nov 2012

Red Hat
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement