IT Management  >   Systems Operations  >   Security  >  

Security Administration

RSS Feed    Add to Google    Add to My Yahoo!
Security Administration White Papers (View All Report Types)
 
Protect Your Data with Advanced Encryption
sponsored by ESET
WHITE PAPER: This resource introduces one way you can create unbreakable security for your data.
Posted: 12 Mar 2015 | Published: 31 Dec 2014

ESET

The Danger from DDoS Increases
sponsored by Neustar®
WHITE PAPER: This survey report tells you everything you need to know about how DDoS attacks have changed and why you should be concerned.
Posted: 19 Feb 2015 | Published: 31 Dec 2014

Neustar®

Top 5 Aspects of Security to Look for in a Cloud Provider
sponsored by Oracle Corporation
WHITE PAPER: Get the 5 security areas you needs to be concerned with when selecting the cloud system that's right for your business.
Posted: 03 Mar 2015 | Published: 31 Dec 2013

Oracle Corporation

Special Feature: Bank Card Courier Scams
sponsored by ESET
WHITE PAPER: This white paper describes the dangers of fraudulent phone calls and what to look out for when receiving one.
Posted: 11 Mar 2015 | Published: 31 Dec 2014

ESET

4 Steps to Address Vulnerabilities Before a Breach
sponsored by IBM
WHITE PAPER: This white paper addresses how vulnerabilities can go undetected and gives you advice for mitigating these vulnerabilities.
Posted: 16 Mar 2015 | Published: 31 Dec 2014

IBM

Stop DDoS Attacks with DNS Protection
sponsored by Efficientip
WHITE PAPER: Access this white paper now to read about effective DNS protection and to learn how you can shield yourself from DDoS attacks.
Posted: 09 Mar 2015 | Published: 31 Dec 2014

Efficientip

The Cyber Security Defensive Strategy Playbook
sponsored by ForeScout Technologies, Inc.
WHITE PAPER: Access this cyberthreat report that sheds light on the evolving nature of threats, the actors behind them, and the successful techniques they are utilizing. Read on now to get helpful tips on how to craft your defensive strategy.
Posted: 19 Feb 2015 | Published: 04 Dec 2014

ForeScout Technologies, Inc.

Four Tools for Capturing DDoS Attacks
sponsored by Neustar®
WHITE PAPER: This exclusive white paper describes four of the best tools you can use to detect DDoS attacks quickly.
Posted: 16 Feb 2015 | Published: 31 Dec 2014

Neustar®

Build a Strong Security Foundation with the Right Endpoint Protection
sponsored by ESET
WHITE PAPER: This white paper describes one endpoint protection solution that has proven to provide a strong foundation.
Posted: 12 Mar 2015 | Published: 31 Dec 2014

ESET

Bridging the data security gap
sponsored by IBM
WHITE PAPER: This white paper describes the four main areas of data security and how to approach each one.
Posted: 16 Mar 2015 | Published: 31 May 2013

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement