IT Management  >   Systems Operations  >   Security  >  

Security Administration

RSS Feed    Add to Google    Add to My Yahoo!
Security Administration White Papers (View All Report Types)
 
Managing the Secure Deployment of Cloud Services
sponsored by IBM
WHITE PAPER: This white paper invites you to explore the possibilities of a SaaS-based approach to the secure deployment and use of cloud services. Access now and learn how to make it easier for business users to access sanctioned cloud services and introduce elements of identity and access management (IAM) that are often missing.
Posted: 22 Dec 2015 | Published: 27 Oct 2015

IBM

Securing the Enterprise with an ADC
sponsored by A10 Networks
WHITE PAPER: To protect web applications, organizations need to deploy the right firewalls. Access this infographic to learn more ways to strengthen security in the enterprise when you secure your data center assets, protect sensitive data with SSL offloading, and more.
Posted: 25 Jan 2016 | Published: 25 Jan 2016

A10 Networks

Defending Your Office 365 Data: Five Threats That Microsoft Can't Defend Against, But You Can
sponsored by Datto, Inc.
WHITE PAPER: This white paper discusses where Office3 365's built-in security capabilities fall short and how you can shore up your defenses. Gain the knowledge you need to stay secure while taking advantage of all Office 365 has to offer.
Posted: 18 Dec 2015 | Published: 18 Dec 2015

Datto, Inc.

Case Study: Government Institution Gains Deeper Security Insight
sponsored by ThreatConnect
WHITE PAPER: In this case study, discover how a government institution obtained greater insight into security threats by implementing predictive defenses, threat intelligence, and more.
Posted: 21 Dec 2015 | Published: 21 Dec 2015

ThreatConnect

Data Theft Prevention: The Key to Security, Growth and Innovation
sponsored by Forcepoint
WHITE PAPER: In this white paper, you will discover how Data Theft Prevention allows you to successfully embrace technological change and new opportunities.
Posted: 18 Jan 2016 | Published: 18 Jan 2016

Forcepoint

Virtualization: Superior, Flexible and Efficient Protection
sponsored by TechData Corporation
WHITE PAPER: Access this white paper and learn how to protect for your virtual servers and desktop environments. Find out how your organization can achieve outstanding protection, better performance and greater efficiency.
Posted: 26 Jan 2016 | Published: 31 Dec 2014

TechData Corporation

Utilizing Security Ratings for Enterprise IT Risk Mitigation
sponsored by BitSight
WHITE PAPER: This white paper highlights a security ratings technology that measures company security performance and provides metrics to help mitigate risk and streamline security operations. Read on to learn how this cloud-based intelligence platform can help your enterprise improve your overall risk management in today's world of dangerous cyber-attacks.
Posted: 05 Feb 2016 | Published: 30 Jun 2014

BitSight

The Essential Guide to Privileged Access Management
sponsored by FoxT
WHITE PAPER: In this white paper, you will discover how to effectively and efficiently control privileged UNIX and Linux accounts using centralized access management. Read on to secure privileged access across your corporation with granular authorization, and more.
Posted: 18 Dec 2015 | Published: 18 Dec 2015

FoxT

Executive Summary: Proactive Response to Incident Response
sponsored by Blue Coat Systems
WHITE PAPER: This white paper describes how to find a solution that addresses two main drivers of incident response (IR) costs. Discover key strategies for lowering costs and maximizing ROI when performing IR, with details on three maturity models.
Posted: 03 Dec 2015 | Published: 30 Sep 2015

Blue Coat Systems

Are SMBs Ready to Stop Cyber-Attacks?
sponsored by Webroot
WHITE PAPER: This white paper uses survey results to analyze exactly where SMB security is weak – and how a service provider could help. Access now and learn how SMB security pros view the cybercrime landscape and how you can offer them the services they need.
Posted: 05 Jan 2016 | Published: 31 Dec 2015

Webroot
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement