IT Management  >   Systems Operations  >   Security  >  

Security Administration

RSS Feed    Add to Google    Add to My Yahoo!
Security Administration White Papers (View All Report Types)
A Smarter Solution to Malware Prevention
sponsored by Webroot
WHITE PAPER: This white paper looks at how cloud-driven malware prevention can offer smarter endpoint protection in the face of advanced threats.
Posted: 26 Aug 2015 | Published: 30 Nov 2014


Simplifying Security for Software-Defined Data Centers
sponsored by HyTrust
WHITE PAPER: Save time on compliance and audit reporting and speed time to resolution for trouble shooting with advanced reporting on NSX admin access and changes.
Posted: 07 Oct 2015 | Published: 07 Oct 2015


Navigate The Future Of Identity And Access Management
sponsored by Covisint
WHITE PAPER: In this Forrester Report, discover analysts' revelations about how to support new initiatives in an increasingly competitive business environment with superior security.
Posted: 08 Oct 2015 | Published: 03 Aug 2015

How to Capitalize on the Complex Cyber Threat Landscape
sponsored by LogicNow
WHITE PAPER: In this white paper, you'll discover how managed service providers and IT service providers can help their clients mitigate risk in this increasingly complex cyber threat landscape
Posted: 24 Aug 2015 | Published: 31 Dec 2014


Computer Manufacturer Swaps Out Guardium to Save 70% in Operating Costs
sponsored by Imperva
WHITE PAPER: One of the largest computer technology companies in the world replaced their IBM Guardium deployment with Imperva SecureSphere, to audit and protect their database environment. This case study explains how this organization switched to SecureSphere and reduced operating costs by over 70%.
Posted: 05 Oct 2015 | Published: 31 Dec 2014


The Future of Threat Intelligence for the Service Provider
sponsored by Webroot
WHITE PAPER: This white paper examines the unique opportunities today's threat landscape to service providers and discusses how you can best provide threat intelligence to your clients.
Posted: 31 Aug 2015 | Published: 31 Aug 2015


Close the Door on Cryptographic Key and Certificate Threats
sponsored by Venafi
WHITE PAPER: This white paper explores how exploits use cryptographic keys and certificates to compromise organizations, and how businesses can reduce their attack surface by securing them.
Posted: 10 Sep 2015 | Published: 31 Dec 2013


Eliminate Blind Spots in SSL Encrypted Traffic
sponsored by Venafi
WHITE PAPER: This white paper discusses how SSL can leave security blind to incoming attacks and gives suggestions for seeing into these blind spots.
Posted: 16 Sep 2015 | Published: 16 Sep 2015


Protect Your SSH Keys from Misuse
sponsored by Venafi
WHITE PAPER: This white paper discusses how you can enhance enterprise security with SSH monitoring and policy enforcement.
Posted: 15 Sep 2015 | Published: 15 Sep 2015


How to Keep Your Public Cloud Private
sponsored by HyTrust
WHITE PAPER: This resource can help you develop clear strategies for data protection that will enable you to leverage the public cloud with confidence.
Posted: 30 Sep 2015 | Published: 30 Sep 2015

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement