Business of Information Technology  >   Business Management  >   Best Practices  >  

Security Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Security Best Practices White Papers (View All Report Types)
1 - 25 of 1107 Matches Previous Page  |  Next Page
To Increase Downloads, First Instill Trust: Security Advantages of Code Signing
sponsored by Symantec
WHITE PAPER: Malware poses a serious threat to the mobile environment: malicious code can slip into app stores and become a threat to anyone who downloads them. Discover how code signing enables end users to take advantage of the ease and convenience of content distribution—without worrying about security consequences.
Posted: 28 Sep 2016 | Published: 31 Dec 2014

Symantec

Simple Steps to Evolving Your Website Security in 2016
sponsored by Symantec
WHITE PAPER: Learn how to enforce total protection against website security threats, given the evolving threat landscape of 2016. Access this paper to view several simple steps used to evolve your coverage, including how to increase trust and simplify code signing.
Posted: 28 Sep 2016 | Published: 28 Sep 2016

Symantec

Why Code Signing Is an Essential Website Security Feature
sponsored by Symantec
WHITE PAPER: Learn how code signing mitigates the risks of transferring code over the Internet or wireless networks, and also allows end users to take advantage of the ease and convenience of content distribution without worrying about security consequences.
Posted: 28 Sep 2016 | Published: 28 Sep 2016

Symantec

Understanding Shared Responsibility for Microsoft Azure
sponsored by Alert Logic
WHITE PAPER: Discover your enterprise's relationship with Azure for IaaS, PaaS, and both Microsoft's and Azure's Active directories. Also learn 7 Azure best practices.
Posted: 28 Sep 2016 | Published: 28 Sep 2016

Alert Logic

It’s Not You, It’s Me: Understanding the Shared Responsibility of Cloud Security
sponsored by Alert Logic
WHITE PAPER: Discover what specific security responsibilities belong to you and your provider, the latest cloud security threats, and 7 cloud security best practices.
Posted: 28 Sep 2016 | Published: 28 Sep 2016

Alert Logic

Answering 10 Essential Questions About Website Security
sponsored by Symantec
WHITE PAPER: Even though SSL/TLS certificates and vulnerability scans are a crucial part of website security, they're no longer enough. Are you going beyond the basics? Read on to ascertain the strengths and weaknesses of your current website security strategy by asking yourself 10 crucial questions.
Posted: 28 Sep 2016 | Published: 28 Sep 2016

Symantec

The Rising Face of Cyber Crime Ransomware
sponsored by BitSight
WHITE PAPER: Learn how ransomware is evolving - and which industries are the most susceptible to attacks. Download the latest BitSight Insight report to find out how ransomware affects each industry, and what organizations can do to prevent it.
Posted: 28 Sep 2016 | Published: 31 Aug 2016

BitSight

Protected to Innovate: Securing Your Hybrid Cloud
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Discover how to remove the risky barriers to digital innovation by determining the right mix of hybrid cloud for your IT infrastructure strategy. Access the freedom and flexibility cloud offers by learning 3 security-first principles that will ensure your hybrid cloud is as productive as it is secure and compliant.
Posted: 28 Sep 2016 | Published: 28 Sep 2016

Hewlett Packard Enterprise

Neustar DDOS Attacks & Protection Report: North America & EMEA The Continuous Risk to Digital Brands
sponsored by Neustar
WHITE PAPER: This report encapsulates the survey results of 760 managers and directors, CSOs, CIOs, CTOs and others in the security and IT. Its purpose is to learn how companies in North America and the EMEA region (Europe, the Middle East, and Africa) encounter and defend against DDoS attacks.
Posted: 28 Sep 2016 | Published: 31 Dec 2015

Neustar

2016 Cost of Data Breach Study: Impact of Business Continuity Management
sponsored by IBM
WHITE PAPER: The Ponemon Institute surveyed 383 companies in 16 industry sectors about their experience with data breaches. Learn how the majority of these companies are solving breaches efficiently and cost-effectively with business continuity management (BCM.)
Posted: 26 Sep 2016 | Published: 30 Jun 2016

IBM

Two-Factor Authentication Protects Health Data
sponsored by VASCO Data Security International
WHITE PAPER: Discover how strong authentication and digital identity management can increase health data security while making it easier for providers to do their work. This paper also explores how patients can use this method to view and download health records from multiple portals while increasing privacy protection.
Posted: 26 Sep 2016 | Published: 31 Aug 2016

VASCO Data Security International

Security Information and Event Management (SIEM) Orchestration
sponsored by Intel Security
WHITE PAPER: This document takes a deep look at one SIEM tool, and examines how it optimizes incident response processes. Explore ways to block threats more effectively, identify compromises, implement quick remediation, and more.
Posted: 26 Sep 2016 | Published: 26 Sep 2016

Intel Security

Kona Client Reputation
sponsored by Akamai
WHITE PAPER: Discover the business benefits and operational benefits you can achieve by adding a new, advanced algorithm to your security infrastructure. Profile malicious users before they have a chance to infect your network.
Posted: 26 Sep 2016 | Published: 31 Dec 2015

Akamai

Bringing IT and Security Together for Better Breach Response
sponsored by ServiceNow
WHITE PAPER: Untangle the vital reasons why security response times are so slow, and how to efficiently address them. Also learn what steps you can take today to make your remediation efforts quicker and more efficient, while improving the clarity of your network security status.
Posted: 26 Sep 2016 | Published: 26 Sep 2016

ServiceNow

Situational Awareness Monitoring Helps US Government Agency Meet Cybersecurity Requirements
sponsored by Gigamon
WHITE PAPER: This white paper describes how the HHS was able to meet their rigid security requirements in an era of rising malicious cybersecurity threats. Discover how they were able to achieve pervasive visibility of all network traffic across geographically dispersed locations and keep their massive amount of private information safe.
Posted: 26 Sep 2016 | Published: 31 Dec 2015

Gigamon

Harnessing the Power of Metadata for Security
sponsored by Gigamon
WHITE PAPER: Discover how metadata, rich in context, can help analyze security metrics faster to enable rapid threat remediation.
Posted: 23 Sep 2016 | Published: 31 Aug 2016

Gigamon

5 Considerations for Securing Hybrid Clouds
sponsored by Intel Security
WHITE PAPER: This white paper explores both old and new security best practices and how to apply them to cloud-based infrastructures. Discover how to make security as agile as the cloud itself by incorporating best practices as an integrated element of a DevOps methodology.
Posted: 23 Sep 2016 | Published: 31 May 2016

Intel Security

Cloud Computing Security Considerations and Requirements
sponsored by Palo Alto Networks
WHITE PAPER: In an era where the cloud is considered nontraditional, securing it shouldn't be either. Learn how to segment your applications and data, centrally manage and automate security deployments, and more.
Posted: 22 Sep 2016 | Published: 22 Sep 2016

Palo Alto Networks

Analysts Reveal how to Secure SaaS
sponsored by Palo Alto Networks
WHITE PAPER: This report illustrates the explosive growth of SaaS applications, and their role in creating significant security challenges for IT teams. Learn how CASB products can help deliver the visibility and granular control you need to protect and secure these apps.
Posted: 22 Sep 2016 | Published: 22 Sep 2016

Palo Alto Networks

TAG Cyber Report: 2017 Security Annual – Vol. 1
sponsored by Digital Guardian
WHITE PAPER: This report provides CISO team members with detailed technical and architectural guidance based on fifty specific controls that support the reduction of cyber risk. It's a practical handbook and reference guide for the cyber security professional.
Posted: 22 Sep 2016 | Published: 31 Aug 2016

Digital Guardian

How to Conquer Security on the Public, Private, and Hybrid Clouds
sponsored by Fortinet, Inc.
WHITE PAPER: Learn about the key security considerations for all cloud environments, enforcing the value of agile and elastic cloud security. Discover the ingredients of a solid cloud security approach, including: scalability, underlying cloud infrastructure, micro-and internal segmentation, SIEM, and more.
Posted: 22 Sep 2016 | Published: 22 Sep 2016

Fortinet, Inc.

The Power of Precise Threat Intelligence: Which SecureWorks service is right for me?
sponsored by SecureWorks
WHITE PAPER: Creating meaningful threat intelligence requires specialized tools and expertise that go well beyond simple alerts and content searches. Discover hot to achieve this level of expertise within this short white paper. You'll gain a greater visibility into the deepest part of your network and better understand malware and the actors behind it.
Posted: 22 Sep 2016 | Published: 31 Aug 2016

SecureWorks

Companies, Digital Transformation and Information Privacy: The Next Steps
sponsored by Hewlett Packard Enterprise
WHITE PAPER: The following resource features in-depth interviews with legal, technical, and regulatory subject-matter experts on the digital data privacy debate. Explore challenges and strategies global businesses must face regarding this complex, fluctuating policy environment.
Posted: 22 Sep 2016 | Published: 22 Sep 2016

Hewlett Packard Enterprise

How to Protect Data from Ransomware
sponsored by Dell Software
WHITE PAPER: It can be difficult to recover data that is encrypted by ransomware malware. In this expert guide, discover how to stop ransomware from breaching your network in the first place and backup all of your data.
Posted: 27 Sep 2016 | Published: 22 Sep 2016

Dell Software

Reeling in Ransomware Data Protection for You and Your Users
sponsored by Code42
WHITE PAPER: In this white paper, learn how you can protect your devices and negate the effects of ransomware. Explore how continuous endpoint backup enables IT to quickly and easily restore files to minutes before the infection, as well as ensures that those files are healthy with no end-user intervention required.
Posted: 26 Sep 2016 | Published: 26 Sep 2016

Code42
1 - 25 of 1107 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement