Business of Information Technology  >   Business Management  >   Best Practices  >  

Security Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Security Best Practices White Papers (View All Report Types)
1 - 25 of 785 Matches Previous Page  |  Next Page
Shadow Data: Why Traditional Security Leaves Your Organization Vulnerable
sponsored by Elastica
WHITE PAPER: This exclusive white paper reviews Shadow Data trends to provide insights into data security and compliance issues.
Posted: 01 Sep 2015 | Published: 29 Jul 2015

Elastica

From the Backroom to the Boardroom: Building A Case for Resiliency and Business Continuity
sponsored by IBM
WHITE PAPER: This white paper serves as a guideline for IT professionals, and explains how to generate investment for resiliency initiatives by linking IT risks to business risk using one resiliency services framework. Access this white paper to learn how to uncover the critical connections between IT and the business.
Posted: 31 Aug 2015 | Published: 31 May 2015

IBM

The Price You Pay for a Data Breach
sponsored by IBM
WHITE PAPER: This research report reveals just how much American businesses stand to lose to a cyber-attack, breaking down costs by industry, enterprise size, and more.
Posted: 31 Aug 2015 | Published: 31 May 2015

IBM

Adopt New Enterprise UC Technologies with Speed, Agility, and Security
sponsored by Red Hat
WHITE PAPER: This white paper will introduce you to several third-party collaboration technologies that will help you innovate ahead of business demands. Access this white paper to learn how to select the proper collaboration technologies for you that can foster interoperability in your organization.
Posted: 31 Aug 2015 | Published: 31 Aug 2015

Red Hat

How to Integrate Smart Devices with Enterprise Phone Systems for UC
sponsored by ShoreTel
WHITE PAPER: This white paper highlights one such UC platform that will increase worker effectiveness and reduce operational exposure by integrating smartphones and tablets into your enterprise business phone system. Read on to receive the following enterprise unified communication benefits.
Posted: 31 Aug 2015 | Published: 31 Aug 2015

ShoreTel

IT Case Study: Overtake Medical Center Enhances Healthcare Applications
sponsored by F5 Networks
WHITE PAPER: This white paper serves as a case study of Overlake Medical Center, and outlines how to provide secure remote access to all enterprise applications and network resources for healthcare facilities, as well as how to manage these apps with a small IT team.
Posted: 28 Aug 2015 | Published: 28 Aug 2015

F5 Networks

Security Essentials for CIO's: Responding to Inevitable Incident
sponsored by IBM
WHITE PAPER: This white paper lists a seven-step process you can take to ensure that your enterprise knows exactly what to do when a security incident occurs.
Posted: 28 Aug 2015 | Published: 31 Aug 2012

IBM

Security in the Cloud: Tips on How to Protect Your Data
sponsored by Procore
WHITE PAPER: This white paper outlines the basics of cloud storage security and the capabilities to look for in providers to ensure data protection.
Posted: 27 Aug 2015 | Published: 05 Aug 2015

Procore

Eight Essential Elements for Effective Threat Intelligence Management
sponsored by BrightPoint Security
WHITE PAPER: This white paper contains eight techniques you can adopt to keep up with the ever-shifting threat intelligence landscape.
Posted: 27 Aug 2015 | Published: 27 Aug 2015

BrightPoint Security

The Strategic Impact of Mobile Transformation on Business Value
sponsored by VMware, Inc.
WHITE PAPER: This white paper serves as a survey of organizations in education, healthcare, high tech, and retail about the state of their mobile computing efforts. Access this analysis to see three major themes highlighted that are critical for success in mobile transformation.
Posted: 27 Aug 2015 | Published: 27 Aug 2015

VMware, Inc.

Unified Network Solutions Case Study: Kettering Health Network
sponsored by F5 Networks
WHITE PAPER: This white paper demonstrates how the KHN was able to achieve access to its electronic medical records system and other apps for its remote users. Read on here to key into the benefits of a unified network solution.
Posted: 27 Aug 2015 | Published: 27 Aug 2015

F5 Networks

5 Super Powers To Look for When Evaluating DRaaS Providers
sponsored by Assuritive
WHITE PAPER: This white paper outlines and examines the five most indispensable attributes to look for when assessing DRaaS solutions. Read on here to learn how to evaluate using 5 criteria.
Posted: 26 Aug 2015 | Published: 26 Aug 2015

Assuritive

Security Essentials for CIO's: Establishing a Department of Yes
sponsored by IBM
WHITE PAPER: This white paper presents a five-step process for enterprise security that allows you to encourage business innovation without putting your business at risk.
Posted: 26 Aug 2015 | Published: 31 Mar 2012

IBM

A Smarter Solution to Malware Prevention
sponsored by Webroot
WHITE PAPER: This white paper looks at how cloud-driven malware prevention can offer smarter endpoint protection in the face of advanced threats.
Posted: 26 Aug 2015 | Published: 30 Nov 2014

Webroot

Software-Defined Data Center Meets Micro-Segmentation
sponsored by VMware
WHITE PAPER: This white paper explains how to deploy advanced security inside your data center with micro-segmentation, which will deliver the operational agility of network virtualization.
Posted: 26 Aug 2015 | Published: 13 Dec 2013

VMware

Demand Secure and Durable Enterprise Performance with Tablets
sponsored by Panasonic - Microsoft
WHITE PAPER: This white paper serves as a guide for how to find tablets that will adapt to your shifting enterprise application demands. Read on here to evaluate several rugged tablet platforms designed to boost mobility and productivity.
Posted: 25 Aug 2015 | Published: 28 Feb 2014

Panasonic - Microsoft

Powering Disaster Recovery in the Cloud
sponsored by Commvault
WHITE PAPER: In this white paper, you will learn more about the challenges organizations face with it comes to DR, and how the cloud can come to the rescue of your organization. Read on to find out how to securely store customer data in the public cloud while fending off security concerns.
Posted: 24 Aug 2015 | Published: 24 Aug 2015

Commvault

Top 5 Cloud Data Protection Challenges. Solved.
sponsored by Commvault
WHITE PAPER: This white paper serves as guide with which you can realize the full potential of your next cloud project. Read on to see how the following 5 challenges may impact your cloud integration strategy.
Posted: 24 Aug 2015 | Published: 24 Aug 2015

Commvault

Top 10 Ways to Maximize Business Investment with UC&C
sponsored by Polycom, Inc.
WHITE PAPER: This white paper examines one UC platform that you can integrate into your existing enterprise infrastructure. Access this vendor report to consider which enterprise video and voice solutions will drive employee collaboration, and the top 10 ways to maximize your business ROI.
Posted: 24 Aug 2015 | Published: 24 Aug 2015

Polycom, Inc.

The Top 6 Benefits of Switching to Enterprise Voice UC&C
sponsored by Polycom, Inc.
WHITE PAPER: This white paper highlights the top 6 benefits behind one software-based UC solution that will expedite all your collaborative initiatives. Read on here to learn how to access the following benefits that will lower the total cost of your enterprise communications.
Posted: 21 Aug 2015 | Published: 21 Aug 2015

Polycom, Inc.

Ready Your Organization for an Enterprise Voice Transition to the Cloud
sponsored by Polycom, Inc.
WHITE PAPER: This exclusive white paper provides an outline for the benefits and considerations of balancing the transition of voice collaboration to the cloud. Continue reading to understand the key benefits UC and collaboration can bring to the modern workplace.
Posted: 20 Aug 2015 | Published: 20 Aug 2015

Polycom, Inc.

Strong Authentication for Secure Employee Access
sponsored by SafeNet, Inc.
WHITE PAPER: This white paper describes how to enable two-factor authentication to all users and resources using a single automated backend—either from the cloud or on-premises. Download now to see how your organization could benefit from strong authentication.
Posted: 20 Aug 2015 | Published: 20 Aug 2015

SafeNet, Inc.

5 Guidelines for Successful Global Videoconferencing
sponsored by Polycom, Inc.
WHITE PAPER: This white paper serves up 5 key strategies to performing a successful videoconference meeting. Read on here to access this advice for driving global collaboration in your organization.
Posted: 20 Aug 2015 | Published: 20 Aug 2015

Polycom, Inc.

Understanding Zero-Day Attacks and Gaining Control
sponsored by Malwarebytes Corporation
WHITE PAPER: This webinar transcript discusses how you can better manage your vulnerabilities and effectively detect zero-day malware.
Posted: 20 Aug 2015 | Published: 20 Aug 2015


Steer Your Enterprise Towards Smooth Mobility
sponsored by SafeNet, Inc.
WHITE PAPER: This white paper weighs the benefits of securely adopting enterprise mobility and the potential roadblocks of doing so. Read on to learn more about secure enterprise mobility and its potential to impact every facet of your organization, from VPN to VDI.
Posted: 19 Aug 2015 | Published: 19 Aug 2015

SafeNet, Inc.
1 - 25 of 785 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement