Business of Information Technology  >   Business Management  >   Best Practices  >  

Security Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Security Best Practices White Papers (View All Report Types)
1 - 25 of 942 Matches Previous Page  |  Next Page
Amazon Web Services: Automatically Scale Cloud Security
sponsored by AWS - Fortinet
WHITE PAPER: This white paper explores how Fortinet helps deliver seamless integration with Amazon Elastic Compute Cloud and Amazon Virtual Private Cloud to minimize risk and mitigate security treats for workloads running on the cloud. Then, find out how your organization can deploy and automate cloud security with auto scaling.
Posted: 17 Nov 2017 | Published: 17 Nov 2017

AWS - Fortinet

The Complete Guide to Building a Security Culture
sponsored by Trustwave
WHITE PAPER: IT is driving fundamental changes in the way organizations operate, compete, and engage with customers and partners. In this guide, uncover 6 chapters to help you build out a stronger security culture. You'll identify the security challenges you must confront and the reasons why you need to engage with colleagues across your enterprise.
Posted: 13 Nov 2017 | Published: 13 Nov 2017

Trustwave

Securing Azure Active Directory: Detection and Alert
sponsored by Quest
WHITE PAPER: Once you've established the baseline for Azure AD security, the next step is to detect when and how changes are made. This white paper highlights four methods with which you can do this. Read on to gain guidance on detecting and alerting on changes to Azure AD groups, using sign-in risk detection, and more.
Posted: 08 Nov 2017 | Published: 08 Nov 2017

Quest

The Hiker's Guide to Software Security
sponsored by Synopsys
WHITE PAPER: Uncover 7 key considerations for building app security seamlessly into your software development and deployment initiatives.
Posted: 07 Nov 2017 | Published: 07 Nov 2017

Synopsys

Building Effective Azure Active Directory Practices
sponsored by Quest
WHITE PAPER: In this white paper, you'll examine a four-phase plan for developing effective Azure Active Directory security, focusing in particular on the first phase—continual assessment. Read on to learn how to perform continual assessments of role membership, security verification methods, groups, and more.
Posted: 07 Nov 2017 | Published: 07 Nov 2017

Quest

5 Key Analytics and Machine Learning Takeaways
sponsored by Splunk
WHITE PAPER: Explore the top 5 analytics takeaways from Splunk's .conf2017 about everything from predictive analytics and machine data to threat intelligence.
Posted: 31 Oct 2017 | Published: 31 Oct 2017

Splunk

The Critical Elements of IoT Security
sponsored by Fortinet, Inc.
WHITE PAPER: IoT devices are on the rise. Read this white paper to gain a stronger understanding of how to build an IoT security strategy to help increase your network performance and reliability.
Posted: 27 Oct 2017 | Published: 27 Oct 2017

Fortinet, Inc.

Strategies for the Enterprise to Address Today's Top Security Vulnerabilities
sponsored by Fortinet, Inc.
WHITE PAPER: In this white paper, learn the network security challenges organizations still need to overcome and methods for overcoming them.
Posted: 26 Oct 2017 | Published: 26 Oct 2017

Fortinet, Inc.

A Secure, IT-Approved File Sharing Alternative to Shadow IT
sponsored by Citrix
WHITE PAPER: Discover how to mitigate the security risks and Shadow IT issues associated with online file sharing services. Find out how to protect your data while still enabling employees to be productive, and uncover 5 ways to identify and eliminate Shadow IT that results from unauthorized file sharing accounts.
Posted: 24 Oct 2017 | Published: 24 Oct 2017

Citrix

7 Requirements for an Effective EFSS Platform
sponsored by Citrix
WHITE PAPER: Discover how to make sure you enterprise file sync and sharing (EFSS) offers the flexibility that users need without sacrificing security. Learn how to mitigate the risks associated with personal file-sharing services and uncover 7 key requirements for a sound EFSS platform.
Posted: 23 Oct 2017 | Published: 23 Oct 2017

Citrix

Healthtech And Security: Sharing And Safeguarding Patient Data
sponsored by Absolute
WHITE PAPER: Learn more about how to prevent cybercriminals from accessing your patient's electronic medical records in Aberdeen Group's HealthTech study.
Posted: 19 Oct 2017 | Published: 31 Mar 2017

Absolute

European Businesses: You have a BYOD programme whether you like it or not
sponsored by Lookout
WHITE PAPER: 18% of federal employees with smartphones report encountering malicious software or malware. This white paper reveals how to secure your mobile devices from malware and protect your business as a whole from data loss.
Posted: 13 Oct 2017 | Published: 13 Oct 2017

Lookout

A CISO's Guide to Mobile Threat Defense
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Security systems need an upgrade to be able to protect mobile devices and apps in the workplace. Read this white paper to learn the 5 major threats to mobile security, then find out what steps you can take to mitigate these vulnerabilities.
Posted: 12 Oct 2017 | Published: 12 Oct 2017

Check Point Software Technologies Ltd.

Endpoint Security - Market Quadrant 2016
sponsored by Symantec
WHITE PAPER: By 2020, the endpoint security market is expected to grow over $5.8 billion. This report offers an analysis of the market for endpoint security.
Posted: 11 Oct 2017 | Published: 30 Nov 2016

Symantec

IT Asset Management for Compliance
sponsored by Oomnitza
WHITE PAPER: Most C-level professionals, through no fault of their own, cannot answer questions about their organization's assets and have no way to find the relevant information. Access this white paper to learn about an asset management platform that addresses these problems.
Posted: 11 Oct 2017 | Published: 11 Oct 2017

Oomnitza

AWS Security Best Practices
sponsored by Amazon Web Services
WHITE PAPER: Is your data protected from accidental or deliberate theft, leakage, integrity compromise, and deletion? In this white paper, explore best practices that you can leverage to build and define an Information Security Management System (ISMS) and learn how to protect your mission-critical information.
Posted: 09 Oct 2017 | Published: 31 Aug 2016

Amazon Web Services

Comprehensive Mobile-Cloud Enterprise Security
sponsored by MobileIron
WHITE PAPER: Organizations need a comprehensive, unified platform designed from the ground up to secure mobile apps, devices, and cloud services. Download this white paper to discover a mobile-cloud security platform that can prevent data loss, enhance the UX, and simplify compliance reporting.
Posted: 02 Oct 2017 | Published: 02 Oct 2017

MobileIron

2017 Cyberattack Trends
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This report outlines how the threat landscape has changed in 2017 when it comes to ransomware, banking and mobile threats. Read on to learn from the past, so you might better secure the future.
Posted: 02 Oct 2017 | Published: 02 Oct 2017

Check Point Software Technologies Ltd.

Making a DDoS Protection Plan: 8 Best Practices
sponsored by Akamai Technologies
WHITE PAPER: Having a DDoS protection plan in place is all it takes to stave off the panic when an attack hits, and help you return to business as usual. Inside, learn 8 steps you can take to put this plan in place.
Posted: 26 Sep 2017 | Published: 26 Sep 2017

Akamai Technologies

Strategies for API Security
sponsored by Akamai Technologies
WHITE PAPER: This white paper explores the history of APIs and what makes them unique. Then, read on to learn 5 common threats facing APIs today a 3-tiered approach to securing both JSON and XML-based API endpoints, and more.
Posted: 26 Sep 2017 | Published: 26 Sep 2017

Akamai Technologies

The Smart, Secure Cloud for India: Learn How Google Cloud Infrastructure Keeps Your Data Secure
sponsored by Google Cloud
WHITE PAPER: Google Cloud's Mumbai cloud region provides faster data transfers and reduced latency to the India region. Download the whitepaper for a look under the hood of Google's infrastructure security, and explicit detail on the process we go through to build and maintain GCP regions. Download the report and find out more now.
Posted: 25 Sep 2017 | Published: 25 Sep 2017

Google Cloud

TOP 10 Considerations for Bot Management
sponsored by Akamai Technologies
WHITE PAPER: There are countless vendors claiming to provide you with bot management solutions and comprehensive protection, but what do you really need to keep your own environment safe? Read this list of the top 10 things to consider when selecting a bot management system.
Posted: 22 Sep 2017 | Published: 31 Jul 2017

Akamai Technologies

The Key to Advancing from Bot Management to Bot Security
sponsored by Akamai Technologies
WHITE PAPER: Learn about how you can better secure your IT environment by putting a common hacker tool, bots, to your own use, and how you can advance from simple bot management to bot security.
Posted: 21 Sep 2017 | Published: 03 Mar 2017

Akamai Technologies

IHS Technology: Network Monitoring Equipment
sponsored by Gigamon
WHITE PAPER: In this report, gain a stronger understanding of the top tools on the network monitoring market to help improve overall security and reliability.
Posted: 20 Sep 2017 | Published: 19 May 2017

Gigamon

4 Steps That Help You Protect Your Business
sponsored by Ricoh - HarveyDavid
WHITE PAPER: As the security threats to your IT environments grow, it's increasingly important to have a holistic defense strategy in place. Discover the 4 stages to digital workplace security, and how you can make them a reality.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

Ricoh - HarveyDavid
1 - 25 of 942 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement