Business of Information Technology  >   Business Management  >   Best Practices  >  

Security Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Security Best PracticesWhite Papers (View All Report Types)
1 - 25 of 718 Matches Previous Page  | Next Page
Top 10 Reasons MDM is just a Fad
sponsored by IBM
WHITE PAPER: This white paper reveals the top 10 reasons you don't need a mobile device management (MDM) solution ... or do you?
Posted: 02 Sep 2014 | Published: 16 May 2014

IBM

The Next Generation of Data-Driven Security
sponsored by MapR
WHITE PAPER: In this in-depth white paper, get the facts on how new adaptive algorithms like Machine Learning and Big Data can identify security risks that other outdated techniques simply couldn't.
Posted: 02 Sep 2014 | Published: 30 Jun 2014

MapR

Combatting Digital Fraud: A CIO Report
sponsored by RSA, The Security Division of EMC
WHITE PAPER: In this informative white paper, explore a web threat detection solution that leverages big data to enable security teams to better combat digital fraud.
Posted: 29 Aug 2014 | Published: 30 Jun 2014

RSA, The Security Division of EMC

Vendor Landscape: Intrusion Detection and Prevention Systems
sponsored by IBM
WHITE PAPER: This comprehensive resource compares 12 competitors in the IDPS market, providing a number of tools for comparing and evaluating each vendor's solution in order to determine the best fit for your enterprise's needs.
Posted: 28 Aug 2014 | Published: 31 Dec 2013

IBM

Managing Mobile Application Security in the Age of BYOD and the Cloud
sponsored by Bluebox
WHITE PAPER: In this expert guide, get an inside look at how to improve your organization's mobile app security and how to avoid the common pitfalls of cloud-based MAM.
Posted: 28 Aug 2014 | Published: 28 Aug 2014

Bluebox

Online Brand Infringement: Where Do You Start?
sponsored by DomainTools
WHITE PAPER: In this informative white paper, discover a new brand monitoring solution that can quickly identify and notify you of any domain registration that possibly infringes on your brand.
Posted: 28 Aug 2014 | Published: 28 Aug 2014

DomainTools

Holistic Risk Management: Professional Perspectives
sponsored by IBM
WHITE PAPER: In this informative white paper, gain critical insights into the top strategies for strengthening enterprise-wide risk management and business resilience frameworks.
Posted: 27 Aug 2014 | Published: 31 Dec 2011

IBM

Why and How You Should Use a VPN
sponsored by Global Knowledge
WHITE PAPER: This resource explains why VPNs are instrumental in eliminating the risk of public wired and wireless connections; how to use VPN at home and on the go; and how to choose a VPN provider.
Posted: 27 Aug 2014 | Published: 27 Aug 2014

Global Knowledge

Safety Through Synergy
sponsored by NEC Corporation of America
WHITE PAPER: Governments and city planners must be prepared for a wide variety of threats to public safety.  This makes IT Professionals realize just how important it really is to secure sensitive information.
Posted: 27 Aug 2014 | Published: 27 Aug 2014

NEC Corporation of America

Lumension 2014 Data Protection Maturity Report
sponsored by Lumension
WHITE PAPER: This report focuses on top security trends for 2014 and reveals the best practices for safeguarding sensitive information.
Posted: 26 Aug 2014 | Published: 30 Jan 2014

Lumension

Security Essentials for CIOs: Enabling Mobility in the Enterprise
sponsored by IBM
WHITE PAPER: This white paper discusses the issues that CIOs must face when dealing with personal and professional identities on mobile devices.
Posted: 26 Aug 2014 | Published: 31 Dec 2012

IBM

Security Report 2014: Trends and Developments in the Security Industry
sponsored by IBM
WHITE PAPER: In this informative report, discover the most important security trends of last year, ranging from malware delivery to mobile device risks.
Posted: 26 Aug 2014 | Published: 28 Feb 2014

IBM

Advanced Endpoint and Server Protection
sponsored by Bit9 + Carbon Black
WHITE PAPER: In this informative white paper, gain critical insights into new strategies for protecting your organization against today's advanced cyber-attacks, including advanced heuristics, application control, and isolation technologies.
Posted: 26 Aug 2014 | Published: 26 Aug 2014

Bit9 + Carbon Black

Top Five Alternatives to Endpoint Antivirus Software
sponsored by Bit9 + Carbon Black
WHITE PAPER: In this in-depth Forrester report, discover the top 5 technologies that security professionals are using to replace outdated antivirus software.
Posted: 26 Aug 2014 | Published: 09 Jun 2014

Bit9 + Carbon Black

Reducing the Reputational Impact of Data Breaches and Cyber-Attacks
sponsored by IBM
WHITE PAPER: This informative white paper explores the top strategies and techniques to protect your reputation by increasing business resilience and IT security across the enterprise.
Posted: 25 Aug 2014 | Published: 25 Aug 2014

IBM

Building the business case for continuity and resiliency
sponsored by IBM
WHITE PAPER: In this resource, discover what IT professionals are saying about IT risk management strategies and how you can add depth and breadth to your own business.
Posted: 25 Aug 2014 | Published: 30 Jan 2014

IBM

Virtualization Security: Choosing the Right Strategy for Your Organization
sponsored by Kaspersky Lab
WHITE PAPER: In this helpful resource, discover new virtualization security solutions that could be the key to keeping your virtual assets protected while preserving performance.
Posted: 25 Aug 2014 | Published: 25 Aug 2014

Kaspersky Lab

Six steps to effective reputational and IT Risk Management
sponsored by IBM
WHITE PAPER: This resource highlights 6 tips to effectively manage reputational and IT risk in order to protect and enhance brand value and competitive standing.
Posted: 25 Aug 2014 | Published: 30 Sep 2013

IBM

Securing the enterprise workspace: protect your organization while supporting mobility and BYOD
sponsored by Dell Software
WHITE PAPER: Discover how to prevent a costly breach while giving employees simple, authorized access to corporate applications and data on a range of mobile devices and operating systems.
Posted: 25 Aug 2014 | Published: 30 Nov 2013

Dell Software

Guarding Against a Data Breach
sponsored by Hewlett-Packard Company
WHITE PAPER: In this informative white paper, discover how modern enterprises should respond to growing security threats while balancing economic and organizational concerns.
Posted: 22 Aug 2014 | Published: 31 Jan 2012

Hewlett-Packard Company

Ponemon Study: The Real Cost of Data Breaches in 2014
sponsored by IBM
WHITE PAPER: In this Ponemon study, get the facts on whether your organization might be the target of a devastating cyber-attack, and on the proven methods for best protecting and preserving your business.
Posted: 22 Aug 2014 | Published: 31 May 2014

IBM

7 Essential Practices for Business Continuity Management
sponsored by IBM
WHITE PAPER: In this informative white paper, uncover a tested approach to expanding Business Continuity Management into an integrated, enterprise-wide program.
Posted: 22 Aug 2014 | Published: 30 Apr 2014

IBM

Understaffed And At Risk: Today’s IT Security Department
sponsored by HP and Intel
WHITE PAPER: This Ponemon study explores how organizations can most effectively hire and retain expert security staff in order to help achieve business goals.
Posted: 22 Aug 2014 | Published: 28 Feb 2014

HP and Intel

Put Security on the Agenda: Aligning IT Security with Business Goals
sponsored by Kaspersky Lab
WHITE PAPER: Read this in-depth guide to discover new integrated systems management and mobile device management solutions that could help your organization enhance its existing security plan.
Posted: 21 Aug 2014 | Published: 21 Aug 2014

Kaspersky Lab

How Midsize Businesses Can Defend Against Enterprise-Caliber Threats
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper examines the security posture of midsize companies and how effective they are, as well as the four most important industry insights into midsize company security.
Posted: 21 Aug 2014 | Published: 21 Aug 2014

Hewlett-Packard Company
1 - 25 of 718 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement