Business of Information Technology  >   Business Management  >   Best Practices  >  

Security Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Security Best Practices White Papers (View All Report Types)
1 - 25 of 950 Matches Previous Page  |  Next Page
It Vs. Users? How Law Firms Can Maximize Security While Granting Access To The Web
sponsored by Authentic8, Inc.
WHITE PAPER: Discover how to maximize network and endpoint security while still granting the web access employees need to stay productive, with a particular focus on the role of security in law firms. Learn how to go beyond virtualization to secure web access and use Silo to create secure, cloud-based virtual browsers.
Posted: 28 Jul 2017 | Published: 31 Dec 2016

Authentic8, Inc.

Why a Virtual Browser is Important For Enterprise Security
sponsored by Authentic8, Inc.
WHITE PAPER: More malware enters via the web browser than any other place across the network. Find out how to create more sophisticated and granular security controls with a cloud-based, virtual browser. Learn what features virtual browsers should offer, what their potential pitfalls are, and more.
Posted: 28 Jul 2017 | Published: 28 Jul 2017

Authentic8, Inc.

How to Enhance AWS Security
sponsored by Splunk
WHITE PAPER: Here, you'll uncover guidance on enhancing AWS platform security, to quell data protection concerns. Access now to see how AWS can deliver top-notch security, as well as facilitate an adaptive environment armed with the actionable insights needed to help thwart and prevent future threats.
Posted: 28 Jul 2017 | Published: 28 Jul 2017

Splunk

How LepideAuditor Helps You Detect and Prevent Privilege Abuse
sponsored by Lepide Software
WHITE PAPER: Discover how to combat the issue of privilege abuse with in-depth auditing of changes taking place in critical servers and data. Find out how to identify privileged users, track permission changes continuously, clean out old, unused accounts, ensure least privilege, and more.
Posted: 27 Jul 2017 | Published: 27 Jul 2017

Lepide Software

How LepideAuditor Helps You Detect and Prevent Ransomware Spread
sponsored by Lepide Software
WHITE PAPER: Learn about the important role of security audits in defending against increasingly complex ransomware attacks. Discover how to get real-time insights into changes in the configuration of systems like Active Directory, Exchange Server, and NetApp Filers.
Posted: 27 Jul 2017 | Published: 27 Jul 2017

Lepide Software

HyperConvergence or Hyper-Security? What's Right for Your Enterprise?
sponsored by HyTrust
WHITE PAPER: To achieve cost-effective agility and scale, many organizations are moving to HyperConvergence Infrastructures (HCI). For data security, they are installing self-encrypting drives (SED). But there are security and compliance limitations. Learn why adding more SEDs may not make your enterprise secure and compliant.
Posted: 27 Jul 2017 | Published: 27 Jul 2017

HyTrust

Product Brief: HyTrust KeyControl + VMware vSphere 6.5 VM Encryption = Greater Security Together
sponsored by HyTrust
WHITE PAPER: In this security technology product brief, learn best practices for implementing HyTrust KeyControl with VMware vSphere 6.5 VM Encryption for greater security and protection for your enterprise.
Posted: 26 Jul 2017 | Published: 26 Jul 2017

HyTrust

Don't Just Respond – Prevent Attacks before They Happen
sponsored by Cisco Umbrella
WHITE PAPER: Discover how to use cloud-delivered security services to prevent damaging attacks before they're launched. Learn how to create an advanced threat and malware detection strategy that can proactively identify attack infrastructure with statistical models and pre-emptively protect against most zero-day threats.
Posted: 25 Jul 2017 | Published: 31 Dec 2016

Cisco Umbrella

Why Firewalls And Antivirus Alone Are Not Enough
sponsored by Cisco Umbrella
WHITE PAPER: Firewalls and antivirus defenses react to malicious code after attacks have launched – but it's becoming increasingly important to detect threats earlier and prevent attacks before they even reach fruition. Explore 4 attacks and uncover 7 common steps attackers take to achieve their objectives.
Posted: 25 Jul 2017 | Published: 31 Dec 2016

Cisco Umbrella

Protect Your Sensitive Data, Achieve Compliance In a Multi-Cloud World
sponsored by HyTrust
WHITE PAPER: Multi-cloud adoption is on the rise – a recent study found that 64% of survey respondents expect to use multiple cloud service vendors. With such a rising popularity, how do you protect your sensitive data, while also properly complying, in a multi-cloud future?
Posted: 25 Jul 2017 | Published: 25 Jul 2017

HyTrust

Creating an Organisational-Wide Culture of Security
sponsored by Dell SecureWorks
WHITE PAPER: When the winds of IT trends change, your security system needs to be able to change with them. Click inside to learn why an effective communication workflow is key to building an organization-wide culture around cybersecurity.
Posted: 21 Jul 2017 | Published: 21 Jul 2017

Dell SecureWorks

How To Securely Configure A Linux Host To Run Containers
sponsored by Twistlock, Inc.
WHITE PAPER: Discover how to update traditional security for containerized, microservices-based app development by learning how to securely configure a Linux host to run Docker containers.
Posted: 21 Jul 2017 | Published: 21 Jul 2017


The Proactive Security Paradigm: How Containers Can Revamp Your Approach To Security
sponsored by Twistlock, Inc.
WHITE PAPER: Learn how to integrate security into DevOps with a container-first security platform that creates more secure microservices-based app development environments and uncover 6 often overlooked security benefits of containers.
Posted: 21 Jul 2017 | Published: 21 Jul 2017


We Need to Talk About Cybersecurity: Moving on from the "Ad Hoc" Stage
sponsored by Dell SecureWorks
WHITE PAPER: Simply dealing with problems as they arise isn't enough – to keep your organization truly protected you need a cybersecurity plan. Learn 5 steps to developing your own cyber-business risk model.
Posted: 21 Jul 2017 | Published: 21 Jul 2017

Dell SecureWorks

How to Use Detection and Response to Reduce Business Risk
sponsored by Dell SecureWorks
WHITE PAPER: Use this white paper to learn how you can reduce the impact of threats to your organization by leveraging security monitoring systems to improve response times, proactively respond to breaches, and more.
Posted: 20 Jul 2017 | Published: 20 Jul 2017

Dell SecureWorks

Using Compliance as a Leaping Pad: Moving on From the "Opportunistic" Stage
sponsored by Dell SecureWorks
WHITE PAPER: Explore how enterprises in the 'opportunistic' stage of security management can build upon existing compliance infrastructure. Learn how to use risk management to your advantage, grow the reach of your security systems, and more.
Posted: 20 Jul 2017 | Published: 20 Jul 2017

Dell SecureWorks

Understanding the Security Leaders' Plight
sponsored by Dell SecureWorks
WHITE PAPER: When business leaders and security pros aren't communicating with each other, breaches can happen. Learn the 13 areas of IT security where cooperation between both teams is essential.
Posted: 19 Jul 2017 | Published: 19 Jul 2017

Dell SecureWorks

5 Questions Executives Should Be Asking Their Security Teams
sponsored by Microsoft
WHITE PAPER: This white paper dives into 5 questions all leadership should be asking their security teams. Uncover how to avoid the lasting damage to a brand done by a data breach and mitigate the risk of a breach occurring.
Posted: 17 Jul 2017 | Published: 28 Apr 2017

Microsoft

Deliver Agile Security for the Cloud
sponsored by TrendMicro
WHITE PAPER: Cloud adoption is accelerating rapidly – is your security flexible enough to keep up? Explore an agile security strategy that can seamlessly integrate with cloud services and management tools to prevent data breaches, reduce costs, and more.
Posted: 12 Jul 2017 | Published: 12 Jul 2017

TrendMicro

Protecting Your Servers in the Cloud Era
sponsored by TrendMicro
WHITE PAPER: While virtualization and cloud computing can help your organization achieve significant savings while improving business agility, security in these new environments can be a challenge. Explore how you can protect your servers in the cloud age.
Posted: 12 Jul 2017 | Published: 12 Jul 2017

TrendMicro

Identify, Connect, and Protect Mobile and IoT at the Edge
sponsored by Aruba Networks
WHITE PAPER: Discover how Aruba Networks is tackling the challenges of identifying, profiling, authenticating, and applying policies to IoT devices on the network. Learn about their blueprint for securing IoT connectivity at the edge and uncover 4 steps to connecting mobile and IoT devices with end-to-end security in place.
Posted: 29 Jun 2017 | Published: 29 Jun 2017

Aruba Networks

Leveraging Multi-factor Authentication to Power Protection
sponsored by Centrify Corporation
WHITE PAPER: According to Verizon's 2016 DBIR, 63% of confirmed data breaches last year involved weak, default or stolen passwords. In this e-book, discover how to leverage multi-factor authentication to power protection.
Posted: 28 Jun 2017 | Published: 28 Jun 2017

Centrify Corporation

6 Best Practices for Securing AWS Environments
sponsored by Centrify Corporation
WHITE PAPER: Discover how to extend key technologies like identity and access management (IAM) to the cloud for privileged access security (PAS) on AWS IaaS without increasing the risk of a data breach.
Posted: 28 Jun 2017 | Published: 31 Dec 2016

Centrify Corporation

6 Best Practices: Privileged Access Security for AWS
sponsored by Centrify Corporation
WHITE PAPER: This e-book dives into the top 5 security myths surrounding AWS. You will learn about the privileged access security model, why maintaining your current security and compliance is slowing down cloud adoption, and more.
Posted: 28 Jun 2017 | Published: 28 Jun 2017

Centrify Corporation

6 Best Practices: Privileged Access Security for AWS
sponsored by Centrify Corporation
WHITE PAPER: This infographic reveals 6 best practices for implementing and extending AWS security best practices to the cloud. Learn why you should Establish a common security model, consolidate identities, and 3 more ways to securely migrate a cloud environment.
Posted: 28 Jun 2017 | Published: 28 Jun 2017

Centrify Corporation
1 - 25 of 950 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement