Business of Information Technology  >   Business Management  >   Best Practices  >  

Security Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Security Best PracticesWhite Papers (View All Report Types)
101 - 125 of 572 Matches Previous Page  | Next Page
Protecting Your Mid-Size Business from Today's Security Threats
sponsored by Hewlett-Packard Company
WHITE PAPER: This informative resource dives deep into 3 articles revolving around the protection of mid-sized business from today's security threats.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

Hewlett-Packard Company

Managing Non-Microsoft Updates
sponsored by Secunia
WHITE PAPER: This guide focuses on the importance of security patches and how you can easily update your configuration from one centralized location.
Posted: 18 Mar 2014 | Published: 31 Dec 2012

Secunia

The Modern Malware Review: Analysis of New and Evasive Malware in Live Enterprise Networks
sponsored by Palo Alto Networks
WHITE PAPER: This crucial paper discusses the latest malware threats, analyzing more than 1,000 organizations and examining the malware samples that were initially undetected by industry-standard security solutions.
Posted: 18 Mar 2014 | Published: 18 Mar 2013

Palo Alto Networks

BlackBerry 10 & BES10 Security Guide: The Perfect Balance of Protection & Productivity
sponsored by BlackBerry
WHITE PAPER: This exclusive white paper examines a mobile security solution that provides end-to-end protection for your mobile data without sacrificing the experience that keeps employees productive and efficient.
Posted: 17 Mar 2014 | Published: 17 Mar 2014

BlackBerry

BlackBerry 10: Setting New Standards in Mobile Security
sponsored by BlackBerry
WHITE PAPER: This informative paper discusses a mobile management solution that provides cutting-edge mobile security which centralizes and simplifies your security management, allowing you to give your information the protection it needs.
Posted: 17 Mar 2014 | Published: 17 Mar 2014

BlackBerry

10 Ways to Build a Better Big Data Security Strategy
sponsored by Hewlett-Packard Company
WHITE PAPER: Data collection plays a huge role in today's security landscape, and this guide explores 10 ways that you can achieve effective security by utilizing big data analytics.
Posted: 17 Mar 2014 | Published: 31 Jan 2014

Hewlett-Packard Company

IT Security: Midsize Businesses Face Enterprise- Caliber Threats
sponsored by Hewlett-Packard Company
WHITE PAPER: As cybercriminals are carrying out sophisticated, enterprise-grade attacks on midsize businesses, ensuring system security within those smaller firms is more important than ever. This brief whitepaper explores the flaws in many midmarket organizations' IT security and why they are being targeted.
Posted: 17 Mar 2014 | Published: 17 Mar 2014

Hewlett-Packard Company

A New Vision for Management of Fraud and Improper Payments
sponsored by Verizon
WHITE PAPER: This white paper explores the negative impact fraud has on healthcare benefits programs. Read on to learn 5 fraud management best practices and to discover a comprehensive SaaS platform that offers real-time security assessment.
Posted: 17 Mar 2014 | Published: 31 Oct 2011

Verizon

Separating Work and Personal at the Platform Level, How BlackBerry Balance Works
sponsored by BlackBerry
WHITE PAPER: This informative resource examines a mobile management solution that partitions work data from personal data using two completely separate file systems, ensuring the security of your sensitive business information.
Posted: 17 Mar 2014 | Published: 17 Mar 2014

BlackBerry

Protection For Every Enterprise, How BlackBerry Security Works
sponsored by BlackBerry
WHITE PAPER: This exclusive paper discusses mobile management platform that's been built from the ground up to deliver a high-quality user experience while adhering to the ever-shifting demands of keeping your devices secure.
Posted: 17 Mar 2014 | Published: 17 Mar 2014

BlackBerry

VMIX: Neustar UltraDNS Case Study
sponsored by Neustar®
WHITE PAPER: This exclusive case study examines how an online video communications company was able to take advantage of a flexible managed DNS service in order to securely increase speed to market and expand globally.
Posted: 14 Mar 2014 | Published: 14 Mar 2014

Neustar®

The Evolution of the Enterprise…And Enterprise Security
sponsored by Fortinet, Inc.
WHITE PAPER: This exclusive paper examines the technologies that are changing the enterprise and effects that they have on your security environment. Read on and also learn about emerging security trends and requirements that can help keep your organization safe as technologies evolve.
Posted: 14 Mar 2014 | Published: 14 Mar 2014

Fortinet, Inc.

Cybersecurity Imperitives: Reinvent Your Network Security With Palo Alto Networks
sponsored by Palo Alto Networks
WHITE PAPER: This exclusive paper discusses the current state of network security and examines a set of flexible solutions that account for changes to applications, threats, and users, providing air-tight security.
Posted: 14 Mar 2014 | Published: 14 Mar 2014

Palo Alto Networks

The Importance of Reputation
sponsored by Hewlett-Packard Company
WHITE PAPER: This guide explores the inexplicable link between data and security, and lays out the current threat landscape in today's ever-changing IT world.
Posted: 14 Mar 2014 | Published: 31 Dec 2013

Hewlett-Packard Company

State of Security Operations
sponsored by Hewlett-Packard Company
WHITE PAPER: With businesses recognizing the need for further investment in cyber-defense, it is essential to figure out which tools and strategies are best for your organization. Read now and find out more about the current state of security operations in 2014.
Posted: 14 Mar 2014 | Published: 31 Jan 2014

Hewlett-Packard Company

A New Security Approach for Today's Advanced Attacks
sponsored by FireEye
WHITE PAPER: This paper examines the limitations of existing security solutions, and several security architectures, including sandbox-based products that can truly protect against today's advanced attacks.
Posted: 13 Mar 2014 | Published: 31 Dec 2013

FireEye

Five Reasons Your Small or Midsize Business is a Prime Target for Cybercriminals
sponsored by FireEye
WHITE PAPER: This paper explains targeted attacks and examines reasons cyber attackers are aiming at small and midsize businesses.
Posted: 13 Mar 2014 | Published: 31 Dec 2013

FireEye

Detecting Sophisticated Online Attacks with Streaming Analytics
sponsored by EMC Corporation
WHITE PAPER: Discover how RSA Web Threat Detection delivers actionable intelligence by leveraging big data to correlate anomalies and detect online threats in real time.
Posted: 13 Mar 2014 | Published: 31 Dec 2013

EMC Corporation

Implementing a Security Analytics Architecture
sponsored by EMC Corporation
WHITE PAPER: This guide explores the inabilities in traditional security management and how advanced threats are growing even more sophisticated.
Posted: 12 Mar 2014 | Published: 31 Dec 2012

EMC Corporation

Taking Your Enterprise Mobile: The Executive Checklist
sponsored by Citrix
WHITE PAPER: This informative paper discusses what steps your company should take to ensure that your mobile initiatives are secure, providing a helpful checklist you can use to navigate the mobile seas to success.
Posted: 12 Mar 2014 | Published: 12 Mar 2014

Citrix

The Top 10 Mistakes Incident Responders Make Combatting Advanced Threats
sponsored by FireEye
WHITE PAPER: This white paper describes the 10 most common mistakes, strategic and technical, that incident response teams make – and their impact. Read on to learn how to avoid them with a well-defined incident response plan.
Posted: 12 Mar 2014 | Published: 31 Dec 2013

FireEye

Taking a Lean-Forward Approach to Combat Today's Cyber Attacks
sponsored by FireEye
WHITE PAPER: This white paper highlights why organizations need much more than fundamental security tools and strategies for dealing with advanced targeted attacks.
Posted: 12 Mar 2014 | Published: 31 Dec 2013

FireEye

Next-Gen Security
sponsored by Dell Software
WHITE PAPER: Find out how SSL decryption and inspection can keep attackers away from your data and out of your network. Given that SSL threats are likely to increase, it's more important than ever for businesses to consider purchasing next-generation firewalls.
Posted: 11 Mar 2014 | Published: 11 Mar 2014

Dell Software

Attacks on Point of Sales Systems
sponsored by Symantec Corporation
WHITE PAPER: Identity theft is one of the most common forms of cybercrime, and your Point of Sale (POS) system is especially vulnerable to this attack type. This in-depth guide explores how cybercriminals use malware to steal credit card information at the POS.
Posted: 11 Mar 2014 | Published: 11 Mar 2014

Symantec Corporation

Mobile Connect
sponsored by Dell Software
WHITE PAPER: Find out how to give your employees safe, easy access to the data and resources they need to be productive from a range of devices (including iOS, Android™ and Windows 8.1) while protecting your network from mobile security threats.
Posted: 11 Mar 2014 | Published: 11 Mar 2014

Dell Software
101 - 125 of 572 Matches Previous Page    3 4 5 6 7 8    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement