Business of Information Technology  >   Business Management  >   Best Practices  >  

Security Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Security Best Practices White Papers (View All Report Types)
101 - 125 of 1054 Matches Previous Page  |  Next Page
How Data Privacy Laws Impact Cloud Adoption In The UK
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Learn the strengths of tokenization when applied to ensuring regulated data never leaves the domain or control of your organization, risking falling out of compliance with the law.
Posted: 23 Feb 2017 | Published: 31 Dec 2016

Symantec & Blue Coat Systems

Keep Systems Secure with Best Practices – and Best User Experience – in Mind
sponsored by IBM
WHITE PAPER: IT is in state of crisis, with hundreds of millions of identities stolen annually. Access this resource to better understand the benefits of mobile multi-factor authentication (MMFA) and learn why passwords alone aren't enough for today's security landscape.
Posted: 23 Feb 2017 | Published: 23 Feb 2017

IBM

App Security: Shore up the Weaknesses in Your WAF
sponsored by tCell
WHITE PAPER: Delve into the shortcomings of web application firewalls (WAFs) and how to shore up your defenses. Uncover the top 5 requirements for an application immune system and how to protect your web applications and modernize your security policy to stand firm against today's threats landscape.
Posted: 23 Feb 2017 | Published: 23 Feb 2017

tCell

Sonicwall 2017 Annual Threat Report
sponsored by Dell SonicWALL
WHITE PAPER: The threat landscape evolved and shifted over the course of 2016, pushing the arms race between security professionals and cybercriminals to new heights. In this 2017 annual threat report discover key findings, vital takeaways, and a look to the future cybersecurity threat landscape.
Posted: 23 Feb 2017 | Published: 23 Feb 2017

Dell SonicWALL

10 Tips for Protecting Data in the Cloud
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Discover 10 tips on how to keep your data safe in the cloud. Learn how to limit the harm the cloud poses to your business, mitigate privacy concerns, and retain full control of your information in-transit and in-use.
Posted: 22 Feb 2017 | Published: 22 Feb 2017

Symantec & Blue Coat Systems

Top 5 Questions Answered on How to Best Protect Your Data in the Cloud
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Discover 5 vital cloud data protection questions and answers in this white paper, covering your organization's first steps into migrating to the cloud all the way to dealing with long-term compliance issues.
Posted: 22 Feb 2017 | Published: 21 Feb 2017

Symantec & Blue Coat Systems

A Look at How Data Privacy Laws Impact Cloud Expansion in Germany
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Gain a rare glance into the issues that arise when an organization hoping to implement cloud application services in Germany must navigate in order to remain compliant.
Posted: 21 Feb 2017 | Published: 21 Feb 2017

Symantec & Blue Coat Systems

Email Security Threats: Not Just from the Outside
sponsored by Mimecast
WHITE PAPER: Analysts have recently evaluated the state of enterprise security readiness for email threats. Learn how to look beyond basic defensive capabilities to avoid missing out on advancing security technologies.
Posted: 20 Feb 2017 | Published: 20 Feb 2017

Mimecast

The Mimecast Email Security Risk Assessment 2017
sponsored by Mimecast
WHITE PAPER: By testing cloud security services against email security systems, Mimecast gathered data from 25,000 customers to understand the severity of threats and the effectiveness of commonly deployed email security systems. Learn more about what kind of threats are getting through incumbent email security systems both in large number and type.
Posted: 20 Feb 2017 | Published: 20 Feb 2017

Mimecast

IDC MarketScape: Worldwide Email Security 2016 Vendor Assessment
sponsored by Forcepoint
WHITE PAPER: In this report excerpt learn about the email security market, how it is experiencing an influx of new features to deal with adapting threats, and how Forcepoint has been named a leader in the market.
Posted: 17 Feb 2017 | Published: 17 Feb 2017

Forcepoint

Your Guide to Today's Corporate Web Security
sponsored by Forcepoint
WHITE PAPER: In this Radicati Market Quadrant research report, uncover insight into the corporate web security market. Access a detailed breakdown of how individual vendors fit within the web security market and who the top players, trail blazers, specialists, and mature players are.
Posted: 17 Feb 2017 | Published: 31 May 2016

Forcepoint

Your Guide to Advanced Persistent Threat Protection
sponsored by Forcepoint
WHITE PAPER: In this Radicati Market Quadrant research report, uncover a detailed breakdown of how individual vendors fit within the advanced-persistent threat (APT) market and who the top players, trail blazers, specialists, and mature players are.
Posted: 16 Feb 2017 | Published: 16 Apr 2016

Forcepoint

Busting the Myth of the Malware “Silver Bullet”
sponsored by Intel Security
WHITE PAPER: This white paper explores how to architect an anti-malware and endpoint security toolbox that relies on coordinating multi-layer, sophisticated defense. Discover which technologies can be connected to bolster your security posture, and learn about 3 critical layers of defense for keeping up with modern threats.
Posted: 16 Feb 2017 | Published: 16 Feb 2017

Intel Security

Your Guide to Uncovering Hidden Threats within Encrypted Traffic
sponsored by A10 Networks
WHITE PAPER: In this Ponemon Study discover how the malicious use of SSL encryption is on the rise, and what your organization can do about mitigating its risk to your business.
Posted: 15 Feb 2017 | Published: 15 Feb 2017

A10 Networks

How to Uncover Threats in SSL Traffic
sponsored by A10 Networks
WHITE PAPER: Delve into 5 features to consider when selecting an SSL inspection platform, helping you pick out the threats that may be hiding in the very encryption that you thought was making your organization safe.
Posted: 14 Feb 2017 | Published: 14 Feb 2017

A10 Networks

Agility meets Control: 3 Ways to Boost Security in the Cloud
sponsored by Microsoft
WHITE PAPER: Explore how to implement modern, cloud-capable security strategies that empower rather than hinder development and innovation. Find out 3 ways to boost security in the cloud with Windows Server 2016, starting with your OS, your data center and critical workloads, business apps, and more.
Posted: 14 Feb 2017 | Published: 31 Dec 2016

Microsoft

Vendor Risk Management Checklist
sponsored by ModoModo
WHITE PAPER: As outsourcing becomes the norm with more and more aspects of an enterprise's operations managed by third parties, these organizations expose themselves to a growing amount of shared risk. The following checklist can serve as a guide to help your organization mitigate vendor risk.
Posted: 13 Feb 2017 | Published: 13 Feb 2017

ModoModo

How to Implement Practical Security Assessments
sponsored by ModoModo
WHITE PAPER: This white paper covers ways to gain perspective about your security based on developing a proper and balanced perspective in the rather oblique world of assessments.
Posted: 13 Feb 2017 | Published: 13 Feb 2017

ModoModo

Finding a Better Metaphor, Staring into the Cloud, and What to Expect at RSA 2017
sponsored by Booz Allen Hamilton
WHITE PAPER: This white paper explores the security challenges of cloud and IoT, and examines which topics dominated the 2017 RSA conference. Find out which security paradigms are shifting and learn how security pros are putting a new spin on old topics, like how analytics and intelligence are increasing their role in threat and event management.
Posted: 13 Feb 2017 | Published: 13 Feb 2017

Booz Allen Hamilton

Cyber Threat Analysis For 2017
sponsored by Booz Allen Hamilton
WHITE PAPER: Access this guide to uncover a number of vital security predictions for 2017, including: enterprise environments providing fertile territory for ransomware operators, how IoT can enable DDoS attacks, and more.
Posted: 13 Feb 2017 | Published: 13 Feb 2017

Booz Allen Hamilton

Multi-DNS Patterns: Deliver Better Performance, Security, and Reliability
sponsored by Dyn
WHITE PAPER: Improve the performance, security and reliability of your DNS infrastructure by adding a supplemental DNS service to your IT environment. Discover 3 approaches to multi-DNS that can help deliver consistent, high-quality user experiences and mitigate outage risks.
Posted: 13 Feb 2017 | Published: 13 Feb 2017

Dyn

Leverage On-Demand Testing with Vulnerability Analytics
sponsored by IBM
WHITE PAPER: Explore how to leverage enterprise vulnerability testing services in conjunction with a portal for collaboration, project management, and reporting in order to improve your security posture. Unlock capabilities like on demand testing, vulnerability analytics and dashboards, balanced manual and automated testing, and more.
Posted: 13 Feb 2017 | Published: 13 Feb 2017

IBM

Understanding and Overcoming Cloud Security Threats
sponsored by Peak10
WHITE PAPER: The cloud doesn't have to be a security concern. This white paper dives into common security threats to the cloud and best practices on how to deal with them.
Posted: 13 Feb 2017 | Published: 13 Feb 2017

Peak10

Tackling Insider Threats
sponsored by Intel Security
WHITE PAPER: Security is an inside job. Insiders are responsible for more than 40% of data loss. Whether it's intentional or accidental, you need to stop it with policy development, event monitoring, and incident response—backed by a strong set of data loss prevention tools. Learn more. Read Tackling Insider Threats.
Posted: 13 Feb 2017 | Published: 30 Nov 2016

Intel Security

Details on Newly Observed GhostAdmin Botnet
sponsored by Booz Allen Hamilton
WHITE PAPER: Gain a rare look at the beginnings of a malware threat and learn how Booz Allen Hamilton discovered and identified indicators of compromise for the newly observed GhostAdmin malware and how to protect your enterprise from falling prey to it.
Posted: 10 Feb 2017 | Published: 10 Feb 2017

Booz Allen Hamilton
101 - 125 of 1054 Matches Previous Page    3 4 5 6 7 8    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement