Business of Information Technology  >   Business Management  >   Best Practices  >  

Security Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Security Best Practices White Papers (View All Report Types)
101 - 125 of 1063 Matches Previous Page  |  Next Page
Complete Data Protection
sponsored by Intel Security
WHITE PAPER: Discover how to stop data loss initiated by sophisticated malware that hijacks sensitive information. Plus learn how to implement and enforce organization-wide security policies that control how data is encrypted, monitored and protected from a central console.
Posted: 23 May 2016 | Published: 01 Apr 2016

Intel Security

When Visibility is not Enough: Taking Control of Your Data
sponsored by Intel Security
WHITE PAPER: In order to stop data breaches, organizations need to have full visibility into where their data is going. Learn how to stop critical data from leaving your enterprise and educate end-users who have lapsed into bad practices.
Posted: 23 May 2016 | Published: 01 Apr 2016

Intel Security

Addressing NIST and DOD Requirements for Mobile Device Management (MDM)
sponsored by IBM MaaS360
WHITE PAPER: Mobile device management (MDM) is critical as these devices can create vulnerabilities in network security. Two major technology institutions are determining MDM requirements for government agencies. Read on for a breakdown of the best MDM practices.
Posted: 20 May 2016 | Published: 30 Dec 2015

IBM MaaS360

Protect Patient Data with Strong Desktop Security: 7 Steps
sponsored by Aventura
WHITE PAPER: Learn how to build a security wall around PHI by addressing desktop security vulnerabilities. Unveil 7 ways to strengthen desktop security and access management in order to keep patient data safe.
Posted: 20 May 2016 | Published: 20 May 2016

Aventura

When App is the Business, the Business is the App Vol. 2
sponsored by IBM MaaS360
WHITE PAPER: Empower your organization with a mobile application strategy that advances your business while providing scalability, sustainability and security. Learn how to design your business around applications without putting enterprise data at risk.
Posted: 20 May 2016 | Published: 01 Apr 2016

IBM MaaS360

When Business is the App, The App is the Business - Vol 1
sponsored by IBM MaaS360
WHITE PAPER: Businesses need to be much more mindful about safe productivity. Learn how to safely distribute and manage mobile apps, on both BYOD and COPE devices that are critical to employee productivity and smooth business operations.
Posted: 20 May 2016 | Published: 01 Apr 2016

IBM MaaS360

IDC: Protecting Your SaaS Applications
sponsored by TrendMicro
WHITE PAPER: Learn why businesses that use SaaS services must proactively assess the status of their security program to maintain its effectiveness. Find out how to work with your employees and put effective controls in place to enforce your policies.
Posted: 20 May 2016 | Published: 31 Dec 2015

TrendMicro

Anatomy of a Cyber-Attack
sponsored by Dell Software
WHITE PAPER: You need to understand the enemy -- and their malware -- before you can defeat them. Discover a comprehensive strategy to counter every stage of cyber-attacks and eliminate every type of malware from disrupting your network.
Posted: 20 May 2016 | Published: 20 May 2016

Dell Software

A Powerful Platform for Cloud Security Analytics
sponsored by Exabeam
WHITE PAPER: Security architects and SOC managers need a solution for integrating activity across all deployments and making sense of behavior in an open, cloud-based architecture. Discover how you can analyze account lockouts, detect unusual access patterns, and prevent data loss while allowing your organizations to continue growing with the cloud.
Posted: 20 May 2016 | Published: 31 Dec 2015

Exabeam

Detect Compromised Credentials with UEBA
sponsored by Exabeam
WHITE PAPER: User behavior intelligence and security session assembly can help enterprises root out attackers that impersonate employees. Discover how the right solution can help you give more complex tasks to junior security analysts while speeding up data analysis.
Posted: 20 May 2016 | Published: 31 Dec 2014

Exabeam

Detect, Prioritize, and Respond to Modern Cyber Attacks
sponsored by Exabeam
WHITE PAPER: They need the ability to automatically analyze user behavior to respond effectively. Learn how to leverage existing log data to detect modern attacks and prioritize incidents efficiently. Used correctly, user behavior analytics adds a powerful analytics layer over existing security technologies, guiding a more effective response to attacks.
Posted: 20 May 2016 | Published: 31 Dec 2015

Exabeam

The Productivity Transformation
sponsored by IBM MaaS360
WHITE PAPER: Your enterprise can't be left behind in this new era of productivity. Enable your employees by creating secure systems that can protect your data while living on less than enterprise secure devices.
Posted: 19 May 2016 | Published: 01 Mar 2016

IBM MaaS360

2015 the Year Data Breaches Got Personal
sponsored by Gemalto
WHITE PAPER: Data breaches continue to be a large and growing threat for organizations in all industries. Many are clinging to conventional ways of looking at cyber security rather than taking a newer approach. With this cybercrime data, you'll be able to formulate a modern security strategy to stay ahead of evolving threats and hackers.
Posted: 18 May 2016 | Published: 31 Dec 2015

Gemalto

A Step-By-Step Guide to Finding the Right Safenet Data Protection Solution for Your Organization
sponsored by Gemalto
WHITE PAPER: Deploy a unified, efficient data protection platform that can be leveraged to secure all data types. Whether it is data in motion or data living on your physical, cloud or hybrid environment, this white paper makes it quick and easy to pinpoint a system that best fits your security needs.
Posted: 18 May 2016 | Published: 31 Dec 2015

Gemalto

Security essentials for CIO's enabling mobility - their device, your data
sponsored by IBM MaaS360
WHITE PAPER: Your goal is to make BYOD policies feasible by seamlessly securing corporate data on the device while providing logical separation from personal activities. Learn five key steps you should consider before putting your BYOD program in place.
Posted: 18 May 2016 | Published: 31 Dec 2012

IBM MaaS360

Encrypt Everything How to Unshare and Secure Your Sensitive Data Wherever It Resides
sponsored by Gemalto
WHITE PAPER: Stuck in the data protection dilemma? How do you find a way to balance critical business needs and requirements, while protecting your data from malicious threats? Learn a multitier plan that helps you protect your perimeter while also encrypting data in every level, moving or at rest.
Posted: 17 May 2016 | Published: 01 Apr 2016

Gemalto

Market Focus Double Vision
sponsored by Gigamon
WHITE PAPER: It's time to get real with security realities. Understand how to achieve greater visibility into your network traffic and learn where other organizations stand in the cyber security war.
Posted: 17 May 2016 | Published: 01 Feb 2016

Gigamon

Enterprise Security Innovation on the AWS Cloud
sponsored by Unisys
WHITE PAPER: One security leader optimized its offerings to give AWS customers a fast and convenient way to protect their data and applications against evolving threats. Discover ways to easily integrate additional protection, comply with regulations, and micro-segment off your virtual machines from neighbors when working on the cloud.
Posted: 17 May 2016 | Published: 19 Jan 2016

Unisys

Cloud Security: Advanced, Efficient, and Trusted
sponsored by Unisys
WHITE PAPER: Yesterday's security has fallen behind the needs of today. Here are better ways to address threats by keeping security up to speed with the cloud.
Posted: 17 May 2016 | Published: 17 May 2016

Unisys

How One Security Expert is Exploring Modern Threats to Enterprises
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Organizations that deploy the right defenses, adopt the right governance, and train the right teams can achieve security in the evolving war over data. Discover ways to adapt your security strategy to new business models through a growing number of channels.
Posted: 17 May 2016 | Published: 17 May 2016

Check Point Software Technologies Ltd.

E-Waste Is More Than Just Clutter
sponsored by Iron Mountain
WHITE PAPER: Do you dispose of, repurpose or recycle your old IT assets and technology? Explore why and how you should create a secure and frequent IT asset disposal program for your organization to stay compliant, safe, and clutter-free.
Posted: 17 May 2016 | Published: 31 Dec 2015

Iron Mountain

Why IT Leaders Are Buying into Mobile Security
sponsored by Lookout
WHITE PAPER: See how CIOs have zeroed-in the threat to mobile security and how they shut down attempts at breaching their networks. Read on to ensure mobility doesn't become a liability to your organization and learn how pros fend off today's data breaches.
Posted: 17 May 2016 | Published: 17 May 2016

Lookout

IT Guide: Windows 10 Migration Minus The Complexity
sponsored by Druva Software
WHITE PAPER: In just six steps, you can leverage endpoint data protection to help you ease into OS migration. Learn how to craft a migration plan that drastically simplifies the OS refresh process and provides comprehensive data protection and governance foundation for your organization.
Posted: 16 May 2016 | Published: 31 Dec 2015

Druva Software

Security without Limits: Extending Enterprise-Grade Security from your Data Center to the Cloud
sponsored by Unisys
WHITE PAPER: Need the ability to quickly and securely shift workloads back forth between the data center and the cloud? Access this white paper and discover ways cryptographic micro-segmentation can seamlessly protect data center workloads against unauthorized access.
Posted: 16 May 2016 | Published: 16 May 2016

Unisys

Your Complete Guide to Office 365 Security
sponsored by Datto, Inc.
WHITE PAPER: Get an in-depth look at the security features that Microsoft has built into Office 365. Learn how stringent Office 365's security practices are and learn exactly what's being done to protect your valuable data, including O365 encryption, multi-factor authentication, and more.
Posted: 16 May 2016 | Published: 16 May 2016

Datto, Inc.
101 - 125 of 1063 Matches Previous Page    3 4 5 6 7 8    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement