Business of Information Technology  >   Business Management  >   Best Practices  >  

Security Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Security Best PracticesWhite Papers (View All Report Types)
126 - 150 of 734 Matches Previous Page  | Next Page
The Importance of Reputation
sponsored by Hewlett-Packard Company
WHITE PAPER: This guide explores the inexplicable link between data and security, and lays out the current threat landscape in today's ever-changing IT world.
Posted: 19 Aug 2014 | Published: 31 Dec 2013

Hewlett-Packard Company

The 2014 Next Generation Firewall Challenge
sponsored by Hewlett-Packard Company
WHITE PAPER: This resource helps you understand the next generation firewall (NGFW), and how to choose the best solution to combat today's threats.
Posted: 18 Aug 2014 | Published: 19 Nov 2014

Hewlett-Packard Company

HP Global 2000 Mobile Risk Report
sponsored by Hewlett-Packard Company
WHITE PAPER: Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.
Posted: 18 Aug 2014 | Published: 18 Aug 2014

Hewlett-Packard Company

Reducing security risks from open source software
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper highlights how your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Posted: 18 Aug 2014 | Published: 01 Oct 2013

Hewlett-Packard Company

Seven steps to software security
sponsored by Hewlett-Packard Company
WHITE PAPER: Learn seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Posted: 18 Aug 2014 | Published: 01 Sep 2013

Hewlett-Packard Company

Determining the Right Mobile Security Solution for Your Organization
sponsored by IBM
WHITE PAPER: This helpful white paper presents the steps every organization should take before committing to a mobile security solution, and examines the pros and cons of different potential security strategies.
Posted: 07 Aug 2014 | Published: 07 Aug 2014

IBM

Balance Work and Personal Use on Mobile Devices Securely
sponsored by IBM
WHITE PAPER: This resource highlights a cross-platform solution that strives towards data loss prevention with a consistent workflow.
Posted: 05 Aug 2014 | Published: 05 Aug 2014

IBM

Knowledge is Security: How to Protect Your Website with Effective Monitoring
sponsored by Symantec
WHITE PAPER: This exclusive whitepaper will show you how to patch website vulnerabilities with effective security and monitoring.
Posted: 04 Aug 2014 | Published: 04 Aug 2014

Symantec

Best Practices for Secure Mobile Access
sponsored by Dell Software
WHITE PAPER: Learn how you can implement secure mobile access in a controlled, step-by-step manner, so you can allow your increasingly mobile workforce to become more productive and still ensure the security of your corporate data and resources.
Posted: 04 Aug 2014 | Published: 31 Dec 2013

Dell Software

Mobile Device Management Policy Best Practices
sponsored by IBM
WHITE PAPER: Managing smartphones and tablets is only half the Mobile Device Management (MDM) story. Securing the data and access points between corporate systems and your workers' variety of mobile devices requires just as much consideration and planning as protecting the devices themselves.
Posted: 01 Aug 2014 | Published: 01 Aug 2014

IBM

The Power to Destroy: How Malware Works
sponsored by Symantec
WHITE PAPER: In this white paper, you'll learn the basics of how malware works and how cyber criminals use it to steal valuable data, as well as the best practices for defending your website against them.
Posted: 31 Jul 2014 | Published: 31 Jul 2014

Symantec

LogRhythm's Security Intelligence Platform
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper describes LogRhythm's Security Intelligence Platform, which combines enterprise-class SIEM, Log Management, File Integrity Monitoring, and Machine Analytics with Host and Network Forensics to provide profound visibility into threats and risks to which organizations are otherwise blind.
Posted: 31 Jul 2014 | Published: 29 Jul 2014

LogRhythm, Inc.

LogRhythm Labs Embedded Expertise
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper describes LogRhythm Labs, an organization within LogRhythm that performs dedicated research to continually enhance the Security Intelligence Platform with embedded machine data intelligence, real-time threat detection, and automated compliance assurance.
Posted: 31 Jul 2014 | Published: 29 Jul 2014

LogRhythm, Inc.

Data Center Trends and Network Security Impact
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper reviews the major data center trends that enterprises and service providers should be preparing for, as well as their anticipated impact on network security.
Posted: 29 Jul 2014 | Published: 31 Dec 2012

Fortinet, Inc.

Comparing Security Information and Event Management (SIEM) Technologies
sponsored by IBM
WHITE PAPER: This highly informative white paper from Gartner objectively evaluates a variety of SIEM technologies on a number of critical dimensions, including market responsiveness, customer experience, and pricing.
Posted: 24 Jul 2014 | Published: 25 Jun 2014

IBM

The Evolution of Application Vulnerabilities, Spam Threats, and Incident Response
sponsored by IBM
WHITE PAPER: This report details the many breaches and security incidents that have plagued organizations in recent years; threats from past years that are currently showing signs of resurgence; and issues to be aware of in today's security landscape.
Posted: 24 Jul 2014 | Published: 30 Jun 2014

IBM

A Secure Transition to iOS
sponsored by IBM
WHITE PAPER: Read this white paper to learn about a security solution that has a clean and intuitive interface with easy reporting and usage tracking for expense management.
Posted: 22 Jul 2014 | Published: 22 Jul 2014

IBM

Security for a Faster World
sponsored by Hewlett-Packard Company
WHITE PAPER: This eBook presents a maturity model that will help you determine how secure you really are, explores five questions every CIO should be able to answer, and outlines a new approach based on intelligence gathering and research that can keep you ahead of the cybercriminals.
Posted: 19 Aug 2014 | Published: 13 Jun 2013

Hewlett-Packard Company

Cybercriminals Exploit New Weaknesses in Retailers’ Networks
sponsored by FireEye
WHITE PAPER: In this informative white paper, discover how you can protect your retail business and your customers by implementing smart security strategies, including increased endpoint security and privileged account management.
Posted: 08 Aug 2014 | Published: 08 Aug 2014

FireEye

The Three Phases of Securing Privileged Accounts- A Best Practices Guide
sponsored by Cyber-Ark Software
WHITE PAPER: This helpful white paper explains exactly how privileged account security works, and outlines the best practices for implementing it for your organization.
Posted: 30 Jul 2014 | Published: 30 Jul 2014

Cyber-Ark Software

Implementing Privileged Account Security to Address Advanced Threats
sponsored by Cyber-Ark Software
WHITE PAPER: In this informative Q&A, you'll get inside information from industry analysts as they discuss the best security practices for IT professionals, why privileged account security is vital to a successful security plan, and how to protect your systems from new strategies utilized by cybercriminals.
Posted: 30 Jul 2014 | Published: 31 Dec 2013

Cyber-Ark Software

How Privileged Account Security Can Significantly Reduce Risk, Stop Attackers & Prevent Data Exfiltration
sponsored by Cyber-Ark Software
WHITE PAPER: This white paper examines the best practices for minimizing the security risks that privileged accounts can create, and provides the essential strategic takeaways that can start protecting your organization now.
Posted: 30 Jul 2014 | Published: 31 May 2014

Cyber-Ark Software

What's Behind a Cyber Attack?
sponsored by IBM
WHITE PAPER: This white paper analyzes the shortcomings of many current approaches to breach investigation, and also introduces one solution to help organizations to defend against advanced persistent and internal threats.
Posted: 29 Jul 2014 | Published: 30 Apr 2014

IBM

Enterprise Information Security in Transition
sponsored by IBM
WHITE PAPER: This white paper boils the reasons behind current issues in the information security field down into four major causes, and also lays out a list of specific, detailed changes that need to be made to the enterprise security model for these core issues to be resolved.
Posted: 28 Jul 2014 | Published: 31 Oct 2012

IBM

Extending Security Intelligence with Big Data
sponsored by IBM
WHITE PAPER: This white paper introduces a security solution that applies big data capabilities to help organizations to keep pace with today's advanced threats and prevent attacks before they happen.
Posted: 28 Jul 2014 | Published: 31 Jan 2013

IBM
126 - 150 of 734 Matches Previous Page    4 5 6 7 8 9    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement