Business of Information Technology  >   Business Management  >   Best Practices  >  

Security Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Security Best Practices White Papers (View All Report Types)
151 - 175 of 712 Matches Previous Page  |  Next Page
The Current Chaotic State of Data Traffic Security
sponsored by Certes Networks
WHITE PAPER: This white paper explores the results of a survey of more than 6 million IT professionals that aimed to discover how companies across the globe handle data in motion and other IT security issues. The results made one thing apparent: Data traffic encryption is a mess.
Posted: 06 Jan 2015 | Published: 16 Dec 2014

Certes Networks

Taking Control of File Sharing Services
sponsored by Mimecast
WHITE PAPER: This informative white paper discusses how file sharing services are being used within enterprises; the benefits and risks that they bring; and the factors that organizations should consider in selecting an enterprise-grade service in order to ensure its security.
Posted: 19 Dec 2014 | Published: 30 Apr 2014

Mimecast

Email Security Checklist: Eight Steps for Healthcare Organizations
sponsored by Mimecast
WHITE PAPER: This white paper explains how you can embrace email as a core communication tool while still adhering to HIPAA guidelines.
Posted: 18 Dec 2014 | Published: 18 Dec 2014

Mimecast

Healthcare Email Management: Balancing Security, Compliance, and Cost
sponsored by Mimecast
WHITE PAPER: This white paper discusses a number of email management challenges facing healthcare CIOs, including HITECH and HIPAA compliance, budget constraints, cloud-based email and collaboration technologies, and data security.
Posted: 17 Dec 2014 | Published: 17 Dec 2014

Mimecast

Websense® Security Labs™: 8 Security Predictions for 2015
sponsored by Websense
WHITE PAPER: This must-read resource from Websense presents the top 8 security predictions for 2015.
Posted: 01 Dec 2014 | Published: 18 Nov 2014

Websense

Security Experts’ Guide to the Cloud
sponsored by ControlNow
WHITE PAPER: Cloud computing delivers a number of benefits, but it's security has always been an issue. Access this resource, tech influencers share their views on security and the cloud and give advice on how to marry the cloud and security into your business.
Posted: 26 Nov 2014 | Published: 26 Nov 2014

ControlNow

Top Tips for Time Stretched Admins
sponsored by ControlNow
WHITE PAPER: This guide provides time-saving tips that IT admins at smalland mid-sized companies can use to stay on top of theirworkloads, keep systems running and protected, and maintaina healthy work/life balance.
Posted: 24 Nov 2014 | Published: 24 Nov 2014

ControlNow

Central control. Manage, monitor and secure your network in minutes with ControlNow
sponsored by ControlNow
WHITE PAPER: This exclusive white paper takes an in-depth look at how one bank was able to recover and continue business after a security breach. Read on to learn more.
Posted: 24 Nov 2014 | Published: 24 Nov 2014

ControlNow

Central Bank and Trust
sponsored by ControlNow
WHITE PAPER: This exclusive case study takes an in-depth look at how one bank was able to recover and continue business after a security breach. Read on to learn more.
Posted: 24 Nov 2014 | Published: 24 Nov 2014

ControlNow

How Palo Alto Networks Can Help With ASD's Top Cyber Intrusion Mitigation Strategies
sponsored by Palo Alto Networks
WHITE PAPER: This exclusive white paper takes an in-depth look at today's best threat mitigation strategies, and how the addition of next-generation threat intelligence can provide rock-solid security. Read on to learn more.
Posted: 24 Nov 2014 | Published: 24 Nov 2014

Palo Alto Networks

Five Steps to Firewall Planning and Design
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper highlights a set of guidelines that can be used to create an overall security policy for your organization.
Posted: 21 Nov 2014 | Published: 21 Nov 2014

Juniper Networks, Inc.

BYOD: A Complex Environment to Deploy Secure Solutions
sponsored by Gemalto
WHITE PAPER: This white paper gives an overview of a number of problems associated with mobile security, as well as several potential solutions. Read on to learn how to maximize security for mobile endpoints within your enterprise, and how to successfully implement these solutions in a rapidly changing mobile enterprise market.
Posted: 11 Nov 2014 | Published: 11 Nov 2014

Gemalto

Seizing Opportunities and Eliminating Risks with BYOD and Mobile Security
sponsored by Gemalto
WHITE PAPER: This white paper distills the complexities of BYOD scenarios into three common use cases. Read on to find actionable mobile security ideas that fit your own organization's specific requirements in order to reduce threats in this dynamic landscape.
Posted: 11 Nov 2014 | Published: 10 Nov 2014

Gemalto

Ensuring Progress Toward Risk Management and Continuous Configuration Compliance
sponsored by IBM
WHITE PAPER: This exclusive white paper takes an in-depth look at one endpoint management solution that helped apply, enforce, and manage endpoint security and risk. Read on to learn more.
Posted: 10 Nov 2014 | Published: 10 Nov 2014

IBM

Comply Before You Connect: Security for Federal Agencies
sponsored by IBM
WHITE PAPER: This white paper discusses the use of "comply-to-connect" initiatives in federal agencies and proposes IBM Endpoint Manager as a solution to the need for continuous compliance.
Posted: 07 Nov 2014 | Published: 30 Sep 2013

IBM

Strong Authentication: Best Practices and Use Cases
sponsored by Gemalto
WHITE PAPER: This helpful white paper explains how an identity-centric approach to IT security can lock down critical processes and systems and ensure that you have complete control over who has access.
Posted: 06 Nov 2014 | Published: 06 Nov 2014

Gemalto

Are You Ready for Windows Server 2012 Migration?
sponsored by Dell and Microsoft
WHITE PAPER: Read this white paper to learn about the improved virtualization, storage, networking, and other features of Windows Server 2012. Time is running out for Windows Server 2003 support and now is the right time to begin your migration to Windows Server 2012.
Posted: 04 Nov 2014 | Published: 11 Dec 2013

Dell and Microsoft

BYOD and Mobile Security: The Disconnect Between Employers and Employees
sponsored by Webroot
WHITE PAPER: This white paper proposes that there is a disconnect between how employees use mobile security and how organizations implement BYOD policies, and presents the results of a recent study commissioned by Webroot that examines these issues.
Posted: 27 Oct 2014 | Published: 31 Jul 2014

Webroot

Why SSL Certificate Management Is Critical to Today’s Enterprise
sponsored by Symantec Corporation
WHITE PAPER: The Internet has evolved in innumerable ways over the past decade and a half; so why do SSL Certificates continue to instill trust?
Posted: 03 Oct 2014 | Published: 03 Oct 2014

Symantec Corporation

5 Ways That  Data Analytics Help Healthcare Systems
sponsored by ExtraHop
WHITE PAPER: This white paper describes the benefits of the real-time healthcare system, and how one company is using wire data analytics to empower healthcare IT and provide unprecedented insight into all of an organization's wire data.
Posted: 18 Sep 2014 | Published: 18 Sep 2014

ExtraHop

Prevent Fraud and Improve the User Experience with Mobile Access Management
sponsored by IBM
WHITE PAPER: This white paper examines the challenges of providing secure access in the mobile world and explores new security models, policies, and controls that can help to protect your critical assets and data.
Posted: 03 Dec 2014 | Published: 30 Sep 2013

IBM

HP Security Cyber Risk Report
sponsored by Hewlett-Packard Company
WHITE PAPER: This HP Security Cyber Risk Report provides industry-wide data on vulnerabilities in software, mobile, and web applications; examines how specific technologies like iOS, Android, and JAVA contribute to the attack surface; and more.
Posted: 19 Nov 2014 | Published: 31 Jan 2014

Hewlett-Packard Company

Quantifying the Impact of Network-Based Attacks
sponsored by Icomm Technologies
WHITE PAPER: In this informative whitepaper, explore in-depth guidelines that will help assess the impact of attacks on your organization, and they can affect your bottom line.
Posted: 18 Sep 2014 | Published: 18 Sep 2014

Icomm Technologies

The Wild World of Malware: Keeping Your Company Safe from Advanced Threats
sponsored by Icomm Technologies
WHITE PAPER: In this in-depth resource, gain essential knowledge on today's advanced malware threats, and discover how new next-generation firewalls (NGFW) can prevent them from gaining access to your valuable data.
Posted: 17 Sep 2014 | Published: 31 Jul 2012

Icomm Technologies

A New Set of Network Security Challenges
sponsored by Icomm Technologies
WHITE PAPER: Today, workers demand access from devices beyond the firewall.  Smart phones, tablets, and laptops of all types.  However, the biggest challenge is finding a balance between productive and security.
Posted: 17 Sep 2014 | Published: 17 Sep 2014

Icomm Technologies
151 - 175 of 712 Matches Previous Page    5 6 7 8 9 10    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement