Business of Information Technology  >   Business Management  >   Best Practices  >  

Security Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Security Best Practices White Papers (View All Report Types)
151 - 175 of 878 Matches Previous Page  |  Next Page
Windows Security Management: What's New in Windows 10
sponsored by LogRhythm, Inc.
WHITE PAPER: In this white paper, you'll explore how new auditing and logging capabilities in Windows 10 give IT visibility into potential threats. Uncover ways to thwart threat actors by scoping user privileges, logging on with additional credentials, and more.
Posted: 07 Mar 2016 | Published: 29 Jan 2016

LogRhythm, Inc.

What’s New in the Windows 10 Security Log
sponsored by LogRhythm, Inc.
WHITE PAPER: In this white paper, take a look at the new and updated event entries in Windows 10 and learn how to leverage them to identify malicious activity. Continue reading to uncover the specific auditing and logging events recently added by Microsoft and how to turn data into insights.
Posted: 07 Mar 2016 | Published: 27 Jan 2016

LogRhythm, Inc.

How to Mobilize your Corporate Content and Apps
sponsored by IBM MaaS360
WHITE PAPER: In this white paper, you will examine a comprehensive mobile security strategy that will give your employees unparalleled access to resources behind your firewall, while also securing your data. Read on to see how this strategy includes the ability to mobilize SharePoint, Windows File Share, and your intranet sites, and more.
Posted: 07 Mar 2016 | Published: 31 Dec 2014

IBM MaaS360

2016 Cyber-Threat Defense Report
sponsored by LogRhythm, Inc.
WHITE PAPER: This report illuminates ways to reduce your attack surface using next-generation firewalls and CASBs, so you can control access to network and cloud-based computing resources. Access now to examine other tools and tactics, including network access control, full-network scans, and more.
Posted: 04 Mar 2016 | Published: 04 Mar 2016

LogRhythm, Inc.

Best Practices for Mobile Application Lifecycle Management
sponsored by IBM MaaS360
WHITE PAPER: In this white paper, you will discover several mobile application lifecycle management (MALM) best practices for organizations with BYOD policies. Read on to discover the benefits of MALM, including single sign-on for all enterprise apps, real-time security reporting, and more.
Posted: 04 Mar 2016 | Published: 31 Dec 2014

IBM MaaS360

Make Endpoint Security Part of Your Client Systems Refresh
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Access this guide to uncover preloaded, validated and tested endpoint security strategies. Learn ways to extend data protection to employees on all endpoint devices, regardless of where they are located.
Posted: 04 Mar 2016 | Published: 04 Mar 2016

Dell, Inc. and Intel®

Mobile Data Security: Finding the Balance for Secure Productivity
sponsored by IBM MaaS360
WHITE PAPER: In this white paper, you will discover the strategic steps your organization should take before committing to a mobile security solution. Read on to uncover the questions you should be asking, both to vendors and to yourself, and how to use your knowledge to commit to a security solution—like container and virtualization approaches.
Posted: 04 Mar 2016 | Published: 31 Dec 2014

IBM MaaS360

Cyber Security Intelligence Index for Manufacturing
sponsored by IBM
WHITE PAPER: This research report offers a high-level overview of the major threats trending across businesses worldwide over the past year.
Posted: 04 Mar 2016 | Published: 31 Dec 2015

IBM

IBM Report: Securing the C-suite
sponsored by IBM
WHITE PAPER: This white paper helps you understand the risks and vulnerabilities your network probably has and how to stop them from being exploited.
Posted: 03 Mar 2016 | Published: 29 Feb 2016

IBM

Mobile Device Management Policies: Best Practices Guide
sponsored by IBM MaaS360
WHITE PAPER: Your company's data is priceless, so protecting it should be your number one priority, without jeopardizing employee productivity. In this white paper, you will discover 10 best practices for MDM, including guidance on how to distribute settings Over the Air (OTA), enforce encryption, and more.
Posted: 03 Mar 2016 | Published: 31 Dec 2014

IBM MaaS360

The ABC of Security Strategy
sponsored by IBM
WHITE PAPER: This white paper highlights challenges organizations typically face in implementing effective security strategies. Learn how to manage risk and gain a competitive advantage in your field.
Posted: 03 Mar 2016 | Published: 31 Jan 2016

IBM

An Integrated Approach to Reducing Detection and Response Times
sponsored by LogRhythm, Inc.
WHITE PAPER: Access this white paper to learn about an integrated set of tools that provide a holistic view across the ever-expanding attack surface, and apply big data analytics to detect patterns of concerning behavior faster.
Posted: 03 Mar 2016 | Published: 03 Mar 2016

LogRhythm, Inc.

Continuous Monitoring and Threat Mitigation with Next-Generation NAC
sponsored by ForeScout Technologies, Inc.
WHITE PAPER: In this white paper, discover how to transform your disparate security technology silos into a more unified and automated system that continuously monitors and mitigates threats with next-generation NAC. Read on to learn how to enable BYOD adoption and support IT-GRC framework specifications.
Posted: 02 Mar 2016 | Published: 02 Mar 2016

ForeScout Technologies, Inc.

The Current and Future State of IT Security
sponsored by Dell, Inc. and Intel®
WHITE PAPER: To know what needs improvement, decision-makers need only look to their peers. Learn the priorities, challenges and strengths in IT security from 1,440 interviews conducted by market research analysts Vanson Bourne.
Posted: 02 Mar 2016 | Published: 02 Mar 2016

Dell, Inc. and Intel®

Dell Data Protection: Rapid Recovery
sponsored by Dell, Inc.
WHITE PAPER: In this white paper, find out how you can protect anything, anywhere: systems, apps and data – fast and easy. Gain a reliable, admin-friendly solution that can be deployed as software or in scalable appliance form factors with all capabilities included.
Posted: 02 Mar 2016 | Published: 29 Feb 2016

Dell, Inc.

The Forrester Wave: Information Security Consulting Services
sponsored by IBM
WHITE PAPER: This Forrester report details and analyzes the 13 most significant security consulting service providers and their offerings. Access now to learn more about how well these consultancies fulfill security standards to best select the right partner for your business.
Posted: 02 Mar 2016 | Published: 29 Feb 2016

IBM

Securing Docker: What You Need to Know
sponsored by Black Duck Software
WHITE PAPER: This white paper discusses how you can build, ship, and run distributed applications quickly and reliably. Learn how you can go from physical, single-tenanted computing resources to more efficient, virtual, multi-tenanted infrastructure that can run in traditional IT environments and in the cloud.
Posted: 01 Mar 2016 | Published: 29 Feb 2016

Black Duck Software

Next-Generation Endpoint Security
sponsored by Carbon Black
WHITE PAPER: This white paper provides a description of the requirements needed for Next-Generation Endpoint Security and the information you need to successfully protect your organization.
Posted: 07 Mar 2016 | Published: 29 Feb 2016

Carbon Black

Breach Detection: What you need to know
sponsored by Carbon Black
WHITE PAPER: This e-book outlines the tactics today's advanced attackers use to steal your sensitive data and why you need a defense-in-depth cybersecurity program that incorporates automatic detection with incident response.
Posted: 03 Mar 2016 | Published: 29 Feb 2016

Carbon Black

Advanced Threat Hunting with Carbon Black Enterprise Response
sponsored by Carbon Black
WHITE PAPER: This white paper covers the capabilities necessary to proactively and efficiently hunt for threats across your enterprise. Learn how to expand detection beyond the point of compromise.
Posted: 02 Mar 2016 | Published: 29 Feb 2016

Carbon Black

Every Second Counts: Unravel the entire attack and disrupt attacker behavior
sponsored by Carbon Black
WHITE PAPER: Access this white paper and find out how one solution can unravel an entire attack and disrupt the attacker's behavior to help you stay ahead. Learn how your organization can benefit from complete endpoint visibility, faster detection of advanced threats, more effective remediation, and much more.
Posted: 02 Mar 2016 | Published: 29 Feb 2016

Carbon Black

Data Sheet: Carbon Black Security Solution Overview
sponsored by Carbon Black
WHITE PAPER: This white paper shows you how to enable your organization to disrupt advanced attacks and deploy the best prevention strategies for your business. Learn how to achieve real-time visibility in your network.
Posted: 01 Mar 2016 | Published: 29 Feb 2016

Carbon Black

Carbon Black Enterprise Protection
sponsored by Carbon Black
WHITE PAPER: This white paper shows you a next-generation endpoint threat prevention solution that delivers a portfolio of protection policies, real-time visibility across environmnet and comprehensive compliance rules in a single platform.
Posted: 01 Mar 2016 | Published: 29 Feb 2016

Carbon Black

Carbon Black Threat Intel
sponsored by Carbon Black
WHITE PAPER: This white paper teaches you how to gain real-time threat detection and analysis to help proactively protect against advanced threats. Find out how you can proactively detect, respond and ban attacks before a breach occurs.
Posted: 29 Feb 2016 | Published: 27 Jan 2016

Carbon Black

Compliance 101: Basics for Security Professionals
sponsored by Carbon Black
WHITE PAPER: This white paper helps security professional and non-professionals alike understand their roles when it comes to compliance.
Posted: 26 Feb 2016 | Published: 31 Jan 2016

Carbon Black
151 - 175 of 878 Matches Previous Page    5 6 7 8 9 10    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement