Business of Information Technology  >   Business Management  >   Best Practices  >  

Security Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Security Best PracticesWhite Papers (View All Report Types)
151 - 175 of 741 Matches Previous Page  | Next Page
The Changing Face Of Cyber-Attacks: Preventing Both External and Insider Threats
sponsored by CA Technologies.
WHITE PAPER: This resource highlights where organizations fall short in security and offers critical solutions to help improve data security, reduce costs, and maintain compliance via privileged identity management.
Posted: 19 Jun 2014 | Published: 30 Jun 2013

CA Technologies.

Protecting Your APIs Against Attack and Hijack with CA Layer 7
sponsored by CA Technologies.
WHITE PAPER: This white paper offers 5 best practices to help thwart API threats, which require different strategies than traditional Web infrastructures.
Posted: 19 Jun 2014 | Published: 28 Feb 2014

CA Technologies.

The Evolution of the Enterprise and Enterprise Security
sponsored by Fortinet, Inc.
WHITE PAPER: This informative paper examines how the enterprise has evolved and how your security needs to evolve with it. Read on to find out more about the current state of enterprise security.
Posted: 19 Jun 2014 | Published: 19 Jun 2014

Fortinet, Inc.

Who Achieves 100% on NSS Data Center Firewall Security Testing
sponsored by Fortinet, Inc.
WHITE PAPER: This exclusive resource analyzes a firewall solution that has passed all stability, reliability, and firewall policy enforcement tests to ensure that your environment is as safe as it can be.
Posted: 19 Jun 2014 | Published: 19 Jun 2014

Fortinet, Inc.

Best Practices for Facing Today's Log Management Challenges
sponsored by Alert Logic
WHITE PAPER: This whitepaper discusses key best practices to consider when evaluating automated log management solutions.
Posted: 19 Jun 2014 | Published: 31 May 2012

Alert Logic

Leading the Charge in Emerging MSSPs
sponsored by Alert Logic
WHITE PAPER: In this paper Forrester shares the results of their 15-criteria evaluation of the top ten emerging players in the MSSP market.
Posted: 19 Jun 2014 | Published: 08 Jan 2013

Alert Logic

Surprising Research on the Evolving State of Cloud Security
sponsored by Alert Logic
WHITE PAPER: This resource aims to break the lingering assumption that the cloud is inherently less secure than an enterprise data center environment.
Posted: 18 Jun 2014 | Published: 18 Jun 2014

Alert Logic

Product Report Card: NSS Labs Evaluates FortiSandbox
sponsored by Fortinet, Inc.
WHITE PAPER: This exclusive white paper takes an in-depth look at a breach detection solution that identifies and mitigates any potential network threat or intrusion, allowing you to continue to provide the services your users need.
Posted: 17 Jun 2014 | Published: 17 Jun 2014

Fortinet, Inc.

Defense throughout the Vulnerability Life Cycle with Alert Logic Threat and Log Manager
sponsored by Alert Logic
WHITE PAPER: In this white paper we will discuss how vulnerability assessment, network intrusion detection and log management work together to protect your IT assets.
Posted: 17 Jun 2014 | Published: 17 Jun 2014

Alert Logic

The Keys to Securing Data in a Collaborative Workplace
sponsored by Dropbox for Business
WHITE PAPER: This white paper offers 5 valuable steps to secure file sync and share so that employees can enjoy the benefits of collaboration without fear of data loss.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

Dropbox for Business

Malware Analysts Have the Tools to Defend Against Cyber-Attacks, But Challenges Remain
sponsored by Threat Track Security
WHITE PAPER: This informative guide explores today's threat landscape, the role of malware and the threat of internal vulnerabilities.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

Threat Track Security

MSSP Data Sheet
sponsored by AlienVault
WHITE PAPER: This informative guide explores one company's unique MSSP platform and how it can greatly enhance your revenue and your customer's security.
Posted: 13 Jun 2014 | Published: 13 Jun 2014

AlienVault

Securing the Mobile Cloud Connected Enterprise
sponsored by CA Technologies.
WHITE PAPER: This resource reveals the role of identity and access management in improving access and secure collaboration in today's mobile, cloud-connected IT environment.
Posted: 12 Jun 2014 | Published: 12 Jun 2014

CA Technologies.

The One-Man SOC Webcast: Habits of Highly Effective Security Practitioners
sponsored by AlienVault
WHITE PAPER: This informative resource outlines top strategies for a highly effective SOC.
Posted: 12 Jun 2014 | Published: 12 Jun 2014

AlienVault

Taking control of file sharing services
sponsored by Mimecast
WHITE PAPER: This white paper offers key recommendations on choosing an enterprise-grade file sharing service for optimum collaboration security.
Posted: 10 Jun 2014 | Published: 30 Apr 2014

Mimecast

Vormetric Encryption Architecture Overview
sponsored by Vormetric
WHITE PAPER: This white paper explains why an encryption strategy is a must in order to better protect data from security breaches.
Posted: 10 Jun 2014 | Published: 31 Dec 2012

Vormetric

HP ArcSight ESM Solution Helps Finansbank to Combat Fraud and Increase Customer Satisfaction
sponsored by Hewlett-Packard Company
WHITE PAPER: In this case study, learn how one bank implemented a fraud management security platform that was able to meet the growing scale of customers, while providing clear visibility into transaction activity over a range of channels. Click now to see how else they're benefiting!
Posted: 05 Jun 2014 | Published: 31 Jul 2013

Hewlett-Packard Company

A Survey of Zero-day Attacks in 2013 and What They Say About the Traditional Security Model
sponsored by FireEye
WHITE PAPER: This informative survey explores zero-day attacks in 2013 and what they say about the traditional security model.
Posted: 05 Jun 2014 | Published: 05 Jun 2014

FireEye

Smart enterprise mobility solutions are powered by Smart Containerization™
sponsored by CA Technologies.
WHITE PAPER: This informative white paper examines a technique called containerization, which allows you to keep enterprise data segregated in its own "container" so that you can apply security policies without affecting any data that isn't work related.
Posted: 04 Jun 2014 | Published: 04 Jun 2014

CA Technologies.

Beyond the Breach
sponsored by FireEye
WHITE PAPER: This informative whitepaper takes a look at today's threat landscape and outlines the unfortunate news – security breaches are inevitable.
Posted: 04 Jun 2014 | Published: 04 Jun 2014

FireEye

Denial-of-Service (DoS) Secured Virtual Tenant Networks (VTN)
sponsored by NEC Corporation of America
WHITE PAPER: This crucial paper discusses the evolution of DDoS attacks and examines an SDN solution that detects and mitigates potential attacks almost instantly, ensuring that your network is kept up and running.
Posted: 03 Jun 2014 | Published: 03 Jun 2014

NEC Corporation of America

Analyzing Four Widely Exploited Java Vulnerabilities
sponsored by FireEye
WHITE PAPER: This informative guide explores the technical details of the 4 most common Java vulnerabilities and outlines each step of the infection flow.
Posted: 03 Jun 2014 | Published: 03 Jun 2014

FireEye

Cover Your SaaS!
sponsored by BitGlass
WHITE PAPER: This white paper reveals the top 5 cloud security solutions to invest in to best protect your virtualized assets.
Posted: 17 Jun 2014 | Published: 17 Jun 2014


Live Webinar: Strategies That Work for Advanced Persistent Threat Prevention
sponsored by Palo Alto Networks
WHITE PAPER: Join this exclusive live webcast on July 10, at 11 AM GMT to take an in-depth look at the state of ATP prevention today and find out how your organization can keep your sensitive data and applications safe.
Posted: 16 Jun 2014 | Published: 10 Jul 2014

Palo Alto Networks

Building a Better Network Security Strategy
sponsored by Hewlett-Packard Company
WHITE PAPER: This informative resource discusses what features a network security strategy should cover in order to ensure success in today's business world.
Posted: 06 Jun 2014 | Published: 31 Jan 2014

Hewlett-Packard Company
151 - 175 of 741 Matches Previous Page    5 6 7 8 9 10    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement