Business of Information Technology  >   Business Management  >   Best Practices  >  

Security Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Security Best Practices White Papers (View All Report Types)
26 - 50 of 1059 Matches Previous Page  |  Next Page
How business innovations meet the business of hacking
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Hackers are sophisticated but what does that mean for your business? Explore the business of hacking. Discover the different ways cybercriminals make money, their motivations and different hacking organizations.
Posted: 14 Jun 2016 | Published: 01 May 2016

Hewlett Packard Enterprise

The State of Dynamic Data Center and Cloud Security in the Modern Enterprise
sponsored by Illumio
WHITE PAPER: In this report, witness key findings drawn from the SANS Dynamic Data Center Survey about modern security concerns with the transition to a hybrid data center environment, dynamically developing security changes, strategies to protect data in a hybrid environment, and more.
Posted: 14 Jun 2016 | Published: 31 Oct 2015

Illumio

Cybersecurity as a Growth Advantage
sponsored by Cisco
WHITE PAPER: Don't stifle your innovation potential. Join the discussion on how cybersecurity plays a role in our current economy, threats to be aware of, and the business benefits it enables.
Posted: 14 Jun 2016 | Published: 14 Jun 2016

Cisco

The World Sees 80,000 New Malware Threats Each Day -- Don't Be a Victim
sponsored by Unisys
WHITE PAPER: Micro-segmentation, paired with advanced analytics, can help you manage malware and other risks. Learn now about multi-dimensional cyber-attack detection through machine learning and predictive algorithms, for definable security analysis to determine who your organization can trust.
Posted: 13 Jun 2016 | Published: 13 Jun 2016

Unisys

THE FIVE NEW RULES TO SECURE DYNAMIC DATA CENTERS AND CLOUDS
sponsored by Illumio
WHITE PAPER: The current security model for protecting applications in data centers and clouds is broken. We need an approach to security that protects from the inside out, and decouples security from the underlying infrastructure. Discover the 5 new rules to secure dynamic data centers and clouds in this white paper.
Posted: 13 Jun 2016 | Published: 13 Jun 2016

Illumio

A Smart Way to Protect Windows Server 2003
sponsored by Unisys
WHITE PAPER: Explore ways to protect data with endpoint-to-endpoint encryption while you make Windows Server 2003 and other endpoints elusive to hackers.
Posted: 13 Jun 2016 | Published: 30 Jun 2014

Unisys

There's Never Been A Better Time to Worry Less and Innovate More
sponsored by Cisco
WHITE PAPER: You need tools that fight digital vermin for you. Explore ways to leverage simple security, so your business can do what it does best: innovate and grow.
Posted: 13 Jun 2016 | Published: 13 Jun 2016

Cisco

Most Effective Security Technologies and Practices
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Discover how understanding the business of hacking and how cybercriminals profit can help you develop a successful security strategy.
Posted: 13 Jun 2016 | Published: 01 May 2016

Hewlett Packard Enterprise

Redefining the Mission of Mobile Authentication
sponsored by Aruba Networks
WHITE PAPER: Billions of Wi-Fi enabled smartphones and tablets are pouring into the workplace and users have more latitude to connect to any network and download apps of their choice. The expectation is that the mobility experience just works anytime, anywhere. This is causing IT to struggle to maintain control.
Posted: 10 Jun 2016 | Published: 10 Jun 2016

Aruba Networks

Empowering Mobile Security with Policy Management
sponsored by Aruba Networks
WHITE PAPER: Policy management is the key to enforcing mobile security. Discover cost-effective, easier ways to manage the tedious and complex rule sets associated with legacy authentication, authorization and accounting.
Posted: 10 Jun 2016 | Published: 10 Jun 2016

Aruba Networks

Fraud risk engines strike back
sponsored by IBM
WHITE PAPER: Discover how to approach fraud detection in a new way. You must base your stance on three core principles —visibility, a global threat intelligence network, and agility by design. By using this approach, you can significantly reduce the number of false positives and can improve customer satisfaction.
Posted: 10 Jun 2016 | Published: 01 Feb 2016

IBM

Gain Capabilities to help you Protect, and Insight to Understand
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: As threats evolve, organizations must find ways to continuously detect, prevent, and respond quickly to attacks on the endpoint in order to limit damages. Discover a strategy that can help you protect endpoint devices against advanced and zero-day threats.
Posted: 10 Jun 2016 | Published: 10 Jun 2016

Check Point Software Technologies Ltd.

Fraud protection doesn't have to be an uphill battle
sponsored by IBM
WHITE PAPER: You can simplify the fraud protection process while reducing time and cost. Learn how to achieve greater visibility and adaptability across the fraud management lifecycle and discover highly effective intelligence- and evidence-based fraud detection with fewer false positives.
Posted: 10 Jun 2016 | Published: 01 May 2016

IBM

Best Practices for Strong Cyber Security
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Discover how enterprise security best practices can help you avoid suffering financial losses, damage to your brand, and damage to customer relationships caused by undetected or detected too late cyber attacks.
Posted: 10 Jun 2016 | Published: 10 Jun 2016

Hewlett Packard Enterprise

Few Fully Prepared for Software Security Risks
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This white paper shows you results from a recent security survey and the value of testing your security measure regularly.
Posted: 10 Jun 2016 | Published: 10 Jun 2016

Hewlett Packard Enterprise

Companies Cautiously Optimistic about Cybersecurity
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This white paper examines the realistic possibilities of your business experiencing an attack and what you can do to prepare your network.
Posted: 10 Jun 2016 | Published: 27 Jan 2016

Hewlett Packard Enterprise

Cyber Risk Report 2016 Executive Summary
sponsored by Hewlett Packard Enterprise
WHITE PAPER: In this year's cyber risk report, you will discover the evolving nature of cybercrime, as well as the developing legislation meant to curtail it. Read on to delve into what defenders now face as they look to secure their enterprises.
Posted: 10 Jun 2016 | Published: 19 Feb 2016

Hewlett Packard Enterprise

Preventing Fraud Before Customers Become Affected
sponsored by IBM
WHITE PAPER: Learn how Pulaski Bank achieved the layered security and malware prevention they were looking for and how their struggles can benefit your organization. Not only will you prevent potential fraud, but also increase customer awareness.
Posted: 09 Jun 2016 | Published: 01 May 2016

IBM

The pitfalls of two-factor authentication
sponsored by IBM
WHITE PAPER: Discover the shortcomings of two-factor authentication, including its inability to defend against theft and transaction signings. Learn how a better layered security approach can help identify the root cause of malware and help protect high-value transactions.
Posted: 08 Jun 2016 | Published: 01 May 2016

IBM

Is Microsoft Office 365 Secure?
sponsored by Proofpoint, Inc.
WHITE PAPER: More than four in ten organizations are in the process of implementing Office 365 or already use it. This infographic gives you important statistics and insights on the top security, encryption and archiving challenges faced while moving to Office 365, based on a survey conducted by UBM Tech.
Posted: 08 Jun 2016 | Published: 01 May 2016

Proofpoint, Inc.

FINRA Regulat ions Requi re TechnologyInnovat ion to Address Supervision andMoni tor ing Workload
sponsored by Proofpoint, Inc.
WHITE PAPER: Business leaders need to find a healthy balance between flexible business solutions and data monitoring abilities. Learn how to protect and govern your sensitive information to help mitigate risk and, in the process, better comply with regulatory requirements.
Posted: 08 Jun 2016 | Published: 01 May 2016

Proofpoint, Inc.

Cybersecurity for Banking and Financial Institutions
sponsored by Delta Risk
WHITE PAPER: Follow this primer for IT professionals who are looking to protect their organization and secure their networks from attack while remaining in compliance with evolving regulations. In addition to discussing the nature of the modern cyberthreat, it also discusses the numerous extra burdens specifically for banking and financial firms.
Posted: 08 Jun 2016 | Published: 08 Jun 2016

Delta Risk

Reporting Cybersecurity to the Board
sponsored by BitSight
WHITE PAPER: Today, boards have to consider the regulatory, fiduciary, organizational, and personal liability that could come from a data breach. Download this free guide today, and you'll have everything you need for your next board presentation to hit all the right points.
Posted: 07 Jun 2016 | Published: 01 May 2016

BitSight

Revealing Security Performance Metrics Across Major World Economies
sponsored by BitSight
WHITE PAPER: In its latest research report, BitSight studied the security performance of companies per country with more than 50% of their IP space in: The United States, United Kingdom, Germany, Brazil, China and Singapore.
Posted: 07 Jun 2016 | Published: 01 May 2016

BitSight

Mobile Malware
sponsored by MobileIron
WHITE PAPER: Four major threats are currently targeting iOS and Android devices using very clever tactics. Learn how these new malware tools are infecting mobile devices today and how you can secure your data against these and other growing threats.
Posted: 07 Jun 2016 | Published: 01 May 2016

MobileIron
26 - 50 of 1059 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement