Business of Information Technology  >   Business Management  >   Best Practices  >  

Security Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Security Best Practices White Papers (View All Report Types)
26 - 50 of 672 Matches Previous Page  |  Next Page
ARUP BUILDS A MOBILE FIRST FUTURE WITH MOBILEIRON
sponsored by MobileIron
WHITE PAPER: Access this whitepaper and find out how one company successfully created and secured mobile applications for their organization.
Posted: 11 Mar 2015 | Published: 11 Mar 2015

MobileIron

St. Joseph Health Mobilizes Patient Care with MobileIron Solutions
sponsored by MobileIron
WHITE PAPER: This whitepaper provides valuable information on mobile device management and security.
Posted: 11 Mar 2015 | Published: 11 Mar 2015

MobileIron

Special Feature: Bank Card Courier Scams
sponsored by ESET
WHITE PAPER: This white paper describes the dangers of fraudulent phone calls and what to look out for when receiving one.
Posted: 11 Mar 2015 | Published: 31 Dec 2014

ESET

Security Report: Cybercrime Trends for 2015
sponsored by ESET
WHITE PAPER: This security report can help the security professional know what the greatest threats are in 2015 and how to combat them.
Posted: 10 Mar 2015 | Published: 10 Mar 2015

ESET

Cyber Security Roadmap
sponsored by ESET
WHITE PAPER: This white paper presents a clear, easy-to-follow roadmap to creating comprehensive security on a modest budget.
Posted: 06 Mar 2015 | Published: 06 Mar 2015

ESET

Cyber Risk Report 2015 - Executive Summary
sponsored by Hewlett-Packard Company
WHITE PAPER: The HP Cyber Risk Report 2015 provides a broad overview of the threat landscape and how hackers operate.
Posted: 05 Mar 2015 | Published: 28 Feb 2015

Hewlett-Packard Company

2015 Cyber Risk Report
sponsored by Hewlett-Packard Company
WHITE PAPER: This 2015 cyber risk report provides a broad view of the 2014 threat landscape and gives you the information you need to protect your business.
Posted: 05 Mar 2015 | Published: 05 Mar 2015

Hewlett-Packard Company

Holistic Fraud Prevention: Transforming the Customer's Experience
sponsored by IBM
WHITE PAPER: Use this white paper to implement creative, efficient and comprehensive fraud prevention.
Posted: 04 Mar 2015 | Published: 04 Mar 2015

IBM

Top 5 Aspects of Security to Look for in a Cloud Provider
sponsored by Oracle Corporation
WHITE PAPER: Get the 5 security areas you needs to be concerned with when selecting the cloud system that's right for your business.
Posted: 03 Mar 2015 | Published: 31 Dec 2013

Oracle Corporation

DDoS Response Playbook
sponsored by Imperva
WHITE PAPER: This white paper will help you create a response plan for one of the most widespread threats – DDoS attacks.
Posted: 02 Mar 2015 | Published: 02 Mar 2015

Imperva

Threat Trend: Threat Landscape Review
sponsored by Palo Alto Networks
WHITE PAPER: This exlusive security report identifies threats from malware over a wide array of applications by executing them in a virtual environment and observing their behavior. Read on to learn what was discovered, and what the new cybercrime trends are moving forward.
Posted: 26 Feb 2015 | Published: 26 Feb 2015

Palo Alto Networks

Global Threat Intelligence Report
sponsored by Dimension Data
WHITE PAPER: This in-depth white paper can help you discover the latest security threats and how to stop them.
Posted: 26 Feb 2015 | Published: 31 Dec 2014

Dimension Data

10 Ways Everyone Should Approach Cybersecurity in 2015
sponsored by Global Knowledge
WHITE PAPER: This paper reviews key security issues and focuses attention on 10 responses that we all need to adopt in our approach to security in 2015.
Posted: 25 Feb 2015 | Published: 25 Feb 2015

Global Knowledge

Striking the Right Balance Between App Security and Usability
sponsored by CA Technologies.
WHITE PAPER: Access this informative white paper to discover how to balance mobile security with usability.
Posted: 23 Feb 2015 | Published: 23 Feb 2015

CA Technologies.

The Danger from DDoS Increases
sponsored by Neustar®
WHITE PAPER: This survey report tells you everything you need to know about how DDoS attacks have changed and why you should be concerned.
Posted: 19 Feb 2015 | Published: 31 Dec 2014

Neustar®

Don't Let Your DDoS Defense Fall Behind
sponsored by Neustar®
WHITE PAPER: This white paper gives you information on how DDoS attacks have evolved and what you can do to stop them.
Posted: 19 Feb 2015 | Published: 19 Feb 2015

Neustar®

Cisco 2015 Annual Security Report
sponsored by Cisco Systems, Inc.
WHITE PAPER: This report reveals up-to-date data on many of the most important security concerns facing organizations in 2015.
Posted: 16 Feb 2015 | Published: 01 Jan 2015

Cisco Systems, Inc.

Four Tools for Capturing DDoS Attacks
sponsored by Neustar®
WHITE PAPER: This exclusive white paper describes four of the best tools you can use to detect DDoS attacks quickly.
Posted: 16 Feb 2015 | Published: 31 Dec 2014

Neustar®

North Korea and the Attack on Sony Pictures Entertainment
sponsored by Hewlett-Packard Company
WHITE PAPER: While the FBI has named North Korea as a culprit in the significant breach on Sony Pictures Entertainment in 2014, it's still possible that the regime didn't act alone. This resource discusses the critical threat intelligence issues that the breach highlights; analyzes North Korea's purported involvement and motivation; and much more.
Posted: 13 Feb 2015 | Published: 19 Dec 2014

Hewlett-Packard Company

4 Data Traffic Security Challenges Exposing Enterprises to Hack Attacks
sponsored by Certes Networks
WHITE PAPER: This white paper discusses the 4 major points of weakness that your enterprise needs to prioritize in 2015 in order to defend your business-critical data from hackers.
Posted: 12 Feb 2015 | Published: 22 Jan 2015

Certes Networks

The Current State of Security Operations Around the World
sponsored by Hewlett-Packard Company
WHITE PAPER: This report summarizes the results of a recent HP assessment of the capabilities of 87 security operations centers worldwide. Read on to learn the latest trends in security defenses and operations, the attributes of the most effective organizations, and much more.
Posted: 12 Feb 2015 | Published: 30 Jan 2015

Hewlett-Packard Company

The Executive Breach Blanket: 7 Steps to Safeguard Your Corporate Data
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper contains an effective 7-step process for ensuring that your business is ready to respond to data breaches.
Posted: 10 Feb 2015 | Published: 10 Feb 2015

Hewlett-Packard Company

Human Vulnerabilities in Our Current Threat Landscape
sponsored by Global Knowledge
WHITE PAPER: This white paper enables you to educate your employees on security best practices and current human vulnerabilities, helping you to ensure that you're not a part of the many organizations that are breached.
Posted: 10 Feb 2015 | Published: 31 Jan 2015

Global Knowledge

Securing the Enterprise in 2015: 5 pragmatic steps to security
sponsored by Dell SecureWorks
WHITE PAPER: This white paper outlines a 5-step plan for developing strong security no matter what security product is used.
Posted: 10 Feb 2015 | Published: 31 Jan 2015

Dell SecureWorks

How to Protect Sensitive Retail Data
sponsored by IBM
WHITE PAPER: This white paper goes into detail about the threats facing retail enterprises and how to mitigate them.
Posted: 09 Feb 2015 | Published: 30 Nov 2014

IBM
26 - 50 of 672 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement