Business of Information Technology  >   Business Management  >   Best Practices  >  

Security Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Security Best Practices White Papers (View All Report Types)
26 - 50 of 1047 Matches Previous Page  |  Next Page
Why You Need an Automated Approach to Cloud Security and Compliance
sponsored by evident.io
WHITE PAPER: Learn how to embrace a continuous security model, making your organization able to automate many processes that would normally overwhelm your teams and systems if they had to be done manually.
Posted: 22 May 2017 | Published: 22 May 2017

evident.io

Detecting "WannaCry" Ransomware
sponsored by AlienVault
WHITE PAPER: Discover how the recent "WannaCry" ransomware attacks function, what to update to avoid it, how to scan your environment for the vulnerability it exploited, and more.
Posted: 22 May 2017 | Published: 22 May 2017

AlienVault

Out of Order! The Risks of Being Out of Compliance
sponsored by Globalscape
WHITE PAPER: Discover common regulations and how compliance risks evolved across the enterprise, the top 6 consequences of failing to comply with industry or government regulations, and the role of data management in helping facilitate or maintain compliance.
Posted: 22 May 2017 | Published: 22 May 2017

Globalscape

The 6 Essential Capabilities of an Analytics-Driven SIEM
sponsored by Splunk
WHITE PAPER: Collecting and analyzing security data is no longer enough, today's business needs to be able to use a security event management (SIEM) platform to derive actionable intelligence from this information. Read this white paper to learn the 6 capabilities every SIEM needs to succeed.
Posted: 19 May 2017 | Published: 19 May 2017

Splunk

When It Comes to Cloud Security, What You Don't Know Can Hurt You
sponsored by evident.io
WHITE PAPER: Access this resource now to learn how to secure your cloud services and get a big-picture view across all of your cloud environments, lower costs, and more.
Posted: 18 May 2017 | Published: 18 May 2017

evident.io

10 Questions You Should Ask Any MSSP
sponsored by InteliSecure
WHITE PAPER: Learn the 10 questions that you should be asking of any MSSP and ensure that your enterprise is setting itself up for future success.
Posted: 18 May 2017 | Published: 18 May 2017

InteliSecure

Choosing an Optimal Solution for DDoS Protection
sponsored by Radware
WHITE PAPER: Discover which cloud-based DDoS protection could work best for your organization, including on-premise, on-demand, always-on, and hybrid cloud options.
Posted: 17 May 2017 | Published: 17 May 2017

Radware

How to Deliver Comprehensive, End-to-End Mobile Security
sponsored by Citrix
WHITE PAPER: Learn how EMM could be your key to managing personal devices in a corporate setting at scale – without impacting user experience, and without inflating costs or introducing security risks.
Posted: 17 May 2017 | Published: 17 May 2017

Citrix

Ransomware: 4 Ways to Protect Data Now
sponsored by Citrix
WHITE PAPER: Discover recommendations towards a multilayered approach designed to reduce exposure to ransomware attacks, as well as to recover encrypted data more quickly and effectively. Access now for the 4 key steps to kidnap-proof your data.
Posted: 17 May 2017 | Published: 17 May 2017

Citrix

The Current State of Email Security
sponsored by Microsoft
WHITE PAPER: Explore email security threats' most common delivery methods and ID their risks to your organization. Also uncover effective remedies to both internal and external threats and how to implement them.
Posted: 17 May 2017 | Published: 17 May 2017

Microsoft

Cloud DDoS Protection Service – Protecting AWS-Hosted Applications
sponsored by Radware
WHITE PAPER: Discover how to deploy real-time cloud app threat mitigation with high accuracy, an attack lifecycle management timeline, and more.
Posted: 16 May 2017 | Published: 16 May 2017

Radware

Your Endpoint Essentials Checklist
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Discover a comprehensive checklist to ensure that your endpoints have essential features to protect your enterprise from ransomware and other malicious activities.
Posted: 16 May 2017 | Published: 16 May 2017

Symantec & Blue Coat Systems

Global Study on the Risk of Outdated Technologies
sponsored by Citrix
WHITE PAPER: Discover global trends in IT security risks and reasons why security practices and policies need to evolve to deal with threats from disruptive technologies, insider risk and compliance.
Posted: 15 May 2017 | Published: 28 Feb 2017

Citrix

Policy Management for IoT, Mobile, and Network Security
sponsored by Aruba Networks
WHITE PAPER: With mobility and IoT redefining today's security perimeter, this white paper explores how to expand the view of your network beyond the walls of your office. Find out what devices and how many are accessing your network with a centralized policy management platform.
Posted: 12 May 2017 | Published: 12 May 2017

Aruba Networks

How Technology helps with the reporting burden-KPMG
sponsored by Tagetik Software
WHITE PAPER: Discover how to maximize your CFO's greatest opportunities to contribute to or impact the value of the organization by leveraging EPM.
Posted: 11 May 2017 | Published: 11 May 2017

Tagetik Software

Understanding and Mitigating DDoS Attacks
sponsored by Dyn
WHITE PAPER: Discover a number of DNS DDoS attack concepts and mitigation strategies and learn the critical role DNS plays in the performance of your online business, common types of DDoS attacks, best practices to protect your DNS infrastructure against DDoS attacks, and more.
Posted: 11 May 2017 | Published: 11 May 2017

Dyn

Your Guide to Secure ESFF File Sharing
sponsored by BlackBerry
WHITE PAPER: Discover how EFSS can fulfill the needs of employees who want seamless mobile collaboration and to leverage tech to increase productivity, while also allowing IT to protect sensitive information and help the company embrace innovative new technology that can deliver on key business goals.
Posted: 11 May 2017 | Published: 11 May 2017

BlackBerry

The IoT Explosion's Impact on Enterprise Security
sponsored by Fortinet, Inc.
WHITE PAPER: Find out what's driving the IoT explosion and how you can prepare your network for the potential security risks that accompany
Posted: 10 May 2017 | Published: 09 Feb 2017

Fortinet, Inc.

Network Management and Operational Efficiency: How the Right NGFW Makes It Possible
sponsored by Forcepoint
WHITE PAPER: Learn about how you can find a next-gen firewall (NGFW) system that is built to fit the strength and scalability your business needs, with the simplicity and efficiency that you want in this white paper.
Posted: 10 May 2017 | Published: 10 May 2017

Forcepoint

See an Endpoint Security Vendor Put Through Their Paces
sponsored by Carbon Black
WHITE PAPER: In this report excerpt, discover how IDC research evaluated the capabilities of an endpoint security vendor and who the major players and leaders are in the endpoint security space.
Posted: 10 May 2017 | Published: 10 May 2017

Carbon Black

6 Tips to Get Your Appsec Program Bigger and Better Than Ever
sponsored by Veracode, Inc.
WHITE PAPER: Discover 6 tips that can help you create an ongoing, comprehensive application security program and mitigate the risk of using third part app components.
Posted: 10 May 2017 | Published: 10 May 2017

Veracode, Inc.

How Open Code Components Increasing Speed, But Also Risk
sponsored by Veracode, Inc.
WHITE PAPER: Learn how to handle the risk of open source components being used in the software that your organization uses, builds, and sells.
Posted: 10 May 2017 | Published: 10 May 2017

Veracode, Inc.

Fortinet Ransomware Guide
sponsored by Fortinet, Inc.
WHITE PAPER: This guide to ransomware details what you must know to keep your organization safe from a costly ransomware attack.
Posted: 09 May 2017 | Published: 09 Feb 2017

Fortinet, Inc.

Expert Insight: AI, Machine Learning, and Non-Malware Attacks
sponsored by Carbon Black
WHITE PAPER: See the results of over 400 experts weighing in on artificial intelligence, machine learning, and non-malware attacks.
Posted: 09 May 2017 | Published: 09 May 2017

Carbon Black

A Security Leaders Definitive Guide to the Threat Landscape
sponsored by Fortinet, Inc.
WHITE PAPER: This guide goes in-depth on five network trends that are causing security pros to panic, so you can begin to understand what your security infrastructure is up against and how to best prepare for it.
Posted: 09 May 2017 | Published: 30 Jan 2017

Fortinet, Inc.
26 - 50 of 1047 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement