Business of Information Technology  >   Business Management  >   Best Practices  >  

Security Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Security Best Practices White Papers (View All Report Types)
51 - 75 of 885 Matches Previous Page  |  Next Page
How Healthcare Organizations Both Enable Mobile Users and Stay Compliant
sponsored by BlackBerry
WHITE PAPER: Discover how to stay HIPAA compliant even when mobile devices come into play. Read on to uncover insight for securing your enterprise and BYOD to protect sensitive data, and learn about containerization, application-wrapping, and more.
Posted: 21 Apr 2016 | Published: 21 Apr 2016

BlackBerry

Next-Generation IPS in the Era of Targeted Attacks
sponsored by IBM
WHITE PAPER: This white paper talks about the future of IPS and gives you statistics from the current IPS market. Access now to learn about the features, capabilitie, costs and impacts of next-generation IPS and the future of cyberattacks in general.
Posted: 21 Apr 2016 | Published: 01 Jan 2016

IBM

Underground Hacker Markets Annual Report: 2016
sponsored by Dell SecureWorks
WHITE PAPER: Find out which underground services are on the rise and what's most valuable in today's current cybercrime economy. Access this resource now to get inside black market information without breaking the law.
Posted: 20 Apr 2016 | Published: 01 Apr 2016

Dell SecureWorks

Navigating the Challenges with Wireless Security
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This white paper explores the four drivers of Wi-Fi usage that are behind the explosion of wireless connectivity and the security implications that mustn't be forgotten.
Posted: 19 Apr 2016 | Published: 01 Jan 2016

WatchGuard Technologies, Inc.

eSentire Partner Program
sponsored by eSentire
WHITE PAPER: This white paper gives you a brief overview of the eSentire partner program and how becoming a partner will allow you to reach new customers, increase revenues, expand your portfolio and grow market share. Access now and learn about their program benefits, requirements and if it is the right fit for you.
Posted: 19 Apr 2016 | Published: 01 Mar 2016

eSentire

Raiders of the Lost File Shares: Defending Enterprise Data Against Destructive Malware
sponsored by BlackBerry
WHITE PAPER: This white paper takes a deeper look at recent attacks on the government, Aramaco, Sony and others and breaks down what type of malware it was and how it works, measures you can take to mitigate the risk of an attack and considerations for protecting your data on file shares, endpoints and collaborative systems.
Posted: 19 Apr 2016 | Published: 01 Mar 2016

BlackBerry

Cybersecurity for the Digital Age: The Essential Guide
sponsored by Dimension Data
WHITE PAPER: In this resource, discover what the future of cybersecurity has in store, as well as how it's catalyzing significant transformation in today's digital enterprises. Read on to learn why organizations are shifting their cybersecurity strategies from reactive to agile, and more.
Posted: 19 Apr 2016 | Published: 12 Apr 2016

Dimension Data

Deploying an EFSS Solution: Six Steps for Success
sponsored by BlackBerry
WHITE PAPER: This white paper outlines the shortest path to implementing Enterprise File Synchronization and Sharing (EFSS) while protecting your organization against loss incidents. You'll learn that the process, not the technology, drives successful EFSS implementation and six steps to deploy EFSS with optimal security controls.
Posted: 19 Apr 2016 | Published: 01 Mar 2016

BlackBerry

Cyber Security Breakdown: What Legal Professionals Need to Know
sponsored by eSentire
WHITE PAPER: Be proactive against advanced cyber threats before they hit your organization. Access this resource now to learn how you can take the steps necessary to be fully protected.
Posted: 18 Apr 2016 | Published: 01 Feb 2016

eSentire

Meeting PCI DSS v3.1 Merchant Requirements with Watchguard UTM and Wireless Solutions
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This white paper clearly outlines how firewall deployment impacts PCI DSS standards for a PCI DSS merchant. Access now for tables that include descriptions of PCI DSS standards and how you can achieve these requirements.
Posted: 18 Apr 2016 | Published: 01 Mar 2016

WatchGuard Technologies, Inc.

Nine steps of a digital transformation journey
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: This white paper shows you nine steps that can guide evolution within your organization. Design your transformative business model and use the latest technology to create modern architectures all while securing your enterprise.
Posted: 18 Apr 2016 | Published: 01 Mar 2016

Hewlett-Packard Enterprise

Securing Mobility Management in the Cloud
sponsored by BlackBerry
WHITE PAPER: Discover how to securely manage mobile devices and other endpoints across different operating systems ownership models. Learn how to manage your mobile workers' access to apps, data and content, all from a single, easy-to-use console.
Posted: 18 Apr 2016 | Published: 01 Mar 2016

BlackBerry

Federated Access Management: The New Era of Secure Access
sponsored by Ping Identity Corporation
WHITE PAPER: This white paper teaches you about the evolution of access management and what's driving modern access security requirements. Continue reading to learn about Federated Access Management and discover painless migration strategies to adopt this new breed of access management.
Posted: 18 Apr 2016 | Published: 01 Mar 2016

Ping Identity Corporation

How Secure Are Your Mobile Apps?
sponsored by Kony
WHITE PAPER: This e-book reveals the top 10 mobile security vulnerabilities and how to address them in the development process. Learn how to overcome weak server side controls, poor authentication and authorization, and much more.
Posted: 15 Apr 2016 | Published: 15 Apr 2016

Kony

Maintaining Strong Security and PCI DSS Compliance in a Distributed Retail Environment
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This white paper provides business planners with informative details on how to maintain strong security and PCI DSS compliance in a distributed retail environment. Access now for tools on how to keep applications, data and networks safe and PCI DSS compliant.
Posted: 15 Apr 2016 | Published: 01 Jan 2014

WatchGuard Technologies, Inc.

Ditching Legacy Tokens
sponsored by BlackBerry
WHITE PAPER: While legacy tokens still hold 70% of the user authentication market, Gartner predicts a shift towards the phone as a token. Access this white paper to learn where legacy tokens are falling short and how emerging technologies go further by retaining all the security of legacy solutions while reducing costs and simplifying the end-user experience.
Posted: 14 Apr 2016 | Published: 31 Mar 2016

BlackBerry

Illuminate Shadow IT and Securely Manage BYOX
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This white paper discusses BYOX and explores strategies and solutions for embracing the business productivity aspects of a BYOX workforce culture. Access now to learn how you can promote a faster, flexible and mobile workforce while protecting your organization from security pitfalls.
Posted: 14 Apr 2016 | Published: 01 Apr 2013

WatchGuard Technologies, Inc.

We’ve Been Breached- Now What?
sponsored by eSentire
WHITE PAPER: This white paper teaches you how to respond after a cyber threat becomes a cyber attack. Access now to learn how to eradicate cyber threats, repair infected systems and restore operations to normal after an attack occurs.
Posted: 14 Apr 2016 | Published: 31 Dec 2015

eSentire

MIMIX Availability: The easy way to protect the availability of even the most complex IBM i environments
sponsored by Vision Solutions
WHITE PAPER: In this white paper, you will learn about a simple, yet robust protection platform that efficiently backs up business applications in the event of a production server failure. Access now for 24/7 availability and storage of all your organization's application data.
Posted: 13 Apr 2016 | Published: 31 Jan 2016

Vision Solutions

Cyber Liability: Risks, Ramifications, and Mitigation
sponsored by eSentire
WHITE PAPER: Find out how you can better defend your organization against external attack and limit exposure by reducing your attack profile available to attackers by accessing this resource.
Posted: 13 Apr 2016 | Published: 31 Dec 2015

eSentire

How Cloud Services Giant Exostar Protected Sensitive Data and Applications
sponsored by VMware, Inc.
WHITE PAPER: In this white paper, you'll learn how micro-segmentation helps you move beyond perimeter security to contain and halt threats inside your data center in order to keep your data safe. Access now to learn whether a software-defined data center architecture is right for your business.
Posted: 12 Apr 2016 | Published: 12 Apr 2016

VMware, Inc.

Advanced Zero Day Protection with APT Blocker
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This white paper shows you four key characteristics your detection software must have to adequately secure your organization. Access now to go beyond simple signatuer-based antivirus detection and gain a cloud-based sandbox with full system emulation to detect the most advanced threats.
Posted: 12 Apr 2016 | Published: 01 Feb 2016

WatchGuard Technologies, Inc.

Addressing PCI Compliance Through Privileged Access Management
sponsored by CA Technologies
WHITE PAPER: Read this white paper to learn how to leverage several privileged access management strategies to meet the latest requirements of Payment Card Industry Data Security Standard version 3. Access now to discover how to interrupt the kill chain and eliminate hard-coded passwords.
Posted: 11 Apr 2016 | Published: 31 Dec 2015

CA Technologies

Maturing a Threat Intelligence Program
sponsored by ThreatConnect
WHITE PAPER: This white paper shows you the latest threat intelligence trends and how your organization can better your cyber security practices. Access now to review a systematic guide to help you understand where your organization resides on the path to mature threat intelligence.
Posted: 08 Apr 2016 | Published: 01 Mar 2016

ThreatConnect

Complete Analysis of the Top SIEM Vendors
sponsored by AlienVault
WHITE PAPER: The Magic Quadrant summarizes Gartner's yearly analysis of the SIEM market and compares the positions of leading competitors like AlienVault. Get Gartner's complete analysis of each SIEM vendor, and learn what makes AlienVault a Visionary. View the latest report.
Posted: 07 Apr 2016 | Published: 20 Jul 2015

AlienVault
51 - 75 of 885 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement