Vertical Industries  >  

Security Equipment Industry

RSS Feed    Add to Google    Add to My Yahoo!
Security Equipment Industry White Papers (View All Report Types)
 
Increase Mobile Productivity and Scale without Sacrificing Security
sponsored by BlackBerry
WHITE PAPER: Discover how to consolidate mobile device management, apps, corporate data and other endpoints across different operating systems and ownership models to a single pane of glass for a stronger security posture.
Posted: 01 May 2017 | Published: 01 May 2017

BlackBerry

DevSecOps: How to Seamlessly Integrate Security Into DevOps
sponsored by Sonatype
WHITE PAPER: In this Gartner report discover strong recommendations for IT security professionals to preserve the teamwork, agility and speed of DevOps and agile development environments, all while ensuring security.
Posted: 25 Apr 2017 | Published: 30 Sep 2016

Sonatype

Safeguarding Healthcare Information and Leveraging Email Encryption in Your HIPAA Compliance Program
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Learn how to choose the right email encryption tool for your healthcare organization by keeping these 6 key differentiators in mind as you evaluate potential solutions.
Posted: 20 Apr 2017 | Published: 20 Apr 2017

Hewlett Packard Enterprise

10 Things You Need to Know About Ransomware
sponsored by Cylance
WHITE PAPER: As threatening as ransomware sounds, damage can be avoided with increased user awareness coupled with the right security practices. In this resource uncover the 10 facts your organization should know about ransomware.
Posted: 03 May 2017 | Published: 03 May 2017

Cylance

Data Breach: Security Investigation, Detection and Rapid Response
sponsored by Splunk
WHITE PAPER: Discover the specific items to investigate when there is a security incident alert, what your analysts need to determine during a breach to mitigate further damage, the 6 most common steps in determining the impact of the breach, and the most appropriate course of action.
Posted: 01 May 2017 | Published: 01 May 2017

Splunk

Your Endpoint Essentials Checklist
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Discover a comprehensive checklist to ensure that your endpoints have essential features to protect your enterprise from ransomware and other malicious activities.
Posted: 16 May 2017 | Published: 16 May 2017

Symantec & Blue Coat Systems

Cloud DDoS Protection Service – Protecting AWS-Hosted Applications
sponsored by Radware
WHITE PAPER: Discover how to deploy real-time cloud app threat mitigation with high accuracy, an attack lifecycle management timeline, and more.
Posted: 16 May 2017 | Published: 16 May 2017

Radware

Advancing Industrial Internet Security: Convergence of IT With OT
sponsored by Bayshore Networks
WHITE PAPER: Discover the state of IoT security in industrial and operational technology environments and how OT security needs differ from those in IT environments.
Posted: 25 May 2017 | Published: 25 May 2017

Bayshore Networks

Become GDPR-Ready and Data- Driven with an Expanded Information Management Portfolio
sponsored by Veritas
WHITE PAPER: Discover the growing importance of changing data protection regulations — in particular, the GDPR and how it takes information management out of the IT room and into the boardroom.
Posted: 17 Apr 2017 | Published: 17 Apr 2017

Veritas

Expert Insight: AI, Machine Learning, and Non-Malware Attacks
sponsored by Carbon Black
WHITE PAPER: See the results of over 400 experts weighing in on artificial intelligence, machine learning, and non-malware attacks.
Posted: 09 May 2017 | Published: 09 May 2017

Carbon Black
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement