Vertical Industries  >  

Security Industry

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Security Equipment Industry, Security Products Industry
DEFINITION: Companies that design, manufacture, and provide security products or services.
Security Industry White Papers (View All Report Types)
26 - 50 of 113 Matches Previous Page  |  Next Page
Gartner: Magic Quadrant for Mobile Data Protection
sponsored by Digital Guardian
WHITE PAPER: Continue reading this white paper to discover treat data encryption protection as a standard for all workstations.
Posted: 01 Feb 2016 | Published: 19 Oct 2015

Digital Guardian

Gartner Competitive Landscape: Data Loss Prevention Market
sponsored by Digital Guardian
WHITE PAPER: In this white paper, you will learn the main drivers of DLP adoption and the future of the DLP industry as a whole.
Posted: 29 Jan 2016 | Published: 22 Oct 2015

Digital Guardian

A New Guide to Critical Capabilities for Mobile Data Protection Solutions
sponsored by Digital Guardian
WHITE PAPER: In this white paper you will discover solutions for MDP to defend access to storage systems found in laptops, removable media and cloud environments. You will learn how to enforce secure policies across multiple platforms at minimal costs.
Posted: 28 Jan 2016 | Published: 08 Sep 2014

Digital Guardian

Factoring the Human Element into Your Data Breach Response
sponsored by AllClear ID
WHITE PAPER: Human nature can derail even the most well-documented and rehearsed breach response plans. Access this white paper to understand the factors that affect your team during a crisis, and the tactics you can incorporate into your plan to ensure a successful breach response operation.
Posted: 25 Jan 2016 | Published: 09 Dec 2015

AllClear ID

Secure the data that powers your business
sponsored by IBM
WHITE PAPER: Find out how you can adopt a proactive, holistic approach to protecting sensitive data across all platforms. Access now and learn how you can protect sensitive data against internal and external threats with encryption, masking and redaction.
Posted: 25 Jan 2016 | Published: 12 Aug 2015

IBM

The Trust Cost of a Data Breach & How to Prepare
sponsored by AllClear ID
WHITE PAPER: This report summarizes findings for a sampling of 160 data breach insurance claims, 155 of which involved the exposure of sensitive personal data in a variety of business sectors. The objective for this study is to you understand the true impact of data insecurity.
Posted: 20 Jan 2016 | Published: 16 Dec 2015

AllClear ID

Mobile Security Threats: Get Ready for 2016
sponsored by CloudMine
WHITE PAPER: This valuable resource will help your organization to bolster your mobile security defenses as you race to adopt new technologies to stay ever-more innovative and agile. View now to discover 6 top mobile security threats, as well as 8 best practices for securing your enterprise mobile apps.
Posted: 16 Oct 2015 | Published: 16 Oct 2015


5 Myths Holding Your Security Program Back
sponsored by Digital Guardian
WHITE PAPER: This white paper explores the five common security myths that actually hinder data protection efforts.  View now to learn more.
Posted: 10 Apr 2015 | Published: 25 Feb 2015

Digital Guardian

Surfacing Critical Cyber Threats Through Security Intelligence
sponsored by LogRhythm, Inc.
WHITE PAPER: In this world of escalating cybersecurity threats, organizations must be constantly vigilant. Find out what cyber threats are emerging as key players and what you can do to stop them.
Posted: 06 Feb 2015 | Published: 06 Feb 2015

LogRhythm, Inc.

Recognizing Five Sources of High-Profile Data Security Breaches
sponsored by Mimecast
WHITE PAPER: This white paper discusses the 5 major categories of vulnerabilities that IT and security professionals need to account for in their solutions planning.
Posted: 06 Feb 2015 | Published: 06 Feb 2015

Mimecast

Taking Control of File Sharing Services
sponsored by Mimecast
WHITE PAPER: This informative white paper discusses how file sharing services are being used within enterprises; the benefits and risks that they bring; and the factors that organizations should consider in selecting an enterprise-grade service in order to ensure its security.
Posted: 19 Dec 2014 | Published: 30 Apr 2014

Mimecast

Delivering More Efficiency and Productivity With Modernized Data Protection
sponsored by HPE and Veeam
WHITE PAPER: This white paper teaches you about new, hyper-converged solutions, based on virtualization software that can transform your data center. Gain a more cost efficient solution with a smaller management footprint.
Posted: 27 Jan 2016 | Published: 30 Sep 2014

HPE and Veeam

Enterprise Mobility Management Security: How to Score Vendor Fulfillment
sponsored by VMware
WHITE PAPER: This white paper offers the specifics of network connection and BYOD policies, coverage of enterprise-issued mobile devices, and managed security as fulfilled by these vendors.
Posted: 17 Sep 2015 | Published: 17 Sep 2015

VMware

Cost of Data Breach Study: Global Analysis
sponsored by IBM
WHITE PAPER: This white paper presents IBM and Ponemon Institute's 2015 Cost of Data Breach Study, and explains the 3 major reasons contributing to a higher cost of data breach in 2015. Read on here to access the key findings from the report.
Posted: 04 Sep 2015 | Published: 04 Sep 2015

IBM

Protect Your Web Applications from the OWASP Top 10
sponsored by IBM
WHITE PAPER: Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
Posted: 22 Jun 2015 | Published: 31 Aug 2012

IBM

Top Security Concerns and Trends Takeaways
sponsored by Dropbox for Business
WHITE PAPER: These slides outline the state of information security and what you need to know to stay protected.  Read on to uncover insider tips for mitigating risks in the several computing environments.
Posted: 30 Mar 2015 | Published: 29 Aug 2013

Dropbox for Business

Cisco 2015 Annual Security Report
sponsored by Cisco Systems, Inc.
WHITE PAPER: Access this white paper to read the Cisco 2015 annual report and discover research, insights, and techniques straight from security experts that can protect your business.
Posted: 09 Feb 2015 | Published: 09 Feb 2015

Cisco Systems, Inc.

Profiling an Enigma: The Mystery of North Korea’s Cyber Threat Landscape
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This highly interesting resource delves into North Korea's cyber threat landscape, deeply analyzing what is known about the regime's capabilities and motives, which are largely shrouded in secrecy.
Posted: 05 Feb 2015 | Published: 29 Aug 2014

Hewlett Packard Enterprise

Why Every CIO Should Consider Vulnerability Assessment a Necessity
sponsored by IBM
WHITE PAPER: In this resource, CIOs will learn why vulnerability assessment is so essential to enterprise security, and can discover a leading vulnerability assessment platform that scans targeted systems on a scheduled basis in order to increase your understanding of your organization's overall security posture.
Posted: 03 Feb 2015 | Published: 30 Apr 2014

IBM

SSL for Apps: Best Practices for Developers
sponsored by Symantec Website Security Solutions
WHITE PAPER: This white paper lists the necessary steps that your enterprise needs to take in order to create a stronger, more trustworthy SSL implementation.
Posted: 20 Jan 2015 | Published: 31 Oct 2013

Symantec Website Security Solutions

How Extended Validation SSL Brings Confidence to Online Sales and Transactions
sponsored by Symantec Website Security Solutions
WHITE PAPER: This white paper discusses the importance of increasing customer confidence in the security of online business transactions, and introduces Symantec Extended Validation SSL Certificates as a potential solution to this challenge.
Posted: 15 Jan 2015 | Published: 31 Oct 2013

Symantec Website Security Solutions

Internet Trust Marks: Building Confidence and Profit Online
sponsored by Symantec Website Security Solutions
WHITE PAPER: This paper examines how recent trends in Internet trust marks can help restore confidence in online shopping, and as concluded by at least one recent study, even induce those who do shop to spend more.
Posted: 14 Jan 2015 | Published: 31 Oct 2013

Symantec Website Security Solutions

Choosing the Right Security Solution: Moving Beyond SSL to Establish Trust
sponsored by Symantec Website Security Solutions
WHITE PAPER: In this white paper, you'll learn why SSL-based security platforms with solid track records of meeting new challenges are the best way to defend and future-proof e-commerce environments against a growing and dynamic internet threat environment.
Posted: 12 Jan 2015 | Published: 13 Feb 2014

Symantec Website Security Solutions

Beginner's Guide to SSL Certificates: Making the Best Choice When Considering Your Online Security Options
sponsored by Symantec Website Security Solutions
WHITE PAPER: This helpful guide explains how the effective implementation of SSL certificates is critical to protecting your customers, earning their trust, and ensuring your success when it comes to conducting business online.
Posted: 08 Jan 2015 | Published: 10 Jun 2013

Symantec Website Security Solutions

How Organizations Are Responding to Mobile and Cloud Threats
sponsored by SafeNet, Inc.
WHITE PAPER: This white paper explores the results of a recent survey that sought to elucidate how organizations are adapting their approach to authentication to protect their sensitive assets as they adopt cloud-based services and BYOD.
Posted: 10 Dec 2014 | Published: 15 May 2014

SafeNet, Inc.
26 - 50 of 113 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement