IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Information Management

RSS Feed    Add to Google    Add to My Yahoo!
Security Information Management White Papers (View All Report Types)
 
Building a Business Case for Cyber Threat Intelligence
sponsored by SurfWatch Labs
WHITE PAPER: This white paper gives you 5 main reasons for a risk-based approach to cybersecurity. Access now to learn how you can know the specific cyber threats targeting your business redirect your cyber tactics for the most effective defense and bring cybersecurity into the broader risk discussion.
Posted: 25 Mar 2016 | Published: 01 Feb 2016

SurfWatch Labs

Definitive eGuide: Mobility and IoT cuasing IT headaches? Connect and protect with Adaptive Trust
sponsored by Aruba Networks
WHITE PAPER: This white paper outlines the pre-planning and deployment steps needed to help guide you on your journey of enterprise BYOD and IoT. Learn how greater visibility and the integration of your policy decision engine with third-party security solutions can enhance your ability to offer end-to-end mobile protection.
Posted: 22 Mar 2016 | Published: 01 Feb 2016

Aruba Networks

Cyber Security Breakdown: What Legal Professionals Need to Know
sponsored by eSentire
WHITE PAPER: Be proactive against advanced cyber threats before they hit your organization. Access this resource now to learn how you can take the steps necessary to be fully protected.
Posted: 18 Apr 2016 | Published: 01 Feb 2016

eSentire

Six Steps To A Better Security Strategy
sponsored by AllClear ID
WHITE PAPER: In this white paper, you'll learn six steps to create an effective security strategy that's linked with key business interests for great success.
Posted: 29 Apr 2016 | Published: 22 Jan 2016

AllClear ID

The Impostor in the Machine: Understanding the Motives and Mayhem Behind Impostor Emails
sponsored by Proofpoint, Inc.
WHITE PAPER: In this white paper, learn how hackers evade current email filtering security strategies to dupe high-level employees and steal data. Read on to learn how next-gen email security strategies enable you to quarantine imposter emails before they reach the inbox and discover several proven defense strategies.
Posted: 28 Apr 2016 | Published: 28 Apr 2016

Proofpoint, Inc.

Arming the front line
sponsored by IBM
WHITE PAPER: This white paper teaches you why antivirus software and firewalls on consumer endpoints aren't sufficient to combat today's sophisticated hacking tools. Access now to learn common misconceptions about endpoint protection and what unexpected benefits you can realize by extending protection to customer endpoints.
Posted: 26 Apr 2016 | Published: 01 Oct 2015

IBM

Cyber Risk Report - Year in Review
sponsored by SurfWatch Labs
WHITE PAPER: This white paper provides high-level insight on both what cybercriminals are targeting and how they operated over the course of 2015. Learn about the evolving tactics used and how they are impacting business.
Posted: 29 Mar 2016 | Published: 01 Feb 2016

SurfWatch Labs

Virtualization Best Practices Guide
sponsored by Kaspersky Lab
WHITE PAPER: This white paper shows you how to best protect your virtual desktops through a wide range of Windows-based environments. Choose the security approach that's best for your business' specific virtual needs.
Posted: 02 May 2016 | Published: 31 Dec 2015

Kaspersky Lab

Deploying an EFSS Solution: Six Steps for Success
sponsored by BlackBerry
WHITE PAPER: This white paper outlines the shortest path to implementing Enterprise File Synchronization and Sharing (EFSS) while protecting your organization against loss incidents. You'll learn that the process, not the technology, drives successful EFSS implementation and six steps to deploy EFSS with optimal security controls.
Posted: 19 Apr 2016 | Published: 01 Mar 2016

BlackBerry

FortinetCSO_QP
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper analyzes today's advanced threats and today's cybersecurity environment to show you what organizations are doing right and what they are doing wrong. Access now to learn how to effectively counter threats by preventing, detecting and mitigating malware and other malicious actors.
Posted: 29 Apr 2016 | Published: 01 Mar 2016

Fortinet, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement