Business of Information Technology  >   Business Management  >   Financial Management  >   Budgeting  >   IT Spending  >  

Security Infrastructure Spending

RSS Feed    Add to Google    Add to My Yahoo!
Security Infrastructure SpendingWhite Papers (View All Report Types)
 
Good Shepherd Medical Center
sponsored by INHS
WHITE PAPER: Review this case study on Good Shepherd Medical Center's experience implementing a cloud-enabled backup and archive solution that offered improved patient data visibility on- and off-site with continuous server image capture and disaster recovery features.
Posted: 10 Jan 2014 | Published: 27 Dec 2013

INHS

Why Passwords Aren't Strong Enough
sponsored by RSA, The Security Division of EMC
WHITE PAPER: In this white paper, uncover the urgent need for strong authentication, and how investing in one-time password technology will not only keep your assets protect, but also deliver high ROI in the long-run.
Posted: 18 Nov 2013 | Published: 31 Jan 2011

RSA, The Security Division of EMC

Cost-effective, Compliance-ready Open-source Identity Management
sponsored by OpenIAM
WHITE PAPER: Access this white paper to discover a scalable, cost-effective identity management solution that improves risk management, end-user efficiency, and facilitates regulatory compliance.
Posted: 23 Dec 2013 | Published: 23 Dec 2013

OpenIAM

Securing Web Applications and Databases for PCI Compliance
sponsored by Imperva
WHITE PAPER: This paper, designed for security and compliance professionals, illustrates how to achieve compliance on three of the most costly and complex sections: requirements 3, 6, and 10 of PCI DSS. This paper also highlights how Web application and database appliances can deliver resource effective compliance while maintaining cost efficiency.
Posted: 12 Nov 2009 | Published: 12 Jul 2009

Imperva

Hardware and Software Authentication: Choosing the Right Approach
sponsored by SafeNet Asia Ltd
WHITE PAPER: In this resource, uncover the top 5 considerations for choosing between hardware- or software-based authentication tools to ensure that assets remain protected even when remote users access corporate networks.
Posted: 09 Jan 2014 | Published: 09 Sep 2010

SafeNet Asia Ltd

The New Face of Intrusion Prevention
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Check Point IPS Software Blade gives breakthrough performance and protection at a breakthrough price. For more details, check out this paper, which highlights the numerous benefits of Check Point intrusion prevention protection solutions.
Posted: 29 Sep 2009 | Published: 12 Jun 2009

Check Point Software Technologies Ltd.

Fact or Fiction Security Survival Guide
sponsored by Lumension
WHITE PAPER: This guide serves as a good first step in preparing us from falling into the trap of security misconceptions and sets the record straight about each misconception that are most likely to encounter while talking to colleagues or vendors.
Posted: 02 Feb 2009 | Published: 02 Feb 2009

Lumension

10 Common Pitfalls to Avoid When Evaluating Security Information Management (SIM) Solutions
sponsored by netForensics
WHITE PAPER: This paper was created to help companies searching for a SIM solution narrow their options and determine which technology is the right one for their IT environment and security objectives.
Posted: 10 Sep 2009 | Published: 10 Sep 2009

netForensics

Risk Management: Bridging Policies and Procedures - Fundamental Security Concepts
sponsored by Global Knowledge
WHITE PAPER: This white paper discusses risk management as a key process in designing security architectures, including a better way for security managers to approach the security ROI issue.
Posted: 10 Dec 2008 | Published: 11 Oct 2008

Global Knowledge

Server and Application Protection - Behind the Lines
sponsored by Trend Micro
WHITE PAPER: For organizations evaluating the benefits of server and application protection systems and making a case for incorporating them into the IT infrastructure, Trend Micro recommends examining nine different areas of business interest. This white paper details these topics and examines Trend Micro server and application protection software.
Posted: 17 Mar 2010 | Published: 01 Feb 2009

Trend Micro
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement