IT Agents  >   IT Workforce  >   Information Technology Professionals  >   IT Managers  >  

Security Managers

RSS Feed    Add to Google    Add to My Yahoo!
Security ManagersWhite Papers (View All Report Types)
26 - 50 of 333 Matches Previous Page  | Next Page
The Key to Seamless SSO
sponsored by Radiant Logic, Inc.
WHITE PAPER: This resource features a virtualized federated identity service that extends authentication beyond the security layer and reaches external applications, ensuring enterprise-wide protection.
Posted: 10 Apr 2014 | Published: 10 Apr 2014

Radiant Logic, Inc.

Solving SIEM Problems with Security Analytics
sponsored by EMC Corporation
WHITE PAPER: The status quo approach of collecting more logs from more sources won't help in detecting and responding to advanced threats. Logs are inherently limited in the level security visibility that they provide. Consider a new way of looking at SIEM.
Posted: 10 Apr 2014 | Published: 31 Jan 2013

EMC Corporation

What You Should Know About HIPPA and The Omnibus Final Rule
sponsored by Iron Mountain
WHITE PAPER: This resource explains the latest changes in HIPAA with the Omnibus Final Rule, and offers industry-leading advice on how to ensure compliance.
Posted: 09 Apr 2014 | Published: 31 Dec 2013

Iron Mountain

Best Practices: Single Sign-On Drives Productivity, Security and Adoption When Used with EHR at The Johns Hopkins Hospital
sponsored by Imprivata
WHITE PAPER: In this case study, learn how Johns Hopkins Hospital was able to smoothly implement electronic health records (EHR) and computerized physician order entry (CPOE) without negatively impacting other processes or security. Click now for 5 essential guides for implementation success.
Posted: 09 Apr 2014 | Published: 31 Dec 2012

Imprivata

Making a Business Case for Fraud Prevention Technology
sponsored by IBM
WHITE PAPER: This guide makes an effective business case for fraud-prevention technology and evaluates the true impact of fraud on various financial institutions.
Posted: 09 Apr 2014 | Published: 31 Dec 2013

IBM

The Next Generation in Application Monitoring
sponsored by Hewlett-Packard Limited
WHITE PAPER: Access this resource to discover the 3 major components to application security that will best keep your assets protected across the network.
Posted: 08 Apr 2014 | Published: 31 May 2012

Hewlett-Packard Limited

RSA Web Threat Detection - Innovative and Effective Online Threat Detection
sponsored by RSA, The Security Division of EMC
WHITE PAPER: This white paper features a Web threat detection solution that uses business intelligence to better pinpoint and predict the anomalies, improving investigation and analysis of malicious behavior.
Posted: 08 Apr 2014 | Published: 31 Jan 2014

RSA, The Security Division of EMC

No Silver Bullet: Eight Ways Malware Defeats Strong Security Controls
sponsored by IBM
WHITE PAPER: This whitepaper explores 8 ways malware can defeat your security strategy and outlines some key strategies for preventing these intrusions.
Posted: 08 Apr 2014 | Published: 31 Dec 2013

IBM

8 Questions to Ask Your Intrusion Security System Vendor
sponsored by Hewlett-Packard Limited
WHITE PAPER: This resource outlines 8 questions to ask your intrusion security provider – to ensure your network stays protected.
Posted: 07 Apr 2014 | Published: 30 Sep 2012

Hewlett-Packard Limited

Protecting Your Critical Data with Integrated Security Intelligence
sponsored by IBM
WHITE PAPER: This white paper features a security intelligence platform that integrates with data monitoring and vulnerability assessment for improved threat detection.
Posted: 07 Apr 2014 | Published: 30 Apr 2013

IBM

A More Secure From Door: SSO and Strong Authentication
sponsored by Imprivata
WHITE PAPER: This white paper guides you through the advantages of strong authentication, and helps you decide which strategies and solutions best fit your business needs.
Posted: 07 Apr 2014 | Published: 28 Feb 2014

Imprivata

SANS Survey on Application Security Programs and Practices
sponsored by Hewlett-Packard Company
WHITE PAPER: This SANS report pinpoints where the vulnerability gaps lie in today's application security programs. Click through for key recommendations on how to address these issues.
Posted: 04 Apr 2014 | Published: 28 Feb 2014

Hewlett-Packard Company

Mobile Application Security Study
sponsored by Hewlett-Packard Company
WHITE PAPER: In this resource, unveil the major vulnerabilities created when mobile application developers speed through to meet deadlines instead of integrating top security measures.
Posted: 04 Apr 2014 | Published: 28 Feb 2014

Hewlett-Packard Company

Fortify Your App
sponsored by Hewlett-Packard Company
WHITE PAPER: Access this brief white paper to learn the biggest mobile application security shortfalls. Click now to uncover 3 steps to take to help you boost your defenses.
Posted: 04 Apr 2014 | Published: 04 Apr 2014

Hewlett-Packard Company

Consumer Web Portals: Platforms At Significant Security Risk
sponsored by RSA, The Security Division of EMC
WHITE PAPER: These survey results show just how badly affected some organizations were due to weak authentication, authorization, and fraud detection strategies. Click through to learn why a strong security posture is a must.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

RSA, The Security Division of EMC

20 Practical Tips on Single Sign-On and Strong Authentication from Healthcare IT Professionals
sponsored by Imprivata
WHITE PAPER: This resource features a collection of 20 tips from your healthcare peers on how to successfully implement single sign-on (SSO) and strong authentication solutions.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

Imprivata

How to Extend your Identity Management Systems to use OAuth
sponsored by Forum Systems
WHITE PAPER: Read this resource to learn how to extend your authentication and authorization model to outsourced services. Click through for details on the deployment process, including the benefits of using an API gateway to help with integration.
Posted: 03 Apr 2014 | Published: 03 Apr 2014

Forum Systems

Executive Guide to SYSPRO Security for Auditing Assurance and Control
sponsored by SYSPRO
WHITE PAPER: This white paper introduces an enterprise resource planning (ERP) system with the governance, risk, and compliance functionality you need to satisfy regulatory requirements and fuel security success.
Posted: 03 Apr 2014 | Published: 31 Dec 2013

SYSPRO

Avoiding Cloud Security Audit Pitfalls
sponsored by INetU Inc.
WHITE PAPER: This resource defines the top 5 most common cloud audit pitfalls, and offers suggestions on how to avoid each.
Posted: 03 Apr 2014 | Published: 03 Apr 2014

INetU Inc.

Testing Report Enterprise Firewalls
sponsored by Cisco
WHITE PAPER: This white paper features a top appliance that includes firewall, VPN, and IPS security services, and doesn't hinder overall performance.
Posted: 03 Apr 2014 | Published: 31 Jul 2012

Cisco

Post-Breach Survival Guide
sponsored by INetU Inc.
WHITE PAPER: In this white paper, learn why an incident response plan is a must in today's vicious threat landscape. Click through to uncover 8 key elements to include in a proactive security posture.
Posted: 03 Apr 2014 | Published: 31 Dec 2013

INetU Inc.

Two Great Ways to Protect Your Virtual Machines From Malware
sponsored by Sophos, Inc.
WHITE PAPER: This paper aims to help IT professionals, including security and virtualization specialists, understand and choose between two modern approaches to securing virtual environments.
Posted: 03 Apr 2014 | Published: 03 Apr 2014

Sophos, Inc.

Mitigating Web Threats with Comprehensive and Pervasive Security
sponsored by Cisco
WHITE PAPER: This whitepaper features an all-inclusive security solution that offers intelligence, context-based policy management, and network-enforced security to better detect, prevent, and protect against advanced Web threats.
Posted: 02 Apr 2014 | Published: 31 May 2013

Cisco

Financial Institutions, Merchants, and the Race Against Cyberthreats
sponsored by RSA, The Security Division of EMC
WHITE PAPER: In this white paper, learn about the 4 top forms of cybercrime. Click through to reveal 6 key recommendations to best protect your organization from security breaches.
Posted: 02 Apr 2014 | Published: 31 Oct 2013

RSA, The Security Division of EMC

Selecting a Next-Generation Firewall: Topic 10 Considerations
sponsored by Cisco
WHITE PAPER: In this white paper, uncover 10 considerations to weigh when evaluating next-generation firewall tools to ensure that the solution you select best protects your networks from today's broad range of risk.
Posted: 01 Apr 2014 | Published: 28 Feb 2014

Cisco
26 - 50 of 333 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement