Standards  >  

Security Protocols

RSS Feed    Add to Google    Add to My Yahoo!
Security Protocols White Papers (View All Report Types)
 
Mobile Threat Management
sponsored by IBM
WHITE PAPER: Discover a viable solution to the catastrophic damages that can be caused by malicious code infecting 11.6 million+ mobile devices today. Read on to find how to safely support both BYOD and corporate-owned devices, proactively manage mobile threats in near real-time, reduce the risk of sensitive data leakage of vital information, and more.
Posted: 16 Jun 2016 | Published: 31 Dec 2015

IBM

E-Guide: Securing the cloud
sponsored by CA Technologies.
WHITE PAPER: The cloud has become a very popular way to cut costs and get ahead but the need for security standards is increasing at a rapid pace. Individuals all over, in diverse areas of business want to know that their information will/can be safe in the cloud. Read this expert E-Guide to gain an understanding for a necessary security standard in the cloud.
Posted: 21 Dec 2011 | Published: 21 Dec 2011

CA Technologies.

Five Reasons Why Hiring A Third-Party Specialist Makes Sense When Securely Disposing Your IT Assets
sponsored by Iron Mountain
WHITE PAPER: Access this white paper to unveil the top 5 reasons why organizations should outsource IT asset disposal tasks. Learn how doing so can reduce costs and error, and ensure that economic, legal, and operations mandates are met.
Posted: 20 Dec 2013 | Published: 20 Dec 2013

Iron Mountain

Cybercrime Battle Basics
sponsored by ThreatMetrix
WHITE PAPER: This paper shows you how integrated approaches that look beyond the firewall and single technology defenses can defend your company from emerging fraud threats.
Posted: 12 Jan 2012 | Published: 12 Jan 2012

ThreatMetrix

Salvation Army Protects the Integrity of Data and Global Brand
sponsored by Lumension
WHITE PAPER: In this white paper, uncover device control software that enables authorized devices and applications to access organizations' networks to ensure security policies and requirements are met.
Posted: 14 Oct 2013 | Published: 14 Oct 2013

Lumension

Enterprise Information Security in Transition
sponsored by IBM
WHITE PAPER: This white paper boils the reasons behind current issues in the information security field down into four major causes, and also lays out a list of specific, detailed changes that need to be made to the enterprise security model for these core issues to be resolved.
Posted: 28 Jul 2014 | Published: 31 Oct 2012

IBM

Linking identity and data loss prevention to avoid damage to brand, reputation and competitiveness
sponsored by CA Technologies.
WHITE PAPER: This report examines the issue of data governance through the publication of new primary research that examines how well European businesses understand the risks and what steps they have taken to address them.
Posted: 19 Jun 2010 | Published: 18 Jun 2010

CA Technologies.

Detect and Survive
sponsored by Guidance Software, Inc.
WHITE PAPER: This white paper discusses why the need to forensically examine security threats is an increasingly vital tool for modern companies. It also examines leading providers of this technology, including EnCase Cybersecurity from Guidance Software.
Posted: 16 Apr 2010 | Published: 15 Apr 2010

Guidance Software, Inc.

PCI Compliance Made Simple
sponsored by Alert Logic
WHITE PAPER: Major data breaches have caused untold damage. These unfortunate events have led to the creation of a data security standard (PCI DSS) that all payment card industry members must comply to. This white paper helps to simplify and provide a deeper understanding of the PCI DSS v1.1 and discusses best practices to achieve PCI compliance.
Posted: 20 Jul 2009 | Published: 20 Feb 2008

Alert Logic

IBM WebSphere MQ File Transfer Edition
sponsored by IBM
WHITE PAPER: This solution brief describes how you can lower business risk and increase productivity with trusted and secured file transfers.
Posted: 07 Jul 2011 | Published: 10 Dec 2010

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement