Software  >   Systems Software  >  

Security Software

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Auditing Software (Security), Infrastructure Software, Security Tools
DEFINITION: Software installed on a computer network or an individual computer that protects it from attack.
Security Software White Papers (View All Report Types)
126 - 150 of 397 Matches Previous Page  |  Next Page
Office 365: This the ROI You Were Expecting?
sponsored by Microsoft
WHITE PAPER: In this Forrester study learn the total economic impact of Microsoft Office 365 for small and midsize businesses, and give you a sense of what kind of ROI to expect when deploying Office 365.
Posted: 28 Apr 2017 | Published: 28 Apr 2017

Microsoft

Office 365: Is the ROI worth it?
sponsored by Microsoft
WHITE PAPER: In this Forrester report discover the ROI of Office 365, and better understand the benefits, costs, and risks associated with an Office 365 implementation within a mid-sized company.
Posted: 28 Apr 2017 | Published: 28 Apr 2017

Microsoft

Create Your Cloud Security Technology Strategy And Road Map
sponsored by Microsoft
WHITE PAPER: Forrester Research warns that "your current 'we control everything' security strategy does not apply to the cloud". With such a fundamental shift, how can CISOs approach the issue? Access this Forrester report to discover how to secure your enterprise on the cloud.
Posted: 28 Apr 2017 | Published: 28 Apr 2017

Microsoft

How to Gain Unified Endpoint Management in Your Mobile Computing Network
sponsored by IBM
WHITE PAPER: Given the importance of mobile computing in keeping businesses competitive, it's more important than ever that organizations strike the appropriate balance between security and productivity. Access this whitepaper to uncover how to act upon security best practices, score your business' security infrastructure and more.
Posted: 28 Apr 2017 | Published: 31 Mar 2017

IBM

How Credential Phishing is Changing — How to Stop It
sponsored by Proofpoint, Inc.
WHITE PAPER: Learn how to stop phishing attacks and how the strategy and tactics are getting more sophisticated in surprising ways.
Posted: 28 Apr 2017 | Published: 28 Apr 2017

Proofpoint, Inc.

Managing Business Email Compromise and Imposter Threats
sponsored by Proofpoint, Inc.
WHITE PAPER: Learn how to deploy a three-pronged approach in defending your enterprise from email fraud, scams, and phishing.
Posted: 28 Apr 2017 | Published: 28 Apr 2017

Proofpoint, Inc.

The Six Essential Capabilities of an Analytics-Driven SIEM
sponsored by Splunk
WHITE PAPER: Uncover the 6 essential capabilities of an analytics-driven SIEM. Discover how having these capabilities will allow your enterprise to monitor threats in real time and respond quickly to incidents, minimize risks from insider threats or accidental compromise, and more.
Posted: 26 Apr 2017 | Published: 26 Apr 2017

Splunk

Getting Started With Dmarc: Your Email Security
sponsored by Proofpoint, Inc.
WHITE PAPER: Discover how to protect employees, business partners, and consumers from fraudulent email, give immediate insight into the email threat landscape, increase email deliverability and engagement, reduce customer service cost,reduce phishing remediation costs, and more.
Posted: 26 Apr 2017 | Published: 26 Apr 2017

Proofpoint, Inc.

ITAD to Strengthen Data Protection
sponsored by Iron Mountain
WHITE PAPER: IT Asset Disposition is quickly becoming a one stop shop for mitigating end-of-lifecycle risks and data protection compliance. Learn the importance of ITAD in protecting data and meeting compliance requirements.
Posted: 25 Apr 2017 | Published: 25 Apr 2017

Iron Mountain

DevSecOps: How to Seamlessly Integrate Security Into DevOps
sponsored by Sonatype
WHITE PAPER: In this Gartner report discover strong recommendations for IT security professionals to preserve the teamwork, agility and speed of DevOps and agile development environments, all while ensuring security.
Posted: 25 Apr 2017 | Published: 30 Sep 2016

Sonatype

Perimeter Security: An Identity Crisis
sponsored by F5 Networks
WHITE PAPER: Discover how to rethink, re-invent, and re-architect your IAM strategies. Access this white paper to learn how to ensure secure authentication for all apps and address the inherent risks associated with decentralized access controls and identity sprawl.
Posted: 25 Apr 2017 | Published: 25 Apr 2017

F5 Networks

Report: Tracking Global Internet Encryption Trends
sponsored by F5 Networks
WHITE PAPER: Discover the numbers, drivers, and trends behind the jump from virtually non-existent encryption of browsers, social media sites, webmail, and SaaS applications to today's reality of over 50% encryption.
Posted: 24 Apr 2017 | Published: 24 Apr 2017

F5 Networks

Achieving Optimal IFRS 9 Compliance
sponsored by SAS
WHITE PAPER: Learn how to comply with IFRS 9 by using technology to optimally approach the implementation challenges it creates. Discover what's driving the IFRS 9 accounting standard, technology and partners for optimal IFRS 9compliance, and more.
Posted: 24 Apr 2017 | Published: 24 Apr 2017

SAS

Security Report: Transaction Monitoring Optimization
sponsored by SAS
WHITE PAPER: Financial fraudsters are targeting both institutions and consumers of digital services as more and more customers are demanding diverse digital channels. Discover how fraudsters are exploiting these capabilities and learn to fight fraud with customer experience in mind.
Posted: 21 Apr 2017 | Published: 31 Dec 2016

SAS

SAS Solution for Personal Data ProtectionEnabling compliance with new regulation
sponsored by SAS
WHITE PAPER: Failing to comply with the GDPR can result in a fine of 20 million EUR or 4% of your organization's annual global turnover: it's simply a risk you can't ignore. Discover: 10 compliance challenges, 3 de-identification techniques that create problems, and 5 areas for improvement to help meet evolving demands.
Posted: 21 Apr 2017 | Published: 21 Apr 2017

SAS

The Role of Policy in Governing and Securing the Cloud
sponsored by Apcera
WHITE PAPER: Learn how to enable your security policy to help mitigate human errors and avoid costly data breaches. Additionally uncover 4 key areas where you need a security policy, a 3-part methodology to modern policy, and more.
Posted: 21 Apr 2017 | Published: 29 Feb 2016


The Ultimate Guide to the CCSP
sponsored by ISC2
WHITE PAPER: Learn how to prepare yourself for getting a CCSP certification, named the #1 cloud computing certification for 2017 by Cloud Computing Intelligence.
Posted: 20 Apr 2017 | Published: 20 Apr 2017

ISC2

Is the Future of Enterprise Security In Managed Services?
sponsored by F5 Networks
WHITE PAPER: Security is becoming an increasingly complex and costly challenge for many organizations to manage on premises. Access this white paper now to learn the potential benefits of outsourcing cybersecurity and more.
Posted: 19 Apr 2017 | Published: 19 Apr 2017

F5 Networks

Passwords Defined: Build Stronger Passwords
sponsored by Specops Software
WHITE PAPER: Learn 2 actionable insights to make your passwords less vulnerable to brute force and dictionary-style attacks. Discover what makes common passwords weak, and what to avoid when choosing yours.
Posted: 18 Apr 2017 | Published: 05 Dec 2016

Specops Software

Password Security Checklist: Ensure PCI Compliance
sponsored by Specops Software
WHITE PAPER: Uncover vital questions to provide your organization with a good starting point on the path to improving your password security.
Posted: 18 Apr 2017 | Published: 18 Apr 2017

Specops Software

Compliance Survey: Your Guide to What Experts are Saying
sponsored by Chef Software
WHITE PAPER: Access this survey report now to learn how to mitigate the struggles faced when companies assess compliance or attempt to fix a compliance violation or security vulnerability, what priorities to set when attempting continuous improvement on overall security and performance, and more.
Posted: 17 Apr 2017 | Published: 17 Apr 2017

Chef Software

Beat Ransomware in 5 Easy Steps
sponsored by Unitrends
WHITE PAPER: With the FBI stating that: "The ransomware is that good. To be honest, we often advise people just to pay the ransom," the threat is obvious. Access this white paper now to learn how to beat ransomware in 5 easy steps.
Posted: 17 Apr 2017 | Published: 17 Apr 2017

Unitrends

User Behavior Analytics: 11 Industry Leaders Offer Peer Insight
sponsored by LogRhythm, Inc.
WHITE PAPER: Discover peer insight into User Behavior Analytics (UBA), the result of interviews with 11 security leaders who have deployed or are looking to deploy 3rd party solutions.
Posted: 14 Apr 2017 | Published: 14 Apr 2017

LogRhythm, Inc.

Improving Efficiency and Effectiveness with a Security Incident Response Platform
sponsored by IBM Resilient
WHITE PAPER: Discover how the combination of a SIEM with an incident response platform will help your organization overcome cybersecurity and compliance issues and take a big step closer to being "cyber resilient".
Posted: 13 Apr 2017 | Published: 30 Nov 2016

IBM Resilient

6 Ways to Improve Your Cybersecurity Posture
sponsored by BDNA
WHITE PAPER: Discover 6 ways to improve your cybersecurity posture, ensuring your organization is taking up a proactive instead of a reactive approach and avoiding the pitfalls of EOL software and the CVEs.
Posted: 12 Apr 2017 | Published: 12 Apr 2017

BDNA
126 - 150 of 397 Matches Previous Page    4 5 6 7 8 9    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement