Software  >   Systems Software  >  

Security Software

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Auditing Software (Security), Infrastructure Software, Security Tools
DEFINITION: Software installed on a computer network or an individual computer that protects it from attack.
Security Software White Papers (View All Report Types)
26 - 50 of 187 Matches Previous Page  |  Next Page
Protect Your Data with Advanced Encryption
sponsored by ESET
WHITE PAPER: This resource introduces one way you can create unbreakable security for your data.
Posted: 12 Mar 2015 | Published: 31 Dec 2014

ESET

Build a Strong Security Foundation with the Right Endpoint Protection
sponsored by ESET
WHITE PAPER: This white paper describes one endpoint protection solution that has proven to provide a strong foundation.
Posted: 12 Mar 2015 | Published: 31 Dec 2014

ESET

Closing the Web App Data Security Gap
sponsored by IBM
WHITE PAPER: In this white paper, you will learn about one security platform that monitors, tracks, and reports on user activities accesing critical applications.
Posted: 09 Mar 2015 | Published: 08 May 2013

IBM

Stop DDoS Attacks with DNS Protection
sponsored by Efficientip
WHITE PAPER: Access this white paper now to read about effective DNS protection and to learn how you can shield yourself from DDoS attacks.
Posted: 09 Mar 2015 | Published: 31 Dec 2014

Efficientip

5 Threats Google Apps Can't Defend
sponsored by Datto, Inc.
WHITE PAPER: In this white paper, learn the five threats that Google can't defend and how to protect your data on your own. Read on now to learn more.
Posted: 06 Mar 2015 | Published: 04 Feb 2015

Datto, Inc.

The Complete Guide To Google Apps Security
sponsored by Datto, Inc.
WHITE PAPER: In this helpful guide, explore the available additional protection services and technologies for securing data stored in Google's cloud.
Posted: 04 Mar 2015 | Published: 07 Jan 2015

Datto, Inc.

Traps Advanced Endpoint Protection: Technology Overview
sponsored by Palo Alto Networks
WHITE PAPER: This white paper describes a security approach that provides protection before the attacks can penetrate.
Posted: 02 Mar 2015 | Published: 30 Nov 2014

Palo Alto Networks

Eliminating Security Weak Points with Next-Gen NAC
sponsored by ForeScout Technologies, Inc.
WHITE PAPER: Access this white paper to learn how next-gen network access control (NAC) empowers you to define, implement, and enforce granular access policies for connecting endpoints based on user identity, role, device, location, and other factors.
Posted: 23 Feb 2015 | Published: 04 Dec 2014

ForeScout Technologies, Inc.

Mitigating the Biggest Security Threat of all – Your Users
sponsored by Viewfinity
WHITE PAPER: This white paper describes one method of giving users the admin rights they need while still mitigating the risks they pose.
Posted: 09 Feb 2015 | Published: 01 Feb 2012

Viewfinity

A Guide to Cyber Security that Fights the Worst Cyber Crime
sponsored by LogRhythm, Inc.
WHITE PAPER: Access this informative white paper to find out what cyber threats are emerging as key players and what you can do to stop them.
Posted: 06 Feb 2015 | Published: 06 Feb 2015

LogRhythm, Inc.

Network Security Intelligence Selection Buying Guide
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper explains why network defense can make or break the success of an enterprise; and also introduces HP TippingPoint, a leader in security intelligence, as a potential solution.
Posted: 01 Feb 2015 | Published: 19 Nov 2014

Hewlett-Packard Company

Self-Encrypting Drives
sponsored by Micron Technology
WHITE PAPER: This white paper expalins encryption and different encryption processes.
Posted: 11 Dec 2014 | Published: 31 Dec 2013

Micron Technology

How the Right Printing Security Can Minimize the Risk of Check Fraud and Counterfeiting
sponsored by Hewlett-Packard Limited
WHITE PAPER: This white paper introduces a solution developed by HP and TROY to control check printing operations and help prevent fraud on finished checks, adding security to a variety of applications.
Posted: 10 Nov 2014 | Published: 31 Mar 2014

Hewlett-Packard Limited

Symantec Managed Security: Integrating the Network and Endpoints
sponsored by Symantec Corporation
WHITE PAPER: In this informative white paper, discover a new threat protection platform that integrates security across the network and endpoint, while also providing critical context to detected attacks.
Posted: 26 Aug 2014 | Published: 26 Aug 2014

Symantec Corporation

Why you Need to take a Best-of-Breed Approach when Selecting Security Solutions
sponsored by Webroot
WHITE PAPER: This white paper describes the many advantages to the best-of-breed approach to selecting technologies from multiple providers, and also offers a number of helpful suggestions for VARs to capitalize on this approach.
Posted: 11 Jul 2014 | Published: 31 May 2014

Webroot

Microsoft Office 365: Strengthening Security, Compliance, and Control
sponsored by Mimecast
WHITE PAPER: This white paper discusses how third party enhancements focused on security, archiving, and encryption can provide more capable, granular services than Microsoft offers in Office 365.
Posted: 12 Jun 2014 | Published: 20 Feb 2014

Mimecast

Security Management 2.5: Replacing Your SIEM Yet?
sponsored by IBM
WHITE PAPER: This white paper offers insight on the needs and requirements that security information and event management (SIEM) solutions should address. Read on to learn if your current SIEM vendor is enough, or if you should consider a replacement that better fits today's IT environment.
Posted: 20 Mar 2014 | Published: 01 Feb 2014

IBM

Cisco 2015 Annual Security Report
sponsored by Cisco Systems, Inc.
WHITE PAPER: Access this white paper to read the Cisco 2015 annual report and discover research, insights, and techniques straight from security experts that can protect your business.
Posted: 09 Feb 2015 | Published: 09 Feb 2015

Cisco Systems, Inc.

Mobile Cloud Security: What CXOs Need to Know
sponsored by Cisco Systems, Inc.
WHITE PAPER: This blog post discusses the need for end-to-end security in a mobile cloud environment.
Posted: 29 Jan 2015 | Published: 29 Jan 2015

Cisco Systems, Inc.

The Wild World of Malware: Keeping Your Company Safe from Advanced Threats
sponsored by Icomm Technologies
WHITE PAPER: In this in-depth resource, gain essential knowledge on today's advanced malware threats, and discover how new next-generation firewalls (NGFW) can prevent them from gaining access to your valuable data.
Posted: 17 Sep 2014 | Published: 31 Jul 2012

Icomm Technologies

Cisco Cloud Web Security: Single Interface for Global Control
sponsored by Cisco Systems, Inc.
WHITE PAPER: This resource features a cloud Web security solution that offers unique features to help you gain clear visibility and complete control over today's more expansive networks.
Posted: 23 Apr 2014 | Published: 28 Feb 2014

Cisco Systems, Inc.

Webroot SecureAnywhere Business Endpoint Protection vs. Seven Competitors (February 2014)
sponsored by Webroot
WHITE PAPER: This resource outlines testing results of 8 competing endpoint security software products and breaks down how each perform in relation to a wide variety of criteria.
Posted: 18 Apr 2014 | Published: 28 Feb 2014

Webroot

Test Data Management for Security and Compliance
sponsored by EMC Corporation
WHITE PAPER: As big data continuously gets bigger, your IT organization must develop scalable new strategies to mitigate the increased risk of losing control of it. This white paper examines how test data management can play a vital role in safeguarding data privacy and ensuring regulatory compliance.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

EMC Corporation

Secunia PSI Country Report - Q4 2013 Germany
sponsored by Secunia
WHITE PAPER: This informative report explores the current state of cybercrime targeting German PCs and what can be done to stop them.
Posted: 20 Mar 2014 | Published: 20 Mar 2014

Secunia

Manage Data Security and Application Threats with a Multi-Tiered Approach
sponsored by IBM
WHITE PAPER: This resource introduces a portfolio of security tools that work together to provide the layered, multi-tier data and application protection that you're looking for.
Posted: 05 Mar 2014 | Published: 31 Jan 2014

IBM
26 - 50 of 187 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement