IT Systems  >   Business Systems  >  

Security Systems

RSS Feed    Add to Google    Add to My Yahoo!
Security Systems White Papers (View All Report Types)
1 - 25 of 532 Matches Previous Page  |  Next Page
Test Results for 5 Security Systems
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This report summarizes tests conducted on five different security programs, revealing which ones caught the most threats, had the best usability, and more.
Posted: 02 Mar 2015 | Published: 18 Nov 2014

Check Point Software Technologies Ltd.

Why Application Security is a Business Imperative
sponsored by Veracode, Inc.
WHITE PAPER: View this white paper to learn how to close application vulnerability gaps and mitigate business risk.  Read on to learn more.
Posted: 26 Feb 2015 | Published: 15 Oct 2014

Veracode, Inc.

Survey Results: How Are Security Analytics Used?
sponsored by AlienVault
WHITE PAPER: This survey explores issues of security analytics and intelligence, revealing how IT security teams use those tools to detect cyber-attacks.
Posted: 23 Feb 2015 | Published: 31 Dec 2014

AlienVault

IBM X-Force Threat Intelligence Quarterly - 3Q 2014
sponsored by IBM
WHITE PAPER: This exclusive white paper takes a look at how Heartbleed impacted organizations around the world.
Posted: 20 Feb 2015 | Published: 31 Aug 2014

IBM

Breaking Down Silos and Securing Directory Access
sponsored by IBM
WHITE PAPER: Access this white paper to learn strategies to breaking down directory siloes and how to manage and protect heterogeneous data sources.
Posted: 20 Feb 2015 | Published: 08 Oct 2014

IBM

Redefining Your Data Protection Strategy: Focus on Recovery
sponsored by Dell Software
WHITE PAPER: In this white paper, you will learn how purpose-built backup appliances (PBBAs) are becoming more popular and how they can help you protect data despite growing demands.
Posted: 20 Feb 2015 | Published: 04 Dec 2014

Dell Software

Top 10 IoT Security Challenges
sponsored by Axway
WHITE PAPER: In this white paper, learn the top ten security considerations for IoT. Read on now and explore two IoT security scenario case studies and their respective solutions.
Posted: 18 Feb 2015 | Published: 04 Dec 2013

Axway

Optimizing Enterprise Security: Intelligence, Control, and Response
sponsored by ForeScout Technologies, Inc.
WHITE PAPER: This white paper explores the factors that make network security management and operations more difficult today than ever before.
Posted: 17 Feb 2015 | Published: 28 Nov 2014

ForeScout Technologies, Inc.

Defending Against Rogue Users, Devices, and Applications
sponsored by ForeScout Technologies, Inc.
WHITE PAPER: This white paper explains how NAC technologies help to ensure that only appropriate users, devices, and applications have access to your network resources, enabling you to support your users in a secure, efficient way.
Posted: 17 Feb 2015 | Published: 29 Aug 2014

ForeScout Technologies, Inc.

Cisco 2015 Annual Security Report
sponsored by Cisco Systems, Inc.
WHITE PAPER: This report reveals up-to-date data on many of the most important security concerns facing organizations in 2015.
Posted: 16 Feb 2015 | Published: 01 Jan 2015

Cisco Systems, Inc.

Bridging the Data Security Gap: Unified Data Protection for 4 Key Data Environments
sponsored by IBM
WHITE PAPER: This white paper explores how to bridge the data security gap amid the digital information explosion in four major areas: Big data, virtual environments and the cloud, enterprise data, and enterprise applications.
Posted: 12 Feb 2015 | Published: 31 May 2013

IBM

How to Protect Sensitive Retail Data
sponsored by IBM
WHITE PAPER: This white paper goes into detail about the threats facing retail enterprises and how to mitigate them.
Posted: 09 Feb 2015 | Published: 30 Nov 2014

IBM

Cyber Security Oversight for CEOs and Boards
sponsored by LogRhythm, Inc.
WHITE PAPER: This valuable white paper gives detailed information about the security risks CEOs face and what they can do to ensure that their enterprise is being taken care of.
Posted: 09 Feb 2015 | Published: 09 Feb 2015

LogRhythm, Inc.

Case Study: Public School Implements Identity Solution to Centralize Management and Increase Security
sponsored by Centrify Corporation
WHITE PAPER: This case study details how the Grand Island school district in Nebraska implemented the Centrify for Mac and Mobile solution for integration into a centralized IAM framework to handle authorization and authentication district-wide.
Posted: 04 Feb 2015 | Published: 30 Aug 2013

Centrify Corporation

IBM InfoSphere Guardium: Manage the Entire Data Security and Compliance Lifecycle
sponsored by IBM
WHITE PAPER: This white paper introduces a robust solution from IBM capable of safeguarding your enterprise's data across all enterprise systems and data center environments.
Posted: 03 Feb 2015 | Published: 31 Oct 2013

IBM

2014 Global Report on the Cost of Cyber Crime
sponsored by Hewlett-Packard Company
WHITE PAPER: View this informative white paper report now to learn what to expect from hackers and how to safeguard your organization. Read on to learn how to assess your security needs and which platforms and systems to choose to mitigate risk by viewing things through the attacker's perspective.
Posted: 02 Feb 2015 | Published: 22 Oct 2014

Hewlett-Packard Company

Next-Generation Firewalls and IPS: Why You Need Both
sponsored by Hewlett-Packard Company
WHITE PAPER: This HP white paper shows how next-generation firewalls and next-generation intrusion prevention systems are complementary security solutions that work together to secure your network.
Posted: 01 Feb 2015 | Published: 11 Dec 2014

Hewlett-Packard Company

Incident Response: How to Fight Back, A SANS Survey
sponsored by Hewlett-Packard Company
WHITE PAPER: This SANS survey on incident response taps into the collective knowledge of 259 security professionals in 19 industries and 13 countries to help you to understand how other companies respond to cyber incidents and how you can improve your own response.
Posted: 01 Feb 2015 | Published: 11 Dec 2014

Hewlett-Packard Company

The Bot Threat
sponsored by Hewlett-Packard Company
WHITE PAPER: In this white paper, get vital information about the malicious bot, also known as botnets when in large forces, and explore 4 key features that will help you build a defense-in-depth security system to prevent these attacks from compromising your networks.
Posted: 01 Feb 2015 | Published: 13 Nov 2013

Hewlett-Packard Company

Building a Better Network Security Strategy
sponsored by Hewlett-Packard Company
WHITE PAPER: This informative resource discusses what features a network security strategy should cover in order to ensure success in today's business world.
Posted: 01 Feb 2015 | Published: 03 Mar 2014

Hewlett-Packard Company

Quantifying the Business Value of HP TippingPoint
sponsored by Hewlett-Packard Company
WHITE PAPER: This HP white paper applies the experience of real HP TippingPoint customers to quantify its savings and demonstrate pay back in the first year.
Posted: 01 Feb 2015 | Published: 30 Dec 2013

Hewlett-Packard Company

Network Security Intelligence Selection Buying Guide
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper explains why network defense can make or break the success of an enterprise; and also introduces HP TippingPoint, a leader in security intelligence, as a potential solution.
Posted: 01 Feb 2015 | Published: 19 Nov 2014

Hewlett-Packard Company

Why You Need a Next-Generation Firewall
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper explores the reasons why enterprises benefit from implementing next-generation firewalls (NGFWs) and lays out a path to success.
Posted: 01 Feb 2015 | Published: 01 Feb 2015

Hewlett-Packard Company

Top 5 Aspects of Security to Look for in a Cloud Provider
sponsored by Oracle Corporation
WHITE PAPER: Get the 5 security areas you needs to be concerned with when selecting the cloud system that's right for your business.
Posted: 03 Mar 2015 | Published: 31 Dec 2013

Oracle Corporation

Streamlining Multifunction Printer Security
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper describes an example of how you can efficiently enhance your MFP security with centralized and automated security settings.
Posted: 11 Feb 2015 | Published: 31 Mar 2013

Hewlett-Packard Company
1 - 25 of 532 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement