IT Systems  >   Business Systems  >  

Security Systems

RSS Feed    Add to Google    Add to My Yahoo!
Security Systems White Papers (View All Report Types)
101 - 125 of 552 Matches Previous Page  |  Next Page
Top 10 IoT Security Challenges
sponsored by Axway
WHITE PAPER: In this white paper, learn the top ten security considerations for IoT. Read on now and explore two IoT security scenario case studies and their respective solutions.
Posted: 18 Feb 2015 | Published: 04 Dec 2013

Axway

Bridging the Data Security Gap: Unified Data Protection for 4 Key Data Environments
sponsored by IBM
WHITE PAPER: This white paper explores how to bridge the data security gap amid the digital information explosion in four major areas: Big data, virtual environments and the cloud, enterprise data, and enterprise applications.
Posted: 12 Feb 2015 | Published: 31 May 2013

IBM

Cybersecurity Overview for CEOs and Boards
sponsored by LogRhythm, Inc.
WHITE PAPER: This valuable white paper gives detailed information about the security risks CEOs face and what they can do to ensure that their enterprise is being taken care of.
Posted: 09 Feb 2015 | Published: 09 Feb 2015

LogRhythm, Inc.

2014 Global Report on the Cost of Cyber Crime
sponsored by Hewlett-Packard Company
WHITE PAPER: View this informative white paper report now to learn what to expect from hackers and how to safeguard your organization. Read on to learn how to assess your security needs and which platforms and systems to choose to mitigate risk by viewing things through the attacker's perspective.
Posted: 02 Feb 2015 | Published: 22 Oct 2014

Hewlett-Packard Company

The Bot Threat
sponsored by Hewlett-Packard Company
WHITE PAPER: In this white paper, get vital information about the malicious bot, also known as botnets when in large forces, and explore 4 key features that will help you build a defense-in-depth security system to prevent these attacks from compromising your networks.
Posted: 01 Feb 2015 | Published: 13 Nov 2013

Hewlett-Packard Company

Network Security Intelligence Selection Buying Guide
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper explains why network defense can make or break the success of an enterprise; and also introduces HP TippingPoint, a leader in security intelligence, as a potential solution.
Posted: 01 Feb 2015 | Published: 19 Nov 2014

Hewlett-Packard Company

Why do you need Sandboxing for Protection?
sponsored by Fortinet, Inc.
WHITE PAPER: This exclusive white paper reveals how sandboxing can help you combat advanced persistent threats.
Posted: 30 Jan 2015 | Published: 15 Jan 2014

Fortinet, Inc.

5 ½ Traits that make a Firewall “Next Gen”
sponsored by Fortinet, Inc.
WHITE PAPER: This exclusive white paper offers up five and half features that make a firewall next-generation.
Posted: 29 Jan 2015 | Published: 15 Dec 2014

Fortinet, Inc.

The Problem with Your Threat Intelligence
sponsored by Risk IO
WHITE PAPER: This exclusive white paper explores some common security intelligence mistakes you might be making.
Posted: 22 Jan 2015 | Published: 22 Jan 2015

Risk IO

How Security Practitioners Can Use Data to Make Intelligent Decisions that Minimize Risk
sponsored by Risk IO
WHITE PAPER: This exclusive white paper explores how an organization can utilize their data to make intelligent decisions that minimize your risk.
Posted: 20 Jan 2015 | Published: 02 Jan 2014

Risk IO

Why IT Leaders Should Take Strategic Action in Mobile and Endpoint Computing in 2015
sponsored by Absolute Software
WHITE PAPER: This white paper explains why enterprises should develop a broader-based, long-term endpoint strategy that connects to business goals, processes, and practices.
Posted: 19 Jan 2015 | Published: 25 Apr 2014

Absolute Software

A Smarter Approach to Network Encryption
sponsored by Certes Networks
WHITE PAPER: This white paper explores how enterprises can make network encryption easier to set up and manage, as well as transparent to network and application performance and behavior.
Posted: 09 Jan 2015 | Published: 16 Dec 2014

Certes Networks

Managing Security Risks and Vulnerabilities
sponsored by IBM
WHITE PAPER: Access this valuable white paper now to learn how to protect high-value assets and provide scalable, cost-effective, integrated security across the entire IT environment and much more.
Posted: 22 Dec 2014 | Published: 08 Jan 2014

IBM

Protecting Corporate Credentials Against Today’s Threats
sponsored by IBM
WHITE PAPER: This exclusive whitepaper explores the traditional method of protecting corporate credentials and how you must adapt to today's threat landscape.
Posted: 24 Nov 2014 | Published: 16 Sep 2014

IBM

Protecting Your Business with a More Mature IT Security Strategy
sponsored by Hewlett-Packard Company
WHITE PAPER: Your ability to spot and stop cyber attacks depends on having the right security people, processes, and technology in place. HP Security Intelligence and Operations Consulting has assessed the security programs of dozens of enterprises. The results are concerning--24 percent of companies do not meet minimum requirements for security monitoring.
Posted: 20 Nov 2014 | Published: 20 Nov 2014

Hewlett-Packard Company

Growing the Security Analyst
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper coaches IT leaders on how to develop and retain the security analysts they need to keep their business safe.
Posted: 20 Nov 2014 | Published: 20 Nov 2014

Hewlett-Packard Company

The 2014 Global Cost of Cybercrime Study
sponsored by Hewlett-Packard Company
WHITE PAPER: This informative report distills interviews with senior-level IT personnel about the impact of cybercrime on their organizations in 2014 into trends that apply to every enterprise around the world.
Posted: 19 Nov 2014 | Published: 19 Nov 2014

Hewlett-Packard Company

The ESG Cybersecurity Maturity Model
sponsored by Hewlett-Packard Company
WHITE PAPER: Based on their research, Enterprise Strategy Group has developed a cyber security maturity model that classifies organizations as basic, progressing, or advanced.
Posted: 18 Nov 2014 | Published: 22 Oct 2014

Hewlett-Packard Company

Survey Results: How Are IT Teams Using Security Analytics?
sponsored by Hewlett-Packard Company
WHITE PAPER: Read this report to learn how IT security teams use security analytics and intelligence to stop attacks.
Posted: 12 Nov 2014 | Published: 15 Oct 2014

Hewlett-Packard Company

Comply Before You Connect: Security for Federal Agencies
sponsored by IBM
WHITE PAPER: This white paper discusses the use of "comply-to-connect" initiatives in federal agencies and proposes IBM Endpoint Manager as a solution to the need for continuous compliance.
Posted: 07 Nov 2014 | Published: 30 Sep 2013

IBM

10 Risky Security Behaviors to Avoid: Protect Your Organization
sponsored by Global Knowledge
WHITE PAPER: This exclusive whitepaper explores 10 risky behaviors end-users must avoid to keep your organization safe.
Posted: 07 Nov 2014 | Published: 07 Nov 2014

Global Knowledge

New Topics on the 2014 Security+ SY0-401 Exam
sponsored by Global Knowledge
WHITE PAPER: This exclusive whitepaper details the changes to the CompTIA Security + exam and helps you prepare for the test.
Posted: 07 Nov 2014 | Published: 07 Nov 2014

Global Knowledge

Streamlining Multifunction Printer Security
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper describes an example of how you can efficiently enhance your MFP security with centralized and automated security settings.
Posted: 11 Feb 2015 | Published: 31 Mar 2013

Hewlett-Packard Company

How Organizations Are Responding to Mobile and Cloud Threats
sponsored by SafeNet, Inc.
WHITE PAPER: This white paper explores the results of a recent survey that sought to elucidate how organizations are adapting their approach to authentication to protect their sensitive assets as they adopt cloud-based services and BYOD.
Posted: 10 Dec 2014 | Published: 15 May 2014

SafeNet, Inc.

Secure Mobile Email for the Lean IT Department
sponsored by Shavlik Technologies
WHITE PAPER: This expert whitepaper explores how you can keep you end-users happy and your corporate information safe in the age of mobile email.
Posted: 02 Dec 2014 | Published: 02 Dec 2014

Shavlik Technologies
101 - 125 of 552 Matches Previous Page    3 4 5 6 7 8    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement