IT Systems  >   Business Systems  >  

Security Systems

RSS Feed    Add to Google    Add to My Yahoo!
Security Systems White Papers (View All Report Types)
26 - 50 of 620 Matches Previous Page  |  Next Page
A Zero-Day Agnostic Approach to Defending Against Advanced Threats
sponsored by Digital Guardian
WHITE PAPER: This webinar transcript discusses how information security products have changed and why these changes are essential for tackling advanced threats.
Posted: 14 Aug 2015 | Published: 14 Aug 2015

Digital Guardian

Technology for Simplified SOC Creating
sponsored by Splunk
WHITE PAPER: This white paper discusses the importance of an SOC and gives suggestions for implementing technology that simplifies the process of SOC creation.
Posted: 14 Aug 2015 | Published: 31 Dec 2014

Splunk

Achieving Data-Drive Security Intelligence
sponsored by Splunk
WHITE PAPER: This white paper discusses how you can obtain the kind of data-driven security that's needed for combatting today's advanced threats.
Posted: 14 Aug 2015 | Published: 31 Dec 2014

Splunk

State of Security Operations
sponsored by Hewlett-Packard Company
WHITE PAPER: With businesses recognizing the need for further investment in cyber-defense, it is essential to figure out which tools and strategies are best for your organization. Read now and find out more about the current state of security operations in 2014.
Posted: 14 Aug 2015 | Published: 31 Jan 2014

Hewlett-Packard Company

Mobile Data Security: Finding the Balance
sponsored by IBM
WHITE PAPER: This helpful white paper presents the steps every organization should take before committing to a mobile security solution, and examines the pros and cons of different potential security strategies.
Posted: 13 Aug 2015 | Published: 07 Aug 2014

IBM

451 Research Report: How One Security Tool Compares against the Rest
sponsored by Splunk
WHITE PAPER: This white paper analyzes a relatively new player in the security market and discusses its capabilities, strengths and weaknesses.
Posted: 13 Aug 2015 | Published: 31 Jan 2014

Splunk

Fraud Detection for All of Your Data
sponsored by Splunk
WHITE PAPER: This white paper discusses how you can adopt an anti-fraud strategy that protects all your data, even unstructured data and big data.
Posted: 12 Aug 2015 | Published: 31 Dec 2014

Splunk

Mobilize Your Virtual Enterprise Applications with 4 Steps
sponsored by StarMobile
WHITE PAPER: Learn how next-generation remote computing protocols accelerate your company's application mobilization and improve user experience. Continue reading to access advice on implementing successful enterprise mobilization.
Posted: 07 Aug 2015 | Published: 07 Aug 2015

StarMobile

Top 10 Data Security Tips to Safeguard Your Business
sponsored by Absolute
WHITE PAPER: This white paper describes ten steps you can take to increase your cybersecurity.
Posted: 06 Aug 2015 | Published: 06 Aug 2015

Absolute

Managed Security Services: How Can They Benefit You?
sponsored by IBM
WHITE PAPER: This white paper discusses the financial and technological benefits of investing in managed security services.
Posted: 06 Aug 2015 | Published: 31 Jan 2014

IBM

Data protection: Time-Proven Truths for Your Virtual World
sponsored by Datalink
WHITE PAPER: This white paper presents four steps you can take to make the right data protection and backup decisions for your environment.
Posted: 06 Aug 2015 | Published: 06 Aug 2015

Datalink

10 SIEM Platforms and Their Security Event Management Success
sponsored by LogRhythm, Inc.
WHITE PAPER: This report looks at ten different SIEM products and analyzes which one performs best when it comes to security event management.
Posted: 05 Aug 2015 | Published: 05 Aug 2015

LogRhythm, Inc.

The Capabilities of 10 SIEM Technologies
sponsored by LogRhythm, Inc.
WHITE PAPER: This report analyzes ten different SIEM technologies for risk management capabilities and performance.
Posted: 05 Aug 2015 | Published: 05 Aug 2015

LogRhythm, Inc.

Top 6 Security Considerations in Migrating to Microsoft Windows 10
sponsored by Absolute
WHITE PAPER: This white paper can help you make the migration to Windows 10 without sacrificing your security.
Posted: 05 Aug 2015 | Published: 05 Aug 2015

Absolute

Critical Capabilities for Client Management Tools
sponsored by Absolute
WHITE PAPER: This white paper lists the eight critical capabilities of good end user management tools. In addition, it presents reviews and ratings of fourteen different end user management platforms.
Posted: 05 Aug 2015 | Published: 13 Jun 2014

Absolute

Your Guide to Secure Databases
sponsored by Oracle Corporation
WHITE PAPER: This resource contains tips on enhancing your information security by securing databases directly.
Posted: 05 Aug 2015 | Published: 31 Dec 2014

Oracle Corporation

Healthcare Security: The Cost of Lost or Stolen Devices
sponsored by Absolute
WHITE PAPER: This white paper discusses the challenges of securing healthcare data in a mobile world, especially when mobile devices are lost or stolen.
Posted: 04 Aug 2015 | Published: 04 Aug 2015

Absolute

Security Report Card: Do You Meet NIST Standards?
sponsored by LogRhythm, Inc.
WHITE PAPER: The collection, management, and analysis of log data is integral to meeting many NIST-CSF requirements, and precautions taken can be summarized in five words: identify, protect, detect, respond, and recover. This white paper outlines the complete updated NIST-CSF guidelines, and highlights one comprehensive log management and analysis solution.
Posted: 04 Aug 2015 | Published: 31 Dec 2014

LogRhythm, Inc.

Developing Strategic Mobile Management & Security
sponsored by Absolute
WHITE PAPER: This Gartner report can help you develop a mobile endpoint strategy that is streamlined, efficient, and secure.
Posted: 04 Aug 2015 | Published: 25 Apr 2014

Absolute

A SANS Survey: How Does Your Security Stack Up?
sponsored by LogRhythm, Inc.
WHITE PAPER: Information security continues to be a work in progress for many financial services companies. In this white paper, you will key into an annual SANS survey on the security of the financial services sector, and learn how to apply your enterprise's resources to the specific categories of threats that you face, both internal and external.
Posted: 04 Aug 2015 | Published: 04 Aug 2015

LogRhythm, Inc.

Build Security that's Proactive, Not Reactive
sponsored by CrowdStrike
WHITE PAPER: This white paper discusses the importance of proactive security and how you can build that kind of security in your environment.
Posted: 04 Aug 2015 | Published: 04 Aug 2015

CrowdStrike

The Importance of a Strong Incident Response
sponsored by CrowdStrike
WHITE PAPER: This white paper discusses how, with the right combination of security services and technology, you can be able to quickly mitigate a security breach and get your business operations back to normal.
Posted: 04 Aug 2015 | Published: 04 Aug 2015

CrowdStrike

Security Services for Defeating Sophisticated Attacks
sponsored by CrowdStrike
WHITE PAPER: This white paper discusses what you can achieve with the right people looking out for your security.
Posted: 04 Aug 2015 | Published: 04 Aug 2015

CrowdStrike

Why IT Professionals Need to Take Responsibility for Data Security
sponsored by Oracle Corporation
WHITE PAPER: This white paper presents the results of a survey that asked IT professionals about their data security practices, revealing the areas where most organizations need to improve.
Posted: 04 Aug 2015 | Published: 31 Oct 2014

Oracle Corporation

Mobility-as-a-Service: See What's New in Workforce Mobility
sponsored by Sprint
WHITE PAPER: High device prices and complex management requirements can fall short when you're in the process of rethinking your mobility. This white paper examines a new mobility-as-a-service platform. Read on to learn how you can receive new and improved wireless service benefits.
Posted: 03 Aug 2015 | Published: 03 Aug 2015

Sprint
26 - 50 of 620 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement