IT Systems  >   Business Systems  >  

Security Systems

RSS Feed    Add to Google    Add to My Yahoo!
Security SystemsWhite Papers (View All Report Types)
26 - 50 of 541 Matches Previous Page  | Next Page
Encryption Buyer's Guide
sponsored by Sophos, Inc.
WHITE PAPER: This white paper offers 3 key questions to ask an encryption vendor to help you find a tool that best fits your business needs.
Posted: 08 Jul 2014 | Published: 18 Apr 2014

Sophos, Inc.

Web Attack Survival Guide
sponsored by Imperva
WHITE PAPER: This informative whitepaper explores survival tactics in the event of a web attack.
Posted: 07 Jul 2014 | Published: 07 Jul 2014

Imperva

Compliance - Protecting Payment Information with PCI DSS
sponsored by GlobalScape
WHITE PAPER: This informative whitepaper outlines strategies for protecting your customer data, remaining compliant and explains why complying with regulations won't ensure security.
Posted: 07 Jul 2014 | Published: 31 Dec 2013

GlobalScape

Advanced Persistent Threats: Detection, Protection and Prevention
sponsored by Sophos, Inc.
WHITE PAPER: Download this paper to get an overview of the common characteristics of APTs, how they typically work, and how Sophos complete security solution can protect your network, servers and end user clients.
Posted: 06 Jul 2014 | Published: 02 Jul 2014

Sophos, Inc.

A Manager’s Guide to Unified Threat Management and Next-Gen Firewalls
sponsored by Sophos, Inc.
WHITE PAPER: Unified Threat Management (UTM) is a common tool for most security professionals because of its ability to integrate multiple security technologies onto one platform. This brief guide explores the various questions you should ask when deciding your UTM systems.
Posted: 02 Jul 2014 | Published: 30 Nov 2013

Sophos, Inc.

Facilitating Enterprise Compliance With Globalscape® EFT™ and the High-Security Module
sponsored by GlobalScape
WHITE PAPER: In this white paper, discover how Enhanced File Transfer (EFT™) High Security module (HSM) combined with the Auditing and Reporting module (ARM) remains compliant to a variety of standards including PCI DSS.
Posted: 01 Jul 2014 | Published: 01 Jul 2014

GlobalScape

Exposing the Cybersecurity Cracks: A Global Perspective
sponsored by Websense, Inc.
WHITE PAPER: This eye-opening reviews data collected from nearly 5000 experienced IT workers regarding deficiencies in the ways that their companies attempt to think about, fight, and detect security breaches.
Posted: 01 Jul 2014 | Published: 30 Apr 2014

Websense, Inc.

Secure Your Mobile Content While Increasing Productivity
sponsored by Accellion, Inc.
WHITE PAPER: This report provides key survey findings indicating how important mobile access is to users, how likely they are to bypass authorized systems, how compliant current collaboration practices are, and what collaboration functionality user expect on their mobile devices.
Posted: 01 Jul 2014 | Published: 31 Dec 2013

Accellion, Inc.

Data Security Checklist: Tips for Managing the Mobile Enterprise
sponsored by Accellion, Inc.
WHITE PAPER: This document presents a checklist of data security features to consider when establishing an enterprise mobility management strategy.
Posted: 01 Jul 2014 | Published: 30 Nov 2013

Accellion, Inc.

Mitigate the Risks of File Sharing and BYOD with Private Clouds
sponsored by Accellion, Inc.
WHITE PAPER: This informative white paper examines private cloud solutions for file sharing and synchronization, discussing how a private cloud can help you realize the benefits that BYOD provides without having to expose your sensitive information to potential risks.
Posted: 01 Jul 2014 | Published: 28 Jun 2013

Accellion, Inc.

Managing Mobility: Balancing the Risks and Rewards
sponsored by Accellion, Inc.
WHITE PAPER: This research report will outline the importance of balancing the advantages and risk of increasing enterprise mobility.
Posted: 01 Jul 2014 | Published: 21 Feb 2014

Accellion, Inc.

Best Practices for a Secure Mobile Workforce
sponsored by Accellion, Inc.
WHITE PAPER: Read this white paper to learn how to reduce the risk of mobile data breaches while keeping mobile workers productive.
Posted: 01 Jul 2014 | Published: 29 Apr 2014

Accellion, Inc.

Accellion vs Box: 5 Key Reasons Enterprises Select Accellion
sponsored by Accellion, Inc.
WHITE PAPER: Read this whitepaper to learn how Accellion's private cloud answers the need for a mobile, scalable, flexible file sharing solution that extends and reinforces enterprise security policies and controls.
Posted: 01 Jul 2014 | Published: 30 Apr 2014

Accellion, Inc.

Data Security for Mobile Users: One Size Does Not Fit All
sponsored by Accellion, Inc.
WHITE PAPER: Read this whitepaper to learn the 3 key criteria for customizing a mobile security policy for your users.
Posted: 01 Jul 2014 | Published: 30 Apr 2014

Accellion, Inc.

End-to-End-Encryption for your Enterprise
sponsored by Stratasys Singapore Pte Ltd
WHITE PAPER: This informative guide explores one company's success when implementing an effective E2EE platform.
Posted: 30 Jun 2014 | Published: 01 Jul 2014

Stratasys Singapore Pte Ltd

Competitive Testing of Web Security Devices
sponsored by Websense, Inc.
WHITE PAPER: This informative whitepaper compares various market-leading web security tools and outlines some common threats looking to infiltrate your system.
Posted: 30 Jun 2014 | Published: 23 Jan 2014

Websense, Inc.

A Manifesto for Cyber Resilience
sponsored by Symantec Corporation
WHITE PAPER: In this white paper, find out what it takes to become cyber resilient in this age of escalating threats.
Posted: 26 Jun 2014 | Published: 26 Jun 2014

Symantec Corporation

I Have to Trust Someone… Don't I?
sponsored by CA Technologies.
WHITE PAPER: This whitepaper outlines the significance of insider threats within every company.
Posted: 25 Jun 2014 | Published: 31 Jul 2013

CA Technologies.

Defending Against Advanced Persistent Threats: Strategies for a New Era of Attacks
sponsored by CA Technologies.
WHITE PAPER: This guide takes a look at the growing risk of advanced persistent threats and what you can to prevent them.
Posted: 25 Jun 2014 | Published: 31 Dec 2013

CA Technologies.

Why Strong Authentication is a Must for All Users
sponsored by CA Technologies.
WHITE PAPER: This informative whitepaper provides valuable insight into why strong authentication is essential for all users.
Posted: 25 Jun 2014 | Published: 25 Jun 2014

CA Technologies.

Closing the Biggest Hole in Web Application Delivery
sponsored by CA Technologies.
WHITE PAPER: This informative whitepaper explores a strategy for closing the biggest hole in web application delivery.
Posted: 24 Jun 2014 | Published: 24 Jun 2014

CA Technologies.

Understanding the Cyber-Risks of your Company
sponsored by Hewlett-Packard Limited
WHITE PAPER: This informative resource explores the growing complexities of cybersecurity risks and outlines the importance of understanding your adversary.
Posted: 24 Jun 2014 | Published: 24 Jun 2014

Hewlett-Packard Limited

Operationalizing Information Security: Top 10 SIEM Implementer’s Checklist
sponsored by AccelOps Inc.
WHITE PAPER: This informative whitepaper outlines 10 best practices for successful SIEM implementation.
Posted: 23 Jun 2014 | Published: 23 Jun 2014

AccelOps Inc.

Advanced Persistent Threats: Defending from the Inside Out
sponsored by CA Technologies.
WHITE PAPER: This white paper explains why reinvigorating your privileged identity management solutions, paired with data intelligence-driven content-awareness, can improve outsider and insider threat prevention.
Posted: 20 Jun 2014 | Published: 31 Jul 2012

CA Technologies.

Only Bitglass Secures Cloud And Mobile Yet Respects User Privacy
sponsored by BitGlass
WHITE PAPER: This white paper offers a security solution that improves visibility and analytics capabilities across disparate mobile devices and cloud applications.
Posted: 20 Jun 2014 | Published: 20 Jun 2014

26 - 50 of 541 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement