IT Systems  >   Business Systems  >  

Security Systems

RSS Feed    Add to Google    Add to My Yahoo!
Security Systems White Papers (View All Report Types)
26 - 50 of 546 Matches Previous Page  |  Next Page
Product Brief: HyTrust KeyControl + VMware vSphere 6.5 VM Encryption = Greater Security Together
sponsored by HyTrust
WHITE PAPER: In this security technology product brief, learn best practices for implementing HyTrust KeyControl with VMware vSphere 6.5 VM Encryption for greater security and protection for your enterprise.
Posted: 26 Jul 2017 | Published: 26 Jul 2017

HyTrust

How To Securely Configure A Linux Host To Run Containers
sponsored by Twistlock, Inc.
WHITE PAPER: Discover how to update traditional security for containerized, microservices-based app development by learning how to securely configure a Linux host to run Docker containers.
Posted: 21 Jul 2017 | Published: 21 Jul 2017


The Proactive Security Paradigm: How Containers Can Revamp Your Approach To Security
sponsored by Twistlock, Inc.
WHITE PAPER: Learn how to integrate security into DevOps with a container-first security platform that creates more secure microservices-based app development environments and uncover 6 often overlooked security benefits of containers.
Posted: 21 Jul 2017 | Published: 21 Jul 2017


Advantage of a Fabric vs. Platform Approach to Enterprise Security
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper seeks to outline in easy-to-understand language, the real difference between security fabrics and security platforms, each of which claims to be the next-generation in security architecture.
Posted: 15 Jun 2017 | Published: 15 Jun 2017

Fortinet, Inc.

To SIEM or not to SIEM
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Uncover the top 5 reasons why SIEM can be a bad choice for mid-market companies.
Posted: 06 Jun 2017 | Published: 30 Dec 2016

Arctic Wolf Networks, Inc.

7 Questions to Ask Your Dynamic Application Security Scanning Vendor
sponsored by Rapid7
WHITE PAPER: In this white paper, learn 7 questions you should ask any application security vendor about their dynamic application security testing (DAST) capabilities before making a purchasing decision.
Posted: 06 Jun 2017 | Published: 06 Jun 2017

Rapid7

Turning GDPR Compliance into Data Security
sponsored by Commvault
WHITE PAPER: Discover how to lay a solid foundation for holistic information governance and mitigate the burden of GDPR compliance
Posted: 05 Jun 2017 | Published: 05 Jun 2017

Commvault

Build or Buy? Security Operations Center Strategies for Midmarket Companies
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Discover insights into the challenges and opportunities of building your security internally and the advantages of a managed security operations center.
Posted: 02 Jun 2017 | Published: 28 Feb 2017

Arctic Wolf Networks, Inc.

Cybersecurity Dissonance: Security Gap Between Perception and Reality
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: To meet their security needs, many SMBs are working with a security operations center (SOC). Learn how a SOC can help meet your protection needs, and discover other key security info in this resource.
Posted: 01 Jun 2017 | Published: 31 Jan 2017

Arctic Wolf Networks, Inc.

Why a Virtual Browser is Important For Enterprise Security
sponsored by Authentic8, Inc.
WHITE PAPER: More malware enters via the web browser than any other place across the network. Find out how to create more sophisticated and granular security controls with a cloud-based, virtual browser. Learn what features virtual browsers should offer, what their potential pitfalls are, and more.
Posted: 28 Jul 2017 | Published: 28 Jul 2017

Authentic8, Inc.

Analyzing the Malware Threat
sponsored by Symantec
WHITE PAPER: Find out how malware is evolving to circumvent commonly used defensive measures by learning to avoid behavior detection. Learn more about how this advanced malware functions, how to identify it, and how to neutralize it with cloud generation malware analysis.
Posted: 14 Jun 2017 | Published: 28 Feb 2017

Symantec

How the Hybrid Cloud Changes the Game for Security
sponsored by TrendMicro
WHITE PAPER: Discover the dynamics of the hybrid cloud, and uncover the security challenges that organizations are facing as they adopt the latest technologies.
Posted: 14 Jun 2017 | Published: 14 Jun 2017

TrendMicro

The State of Endpoint Security: Approaches, Opportunities and Conclusions
sponsored by TrendMicro
WHITE PAPER: Discover an overview and breakdown of approaches, opportunities and conclusions regarding of the current state of endpoint security.
Posted: 13 Jun 2017 | Published: 13 Jun 2017

TrendMicro

8 Things to Know About a Secure Web Gateway
sponsored by Symantec
WHITE PAPER: This guide reveals 8 considerations for secure web gateways. Learn about proxy technology, why powerful cloud-based application controls are key, and 6 more must-know aspects of secure web gateways.
Posted: 12 Jun 2017 | Published: 12 Jun 2017

Symantec

5 Reasons to Upgrade Your Endpoint Security
sponsored by Symantec
WHITE PAPER: Uncover 5 reasons to upgrade your endpoint security to ensure that your organization is prepared to handle today's threat landscape.
Posted: 12 Jun 2017 | Published: 31 May 2017

Symantec

Conquer malware: Cloud-based protection, multi-lane Defense, and more
sponsored by Symantec
WHITE PAPER: Learn how to deploy cloud-based malware protection with multiple lines of defense giving your organization the ability to leverage analytics to combat the malware threat.
Posted: 09 Jun 2017 | Published: 09 Jun 2017

Symantec

Next Generation Endpoint Security: Hype or Hope?
sponsored by Symantec
WHITE PAPER: Discover the trends that have emerged to deal with malware challenges on the endpoint. Plus, uncover the information necessary to evaluate the right approach for your organization.
Posted: 09 Jun 2017 | Published: 09 Jun 2017

Symantec

Cloud Computing Top Threats
sponsored by HPE and IntelĀ® Corporate
WHITE PAPER: This Cloud Security Alliance report focuses on 12 security concerns specifically related to the shared, on-demand nature of cloud computing. Discover an in-depth dissection of the issues and gain insight to help you make informed decisions about risk mitigation within a cloud strategy.
Posted: 08 Jun 2017 | Published: 08 Jun 2017

HPE and IntelĀ® Corporate

Evolving the Mobile Security Architecture Toward 5G
sponsored by Cisco Systems, Inc.
WHITE PAPER: This paper prepares your mobile security for 5G by examining the mobile threat landscape, software programmability and cellular standards.
Posted: 07 Jun 2017 | Published: 28 Feb 2017

Cisco Systems, Inc.

Fabric vs. Platform Approach to Enterprise Security
sponsored by Fortinet, Inc.
WHITE PAPER: Learn the differences, strengths, uses, and pros and cons of a security platform vs. a security fabric approach to protecting your organization.
Posted: 02 Jun 2017 | Published: 02 Jun 2017

Fortinet, Inc.

The CISO as a Transformational Role in Risk Management
sponsored by SAI Global IT Risk Manager (Formerly Modulo Risk Manager)
WHITE PAPER: Discover 8 risk questions the CISO must be asking, 5 benefits the CISO can expect in leading risk management, 6 action items that CISO must take to lead risk management, and more.
Posted: 02 Jun 2017 | Published: 02 Jun 2017

SAI Global IT Risk Manager (Formerly Modulo Risk Manager)

From Spreadsheets To Software: The Intelligent Way To Manage Third-Party Risk
sponsored by SAI Global IT Risk Manager (Formerly Modulo Risk Manager)
WHITE PAPER: Learn about forward-thinking systems that make third-party risk management a simpler and more efficient process.
Posted: 02 Jun 2017 | Published: 30 Dec 2016

SAI Global IT Risk Manager (Formerly Modulo Risk Manager)

The Current State of Ransomware
sponsored by Dell SecureWorks
WHITE PAPER: Discover the results of over 230 organizations commenting on ransomware, expert analysis of their responses, insights from leading industry thought leaders, and more.
Posted: 01 Jun 2017 | Published: 01 Jun 2017

Dell SecureWorks

Preparing For The General Data Protection Regulation (GDPR)
sponsored by Fortinet, Inc.
WHITE PAPER: Uncover your guide to complying with the GPDR and the role of automated network security in preventing intrusion and minimizing the risk of a serious breach.
Posted: 01 Jun 2017 | Published: 01 Jun 2017

Fortinet, Inc.

Your Wireless Defense Strategy in an IoT Era
sponsored by Fortinet, Inc.
WHITE PAPER: Discover how a secure access architecture gives enterprise networks the end-to-end protection required now and into the future.
Posted: 01 Jun 2017 | Published: 01 Jun 2017

Fortinet, Inc.
26 - 50 of 546 Matches Previous Page    1 2 3 4 5    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement