IT Systems  >   Business Systems  >  

Security Systems

RSS Feed    Add to Google    Add to My Yahoo!
Security SystemsWhite Papers (View All Report Types)
51 - 75 of 534 Matches Previous Page  | Next Page
Voltage Success Story: Envision Pharmaceutical Services
sponsored by Voltage Security, Inc.
WHITE PAPER: This case study features Envision Pharmaceutical Services' experience with an easy-to-use, low-cost email platform that ensured secure data sharing and helped maintain HIPAA and PCI DSS compliance.
Posted: 18 Jun 2014 | Published: 18 Jun 2014

Voltage Security, Inc.

Cover Your SaaS!
sponsored by BitGlass
WHITE PAPER: This white paper reveals the top 5 cloud security solutions to invest in to best protect your virtualized assets.
Posted: 17 Jun 2014 | Published: 17 Jun 2014


Secure Business Information in the Cloud with Centralized Management
sponsored by Box
WHITE PAPER: This white paper highlights the benefits of centralizing data on a single cloud platform to better protect today's decentralized IT infrastructure.
Posted: 17 Jun 2014 | Published: 17 Jun 2014

Box

Defense throughout the Vulnerability Life Cycle with Alert Logic Threat and Log Manager
sponsored by Alert Logic
WHITE PAPER: In this white paper we will discuss how vulnerability assessment, network intrusion detection and log management work together to protect your IT assets.
Posted: 17 Jun 2014 | Published: 17 Jun 2014

Alert Logic

Malware Analysts Have the Tools to Defend Against Cyber-Attacks, But Challenges Remain
sponsored by Threat Track Security
WHITE PAPER: This informative guide explores today's threat landscape, the role of malware and the threat of internal vulnerabilities.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

Threat Track Security

MSSP Data Sheet
sponsored by AlienVault
WHITE PAPER: This informative guide explores one company's unique MSSP platform and how it can greatly enhance your revenue and your customer's security.
Posted: 13 Jun 2014 | Published: 13 Jun 2014

AlienVault

Enterprise Executives and Consumers Lack Confidence About Cybersecurity
sponsored by Threat Track Security
WHITE PAPER: This informative guide outlines the lack of confidence many executives and consumers have about their cybersecurity.
Posted: 13 Jun 2014 | Published: 13 Jun 2014

Threat Track Security

Microsoft Extends Windows® XP Malware Support-Compliance Issues Remain
sponsored by Lenovo and Microsoft
WHITE PAPER: This informative guide explores the risks associated with Windows® XP and why now is the time to upgrade your operating system – ensuring system security.
Posted: 13 Jun 2014 | Published: 13 Jun 2014

Lenovo and Microsoft

Security and Controlling Data in the Cloud
sponsored by Vormetric
WHITE PAPER: This white paper reveals the ability to extend existing security systems to cloud environments to provide consistent and all-around protection.
Posted: 13 Jun 2014 | Published: 31 Dec 2013

Vormetric

The One-Man SOC Webcast: Habits of Highly Effective Security Practitioners
sponsored by AlienVault
WHITE PAPER: This informative resource outlines top strategies for a highly effective SOC.
Posted: 12 Jun 2014 | Published: 12 Jun 2014

AlienVault

U.S. Defense Contractors Say They Remain Vulnerable to Cyber-Attacks
sponsored by Threat Track Security
WHITE PAPER: This informative whitepaper outlines the vulnerability of U.S. defense contractors and explores what that means for your business.
Posted: 11 Jun 2014 | Published: 11 Jun 2014

Threat Track Security

A Comprehensive Guide to Encryption Technology Approaches
sponsored by Vormetric
WHITE PAPER: This resource highlights 11 encryption technologies and offers key questions to help you choose the right solution for your business needs.
Posted: 11 Jun 2014 | Published: 31 Dec 2012

Vormetric

Security in the Cloud for SAP HANA
sponsored by Vormetric
WHITE PAPER: This white paper features a data security architecture that offers encryption and granular access controls to better protect SAP HANA cloud deployments.
Posted: 10 Jun 2014 | Published: 10 Jun 2014

Vormetric

Building a Better Network Security Strategy
sponsored by Hewlett-Packard Company
WHITE PAPER: This informative resource discusses what features a network security strategy should cover in order to ensure success in today's business world.
Posted: 06 Jun 2014 | Published: 31 Jan 2014

Hewlett-Packard Company

Top Five Reasons to Use the RadiantOne Federated Identity System With SharePoint
sponsored by Radiant Logic, Inc.
WHITE PAPER: This resource highlights the benefits of a federated identity service for organizations with scalable user environments.
Posted: 06 Jun 2014 | Published: 06 Jun 2014

Radiant Logic, Inc.

Balancing HADOOP Data Security with Performance
sponsored by Vormetric
WHITE PAPER: This white paper features a Hadoop data security system that offers encryption to boost protection without weighing down performance.
Posted: 05 Jun 2014 | Published: 05 Jun 2014

Vormetric

Secure Cloud Applications Without Disrupting Your Enterprise Identity Infrastructure
sponsored by Radiant Logic, Inc.
WHITE PAPER: This resource features an on-premise federated identity service that helps you extent your existing identity and access management (IAM) infrastructures to the cloud.
Posted: 05 Jun 2014 | Published: 31 Dec 2012

Radiant Logic, Inc.

HP ArcSight ESM Solution Helps Finansbank to Combat Fraud and Increase Customer Satisfaction
sponsored by Hewlett-Packard Company
WHITE PAPER: In this case study, learn how one bank implemented a fraud management security platform that was able to meet the growing scale of customers, while providing clear visibility into transaction activity over a range of channels. Click now to see how else they're benefiting!
Posted: 05 Jun 2014 | Published: 31 Jul 2013

Hewlett-Packard Company

Critical Infrastructure and Cybersecurity: Key Issues
sponsored by Hewlett-Packard Company
WHITE PAPER: This informative whitepaper takes a look at security infrastructure and how it is the link to ensuring security.
Posted: 05 Jun 2014 | Published: 31 Mar 2014

Hewlett-Packard Company

A Survey of Zero-day Attacks in 2013 and What They Say About the Traditional Security Model
sponsored by FireEye
WHITE PAPER: This informative survey explores zero-day attacks in 2013 and what they say about the traditional security model.
Posted: 05 Jun 2014 | Published: 05 Jun 2014

FireEye

Evolve SiteMinder With RadiantOne
sponsored by Radiant Logic, Inc.
WHITE PAPER: This white paper features a federated identity service that unifies identity policies for simplified management, helping reduce costs for growing user environments.
Posted: 04 Jun 2014 | Published: 31 Dec 2013

Radiant Logic, Inc.

Beyond Encryption: 5 Keys to Protecting Corporate Data In The Cloud
sponsored by SkyHigh
WHITE PAPER: This white paper offers a 5-layer cloud data protection strategy that offers a more robust and consistent defense.
Posted: 04 Jun 2014 | Published: 04 Jun 2014

SkyHigh

Beyond the Breach
sponsored by FireEye
WHITE PAPER: This informative whitepaper takes a look at today's threat landscape and outlines the unfortunate news – security breaches are inevitable.
Posted: 04 Jun 2014 | Published: 04 Jun 2014

FireEye

Strategy and Vision for Cloud Identity and Access Management
sponsored by CA Technologies.
WHITE PAPER: This white paper offers key tips on how to extend identity and access management (IAM) to not only keep security consistent across on-premise and cloud environments, but to help reduce costs and improve efficiency as well.
Posted: 13 Jun 2014 | Published: 31 Dec 2013

CA Technologies.

Securing the Mobile Cloud Connected Enterprise
sponsored by CA Technologies.
WHITE PAPER: This resource reveals the role of identity and access management in improving access and secure collaboration in today's mobile, cloud-connected IT environment.
Posted: 12 Jun 2014 | Published: 12 Jun 2014

CA Technologies.
51 - 75 of 534 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement