IT Systems  >   Business Systems  >  

Security Systems

RSS Feed    Add to Google    Add to My Yahoo!
Security SystemsWhite Papers (View All Report Types)
76 - 100 of 466 Matches Previous Page  | Next Page
Mitigating Web Threats with Comprehensive and Pervasive Security
sponsored by Cisco
WHITE PAPER: This whitepaper features an all-inclusive security solution that offers intelligence, context-based policy management, and network-enforced security to better detect, prevent, and protect against advanced Web threats.
Posted: 02 Apr 2014 | Published: 31 May 2013

Cisco

Advanced Threat Protection with Dell SecureWorks Security Services
sponsored by Dell SecureWorks UK
WHITE PAPER: This guide explores the varying types of advanced threats, their motives, and how you can enhance your security strategy to better detect and resist them.
Posted: 02 Apr 2014 | Published: 31 Dec 2013

Dell SecureWorks UK

Financial Institutions, Merchants, and the Race Against Cyberthreats
sponsored by RSA, The Security Division of EMC
WHITE PAPER: In this white paper, learn about the 4 top forms of cybercrime. Click through to reveal 6 key recommendations to best protect your organization from security breaches.
Posted: 02 Apr 2014 | Published: 31 Oct 2013

RSA, The Security Division of EMC

Trusted Storage Vendor Duo Provides Video Surveillance Solutions You Can Count On
sponsored by EMC & Arrow
WHITE PAPER: Check out this exclusive white paper to uncover the key features of the latest comprehensive, certified video surveillance solutions from trusted vendors.
Posted: 02 Apr 2014 | Published: 31 Dec 2012

EMC & Arrow

Selecting a Next-Generation Firewall: Topic 10 Considerations
sponsored by Cisco
WHITE PAPER: In this white paper, uncover 10 considerations to weigh when evaluating next-generation firewall tools to ensure that the solution you select best protects your networks from today's broad range of risk.
Posted: 01 Apr 2014 | Published: 28 Feb 2014

Cisco

Mitigating Email Virus Attacks
sponsored by Cisco
WHITE PAPER: Access this resource to explore the emerging e-mail threat landscape that includes inbound and outbound risks. Read on to discover a simplified management solution that boosts defenses at a lower TCO.
Posted: 01 Apr 2014 | Published: 30 Jun 2013

Cisco

Chalk Talk: Simplify User Access with NetIQ Solutions
sponsored by NetIQ
WHITE PAPER: View this webcast to learn about an access management solution that offers self-service capabilities to eliminate time-consuming phone calls and paperwork to gain necessary access to critical business applications.
Posted: 01 Apr 2014 | Published: 01 Apr 2014

NetIQ

Cloud-based Enterprise Identity Management Using OAuth
sponsored by Forum Systems
WHITE PAPER: This resource highlights an authentication and authorization solution that offers protection beyond the username and password-only level.
Posted: 01 Apr 2014 | Published: 01 Apr 2014

Forum Systems

Cisco 2014 Annual Security Report
sponsored by Sourcefire
WHITE PAPER: This in-depth report provides valuable insight into the top security concerns of 2014 and what your organization can do to prevent cybercrime.
Posted: 01 Apr 2014 | Published: 01 Apr 2014

Sourcefire

Information Security Services: Preparing for Distributed Denial of Service (DDoS) Attacks
sponsored by Dell SecureWorks UK
WHITE PAPER: This essential whitepaper explores the current state of DDoS attacks and outlines why you need a proactive prevention strategy.
Posted: 01 Apr 2014 | Published: 28 Feb 2011

Dell SecureWorks UK

Accelerating Incident Response and Reducing Security Risks
sponsored by Dell SecureWorks UK
WHITE PAPER: This essential whitepaper outlines the advantages of managed security services providers and how your incident response strategy is essential to your overall security plan.
Posted: 01 Apr 2014 | Published: 01 Apr 2014

Dell SecureWorks UK

Secure Network Access for Personal Mobile Devices
sponsored by Cisco
WHITE PAPER: This resource offers a solution to the challenges of mobility in the workplace, helping organizations realize the full benefits of BYOD without sacrificing strong security.
Posted: 31 Mar 2014 | Published: 30 Sep 2012

Cisco

Multifactor Authentication: Removing Risk While Simplifying Processes
sponsored by NetIQ
WHITE PAPER: In this resource, learn how multi-factor authentication brings that extra line of defense your organization needs to protect against malicious hackers.
Posted: 31 Mar 2014 | Published: 31 Mar 2014

NetIQ

Cisco 2014 Annual Security Report
sponsored by Cisco
WHITE PAPER: This information-packed resource acts as a guide for developing a robust security approach given today's issues with trust, threat intelligence, and varying industry trends. Click through to explore key findings, as well as recommendations for your next steps.
Posted: 31 Mar 2014 | Published: 31 Mar 2014

Cisco

What CISOs Need to Know About Cloud Computing
sponsored by CloudPassage
WHITE PAPER: This resource highlights key security differences in traditional infrastructures versus the cloud. Click through to learn how to leverage existing methods to create a well-rounded cloud security approach.
Posted: 31 Mar 2014 | Published: 06 Jan 2014

CloudPassage

6 Steps to Protect Your Intellectual Property
sponsored by Websense
WHITE PAPER: In this report, find out what data you must protect and why, uncover six steps for deploying data security controls, and learn more about the concept of data loss prevention (DLP) as a defense.
Posted: 31 Mar 2014 | Published: 31 Dec 2013

Websense

Why Java Exploits Remain a Top Security Risk
sponsored by Websense
WHITE PAPER: Learn how the huge number of Java versions in active use makes it vulnerable to attack. Illustrated are the risks from the use of Java and alternatives on how to address these risks, using internal process, Websense solutions or a mixture of both.
Posted: 31 Mar 2014 | Published: 31 Dec 2013

Websense

World Wide Technology Accelerates and Streamlines Access Management
sponsored by NetIQ
WHITE PAPER: This case study shares one organization's experience with an access management solution that enabled 8x faster integration with new services so that users could count on reliable, secure access to business applications anytime, anywhere.
Posted: 31 Mar 2014 | Published: 31 Mar 2014

NetIQ

Identity Manager: Reducing Risk, Raising Governance and Improving the Bottom Line
sponsored by NetIQ
WHITE PAPER: This resource highlights the major reason behind compliance challenges, and offers a solution that provides a real-time, holistic view of your organization's posture to improve data accuracies and ensure business stability.
Posted: 28 Mar 2014 | Published: 31 Dec 2013

NetIQ

Automating Security for Greater SaaS Success
sponsored by CloudPassage
WHITE PAPER: In this resource, learn how automated security tools and compliance monitoring will attract more cloud consumers with ease-of-use, scalability, and portability.
Posted: 28 Mar 2014 | Published: 01 Nov 2013

CloudPassage

Detecting Zero-Day Exploits in the Wild
sponsored by Websense
WHITE PAPER: This report outlines the methodology used to research Windows Error Reporting (WER) – and explains its potential implications for your organization's cyber security.
Posted: 28 Mar 2014 | Published: 28 Mar 2014

Websense

Managing Security Risks and Vulnerabilities
sponsored by IBM
WHITE PAPER: This informative whitepaper takes a look current threat landscape and what you need to do to protect your organization.
Posted: 28 Mar 2014 | Published: 31 Jan 2014

IBM

DDOS Mitigation a Key Component in Network Security
sponsored by Ixia
WHITE PAPER: This expert e-guide explores why DDoS prevention needs to be a main part of your network security plan.
Posted: 27 Mar 2014 | Published: 27 Mar 2014

Ixia

Advanced Persistent Threats: Insider Credentials at Risk
sponsored by NetIQ
WHITE PAPER: This resource reveals the common misconceptions about how secure your identity and access management (IAM) program is. Click through to uncover 3 features your IAM strategy should include to truly keep advanced persistent threats (APTs) out.
Posted: 27 Mar 2014 | Published: 31 Dec 2013

NetIQ

Leverage Security Intelligence to Protect Sensitive Healthcare Data
sponsored by IBM
WHITE PAPER: This guide explores the importance of end-to-end system visibility and security intelligence for healthcare organizations, and how to combat a full range of security threats.
Posted: 26 Mar 2014 | Published: 31 Dec 2013

IBM
76 - 100 of 466 Matches Previous Page    2 3 4 5 6 7    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement