Software  >   Systems Software  >  

Security Tools

RSS Feed    Add to Google    Add to My Yahoo!
Security ToolsWhite Papers (View All Report Types)
 
IBM: An Early Leader across the Big Data Security Analytics
sponsored by IBM
WHITE PAPER: Security data collection and analysis has become a big data dilemma – so why wouldn't you adopt a big data approach? This resource outlines why legacy analytics and SIEM tools are inefficient and explores how adopting a solution that combines real-time and asymmetric big data security analytics is vital to success.
Posted: 22 Jul 2013 | Published: 28 Jun 2013

IBM

Mobility: No Longer a Risky Business?
sponsored by Cisco Systems, Inc.
WHITE PAPER: This informative resource examines critical best practices for establishing safe and secure networks so that your business can utilize mobility without increasing security risks. Read on to learn how you can ensure a safe and secure mobile environment.
Posted: 09 Dec 2013 | Published: 09 Dec 2013

Cisco Systems, Inc.

4 Key Tips for Cybercrime Defense
sponsored by Dell Software
WHITE PAPER: Do you know how to keep cyber-criminals out of your network? Learn how to protect your organization from emerging threats in our e-book, "Anatomy of a Cyber-Attack."
Posted: 20 Aug 2012 | Published: 01 Aug 2012

Dell Software

The DDoS Threat Spectrum
sponsored by F5 Networks
WHITE PAPER: This crucial paper takes an in-depth look at the evolution of DDoS attacks, outlining their history, present landscape and potential future so that your organization can understand what may be coming on the horizon and take the necessary precautions to ensure data protection and business continuity.
Posted: 19 Nov 2013 | Published: 19 Nov 2013

F5 Networks

Creating the Ultimate Security Platform
sponsored by IBM
WHITE PAPER: This whitepaper outlines the latest nature of attacks and vulnerabilities in the security landscape and details the capabilities and solutions that must be leveraged to maintain secure operations.
Posted: 19 Jul 2013 | Published: 28 Jun 2013

IBM

Identify And Influence Identity Stakeholders
sponsored by Ping Identity Corporation
WHITE PAPER: This report outlines the stakeholder needs of the Identity and Access Management playbook, breaking down the roles, responsibilities, and communication and collaboration must-dos for those who initiate and manage IAM change.
Posted: 20 May 2013 | Published: 16 Jul 2012

Ping Identity Corporation

Mobility Advantage: Why Secure Your Mobile Devices
sponsored by Sybase, an SAP company
WHITE PAPER: The use of enterprise mobile devices is on the rise yet few companies have a mobile security strategy. Get this paper now and see how you can protect your mobile devices and data from unwanted eyes.
Posted: 31 May 2011 | Published: 31 May 2011

Sybase, an SAP company

The Need to Secure All Business Communications: A competitive Overview of Major Players in the Market
sponsored by Webroot
WHITE PAPER: This Bloor Research paper offers an overview of the major players in the market for hosted email and web security services. View now to evaluate these services and explore key recommendations for selecting the right vendor for your organisations' needs.
Posted: 25 Jul 2011 | Published: 01 Dec 2010

Webroot

A Pragmatic Approach to SIEM
sponsored by Tripwire, Inc.
WHITE PAPER: In this paper we will take a look at this disturbing trend and provide useful guidance for maximizing the value of SIEM and log management tools, while focusing on protecting systems and data not on simply checking the compliance check box.
Posted: 08 Feb 2011 | Published: 08 Feb 2011

Tripwire, Inc.

Mobile Device Security: What Senior Managers Should Know
sponsored by Sophos, Inc.
WHITE PAPER: In this article, find practical advice to help you effectively manage the iPads, Android phones, and other next-generation mobile devices in your organization in order to minimize risk and drive business success.
Posted: 14 May 2013 | Published: 31 Oct 2012

Sophos, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement