IT Management  >   Systems Operations  >  

System Security

RSS Feed    Add to Google    Add to My Yahoo!
System Security White Papers (View All Report Types)
 
Gartner Report: Instituting Layered Security Defenses
sponsored by Hewlett-Packard Company
WHITE PAPER: Read this white paper and included Gartner research to learn the four phases of effective security and how you can build strong protections on each phase.
Posted: 06 May 2015 | Published: 06 May 2015

Hewlett-Packard Company

Track and Analyze the Impact of Mobile Apps, Platforms and Device Preferences
sponsored by Good Technology
WHITE PAPER: Access this white paper now to discover all of the latest mobile trends and learn why security is quickly becoming the greatest concern for decision makers.
Posted: 30 Apr 2015 | Published: 27 Feb 2015

Good Technology

White Paper: Get Ahead with Cisco Connected Factory
sponsored by Cisco Systems, Inc.
WHITE PAPER: In the years ahead, sensor-embedded, Internet-ready machines will become increasingly commonplace for manufacturing firms. Are you ready? Discover how the Cisco Connected Factory can help you tap the potential of the Internet of Things (IoT) in manufacturing—download the white paper.
Posted: 11 May 2015 | Published: 11 May 2015

Cisco Systems, Inc.

2015 Cyberthreat Defense Report
sponsored by Citrix
WHITE PAPER: In this report, discover what security professionals had to say about mobile security, endpoint security, and other important trends in the cybersecurity landscape.
Posted: 12 May 2015 | Published: 12 May 2015

Citrix

Safe and Sound: The Importance of PC Security and Manageability
sponsored by Dell, Inc. & Intel®
WHITE PAPER: This white paper discusses the biggest PC security and manageability pain points for IT pros.
Posted: 30 Apr 2015 | Published: 30 Nov 2013

Dell, Inc. & Intel®

Detect and Protect against Advanced Threats
sponsored by Hewlett-Packard Limited
WHITE PAPER: This white paper examines the architecture of a strong, layered security system and suggests ways to partner with security services in order to achieve it.
Posted: 22 May 2015 | Published: 30 Apr 2015

Hewlett-Packard Limited

Intelligence-driven GRC for Security
sponsored by RSA
WHITE PAPER: Discover how a comprehensive, intelligence-driven GRC model extends visibility into data and processes, provides in-depth analysis of risks and compliance issues, and allows businesses to anticipate, respond and continuously adapt in a rapidly changing landscape.
Posted: 06 May 2015 | Published: 06 May 2015

RSA

An Inside Look at the On Demand Cloud Platform™
sponsored by Peer1
WHITE PAPER: Access this white paper to learn about a specific type of cloud platform that enables virtual cloud servers and bare metal cloud servers to be provisioned in minutes—all from a single, highly intuitive, easy-to-use control panel.
Posted: 07 May 2015 | Published: 07 May 2015

Peer1

Custom Defense Against Targeted Attacks
sponsored by Trend Micro
WHITE PAPER: Read this white paper to discover how you can build custom-designed security that can withstand even the most advanced targeted attack.
Posted: 08 May 2015 | Published: 31 Dec 2014

Trend Micro

The Rise in Cybercrime: A Report on the Current Threat Landscape
sponsored by IBM
WHITE PAPER: This white paper examines why and how cybercrime is increasing and suggests practices for maintaining security.
Posted: 21 May 2015 | Published: 30 Jun 2014

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement