IT Management  >   Systems Operations  >  

System Security

RSS Feed    Add to Google    Add to My Yahoo!
System SecurityWhite Papers (View All Report Types)
 
Five critical steps to achieving an effective application security program
sponsored by IBM
WHITE PAPER: This white paper explains a variety of application threats that organisations deal with, and introduces 5 practical steps to take when implementing application security.
Posted: 03 Jul 2014 | Published: 31 Dec 2013

IBM

An Inside Track on Insider Threats
sponsored by Imperva
WHITE PAPER: Read this informative report for details on the impact of insider threats, as well as recommended strategies for businesses to apply in preventing and remediating these critical issues.
Posted: 11 Jul 2014 | Published: 31 Dec 2012

Imperva

Choosing the Right Virtual Server Backup Software for SMEs
sponsored by CA ARCserve
WHITE PAPER: Access this white paper to learn about a leading backup software solution that protects both physical and virtual environments.
Posted: 07 Jul 2014 | Published: 31 Mar 2014

CA ARCserve

How Resellers Can Become the Trusted Advisors on Security Issues
sponsored by Webroot
WHITE PAPER: This white paper introduces an innovative endpoint security solution with a completely cloud-based architecture rather than the outdated, signature-based methods of the past.
Posted: 11 Jul 2014 | Published: 31 May 2014

Webroot

Top 5 "Must-Haves" for MSPs Adding IT Monitoring and Security Services
sponsored by AccelOps Inc.
WHITE PAPER: This helpful white paper provides MSPs with guidelines for deciding which security solutions to offer and which suppliers to work with.
Posted: 09 Jul 2014 | Published: 09 Jul 2014

AccelOps Inc.

BYOD Risks and Rewards How to keep employee smartphones, laptops and tablets secure
sponsored by Sophos, Inc.
WHITE PAPER: This informative resource takes a look at the risks and rewards of BYOD from a security perspective and details what your organization can do to embrace the brand while ensuring that your sensitive data is protected.
Posted: 03 Jul 2014 | Published: 25 Feb 2014

Sophos, Inc.

Innovative Technology for Enterprise Security and Enablement
sponsored by CDW Corporation
WHITE PAPER: Read now to learn more about this company's advanced security solutions, which work in conjunction with one another to leverage your enterprise's security, efficiency, compliance, and enablement.
Posted: 21 Jul 2014 | Published: 21 Jul 2014

CDW Corporation

The Promises and Pitfalls of BYOD
sponsored by Dell, Inc. and IntelĀ®
WHITE PAPER: Find out how to let employees use personal smartphones, tablets and laptops for work purposes while protecting your network from malware, data theft and unauthorized access.
Posted: 18 Jul 2014 | Published: 07 Feb 2014

Dell, Inc. and IntelĀ®

5 DBA Mistakes That Can Cost You Your Job
sponsored by Idera
WHITE PAPER: This white paper reveals the 5 unforgivable mistakes that could endanger the integrity, recoverability and security of the databases, including SQL Server, DMAs are supposed to protect.
Posted: 21 Jul 2014 | Published: 21 Jul 2014

Idera

Applying Innovation and Expertise to Enterprise Security
sponsored by CDW Corporation
WHITE PAPER: This helpful white paper introduces one renowned company's security solutions, which cover risk and compliance from end to end.
Posted: 21 Jul 2014 | Published: 21 Jul 2014

CDW Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement