IT Management  >   Systems Operations  >  

System Security

RSS Feed    Add to Google    Add to My Yahoo!
System Security White Papers (View All Report Types)
The ESG Cybersecurity Maturity Model
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Based on their research, Enterprise Strategy Group has developed a cyber security maturity model that classifies organizations as basic, progressing, or advanced.
Posted: 12 Nov 2015 | Published: 22 Oct 2014

Hewlett Packard Enterprise

SANS: What are their Vulnerabilities? A Survey on Continuous Monitoring
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Continuous monitoring is among the latest approaches to keep your company safe from hackers, but most monitoring systems fall short of what it takes to keep hackers out. Read this SANS survey report to find out why
Posted: 23 Nov 2015 | Published: 31 Oct 2015

Hewlett Packard Enterprise

A Strategic Approach to Combatting Security Threats Featuring ESG Analyst Jon Oltsik
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This paper discusses how organizations can take a more strategic approach to threat management by moving to a tightly integrated and centrally managed defense-in-depth architecture.
Posted: 12 Nov 2015 | Published: 31 Oct 2015

Check Point Software Technologies Ltd.

Best Practices for Strong Cyber Security
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Discover how enterprise security best practices can help you avoid suffering financial losses, damage to your brand, and damage to customer relationships caused by undetected or detected too late cyber attacks.
Posted: 20 Nov 2015 | Published: 30 Sep 2015

Hewlett Packard Enterprise

Extensive Compliance Automation Through an Integrated Security Information Event Management Platform
sponsored by AccelOps Inc.
WHITE PAPER: Access this white paper to examine a comprehensive SIEM platform that cuts through operational silos and disparate infrastructures to yield unparalleled visibility, expedited incident response, efficient forensics, and audit assurance while also providing broad verification of controls and compliance documentation.
Posted: 19 Nov 2015 | Published: 30 Dec 2011

AccelOps Inc.

Top 10 Reasons to Strengthen Information Security with App and Desktop Virtualization
sponsored by Citrix
WHITE PAPER: Access this white to learn how desktop and app virtualization strategies are used to strengthen information security. You'll examine the challenges of maintaining information security in today's evolving enterprise environment and 10 benefits of using app and desktop virtualization for information security.
Posted: 13 Nov 2015 | Published: 30 Jan 2015


Five Reason to Adopt a Managed Security Service
sponsored by MASERGY
WHITE PAPER: This resource presents the top five benefits you can enjoy by adopting an MSSP. Find out what an MSSP can offer you and decide if an MSSP is the right solution to your cybersecurity dilemma.
Posted: 30 Oct 2015 | Published: 30 Oct 2015


Case Study: Overcoming the Challenges of K-12 Security
sponsored by AlienVault
WHITE PAPER: This case study describes how Council Rock School District, a large district with a tight budget, found a unified security solution that met its needs.
Posted: 27 Oct 2015 | Published: 27 Oct 2015


Big Data Security for Dummies
sponsored by Blue Coat Systems
WHITE PAPER: This in-depth resource tells you all you need to know about big data security and how it can catch advanced, targeted attacks.
Posted: 23 Oct 2015 | Published: 23 Oct 2015

Blue Coat Systems

Surfacing Critical Cyber Threats Through Security Intelligence
sponsored by LogRhythm, Inc.
WHITE PAPER: Access this white paper to discover why security intelligence is so important in today's threat environment and to learn how to implement it in your organization.
Posted: 05 Nov 2015 | Published: 05 Nov 2015

LogRhythm, Inc.
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement