IT Management  >   Systems Operations  >  

System Security

RSS Feed    Add to Google    Add to My Yahoo!
System SecurityWhite Papers (View All Report Types)
 
10 Things Every IT Manager Must Know About the Enemy Within
sponsored by Clearswift
WHITE PAPER: This white paper contains critical information on where insider threats originate and explores one company's innovative tools for preventing data breaches within your enterprise.
Posted: 16 Oct 2014 | Published: 16 Oct 2014

Clearswift

Journey to the Hybrid Cloud
sponsored by VMware
WHITE PAPER: Access this whitepaper for insight into the hybrid cloud service provider landscape and key considerations for choosing a provider. Additionally, find out more about how hybrid cloud implementations enable many capabilities and business benefits.
Posted: 20 Oct 2014 | Published: 30 Sep 2014

VMware

Secure mobile access that goes beyond the classroom door.
sponsored by Dell Software
WHITE PAPER: Provide fast, secure access to campus resources and deliver productivity applications on personal or institution-owned devices. Read the use case and discover how Dellâ„¢ Enterprise Mobility Management enables you to secure sensitive information, manage access to your campus network and simplify management across device types and platforms.
Posted: 27 Oct 2014 | Published: 27 Oct 2014

Dell Software

Battle the Evolving Threat Landscape with Dynamic Authentication Strategies
sponsored by SecureAuth
WHITE PAPER: This resource highlights the vital need for dynamic authentication, especially to increase the effectiveness by reducing false positives and false negatives.
Posted: 24 Oct 2014 | Published: 24 Oct 2014

SecureAuth

Dell Business Phone Enables BYOD
sponsored by Dell Software
WHITE PAPER: Increase productivity on personal mobile devices while enabling your enterprise to retain control and security. Give employees a separate business phone line on their personal devices, plus the robust business phone capabilities they need for work. Read the datasheet for details.
Posted: 24 Oct 2014 | Published: 24 Oct 2014

Dell Software

Extending Security Intelligence with Big Data
sponsored by IBM
WHITE PAPER: Learn how IBM Security Intelligence with Big Data can help organizations gain insights into advanced data threats.
Posted: 08 Oct 2014 | Published: 31 Jan 2013

IBM

Shavlik Patch: Simplified Application Patch Management for Microsoft System Center
sponsored by Shavlik Technologies
WHITE PAPER: This exclusive whitepaper explores a patch management solution that will reduce your security risks from unpatched, non-Microsoft third-party applications.
Posted: 14 Oct 2014 | Published: 14 Oct 2014

Shavlik Technologies

DDoS and Downtime Considerations for Risk Management
sponsored by Verisign, Inc.
WHITE PAPER: This exclusive whitepaper explores your risk management options when it comes to distributed denial of service attacks.
Posted: 27 Oct 2014 | Published: 11 Oct 2012

Verisign, Inc.

BYOD, Data Leakage, and Regulatory Compliance
sponsored by BitGlass
WHITE PAPER: This white paper discusses how modern technology can enable BYOD policies while satisfying enterprises' security and compliance needs.
Posted: 09 Oct 2014 | Published: 09 Oct 2014


Delivering Threat Intelligence to Security Technology Providers and Large Organizations
sponsored by Webroot
WHITE PAPER: One of the best ways to address poor incident detection and incident response is with greater use of information-driven security based upon internal security analytics and external threat intelligence. So what technology and strategies do you need to enable this insight? Read this white paper to find out now.
Posted: 09 Oct 2014 | Published: 09 Oct 2014

Webroot
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement