IT Management  >   Systems Operations  >  

System Security

RSS Feed    Add to Google    Add to My Yahoo!
System SecurityWhite Papers (View All Report Types)
 
Prevent Security Breaches with Continuous Monitoring
sponsored by Tenable Network Security
WHITE PAPER: This white paper discusses why defensive security products alone can't fully protect your enterprise from the types of security breaches that have made headlines in recent years, and proposes continuous monitoring as a potential solution.
Posted: 12 Nov 2014 | Published: 25 Jul 2014

Tenable Network Security

The Economic Impact of AdvancedPersistent Threats
sponsored by IBM
WHITE PAPER: This exclusive whitepaper explores the financial impact of advanced persistent threats by detailing the results of a study of 755 IT and IT security practitioners.
Posted: 20 Nov 2014 | Published: 13 May 2014

IBM

Top Tips for Time Stretched Admins
sponsored by GFI
WHITE PAPER: This guide provides time-saving tips that IT admins at smalland mid-sized companies can use to stay on top of theirworkloads, keep systems running and protected, and maintaina healthy work/life balance.
Posted: 24 Nov 2014 | Published: 24 Nov 2014

GFI

Do I need a Firewall with my SBC?
sponsored by Sangoma Technologies
WHITE PAPER: This exclusive white paper takes an in-depth look at a UC security solution that was ablet to provide rock-solid VoIP security for all users. Read on to learn more.
Posted: 06 Nov 2014 | Published: 06 Nov 2014

Sangoma Technologies

The Service Innovation Mandate in Telecommunications
sponsored by CA Technologies.
WHITE PAPER: This paper provides an overview of the key strategies telecommunications companies can pursue in order to most fully capitalize on the opportunities afforded by APIs. Read on to learn more.
Posted: 11 Nov 2014 | Published: 31 Oct 2014

CA Technologies.

Integrated Network Security Architecture: Threat-focused Next-generation Firewall
sponsored by Cisco
WHITE PAPER: This exclusive whitepaper explores the need for an interoperable network security architecture to combat today's security threats.
Posted: 25 Nov 2014 | Published: 24 Sep 2014

Cisco

Post Breach Industry Report: A Real-world View of Ongoing Cyber Security Attacks
sponsored by Vectra Networks
WHITE PAPER: This informative report uses real-world data to reveal what attackers do within a network once they evade perimeter defenses.
Posted: 25 Nov 2014 | Published: 25 Nov 2014

Vectra Networks

Minimize Check Fraud and Counterfeited Print
sponsored by Hewlett-Packard Limited
WHITE PAPER: This white paper introduces a solution developed by HP and TROY to control check printing operations and help prevent fraud on finished checks, adding security to a variety of applications.
Posted: 10 Nov 2014 | Published: 31 Mar 2014

Hewlett-Packard Limited

IBM Endpoint Manager, Built on BigFix Technology
sponsored by IBM
WHITE PAPER: This exclusive whitepaper explores how you can take control of your heterogeneous computing devices with effective endpoint management.
Posted: 11 Nov 2014 | Published: 09 May 2012

IBM

2014 Cost of Cyber Crime Study
sponsored by Hewlett-Packard Company
WHITE PAPER: This exclusive whitepaper covers the results of a survey that analyzed the cost of cyber-crime.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

Hewlett-Packard Company
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement