IT Management  >   Systems Operations  >  

Systems Security

RSS Feed    Add to Google    Add to My Yahoo!
Systems SecurityWhite Papers (View All Report Types)
 
Enterprise Mobility & BYOD: Four Biggest Challenges— And How to Solve Them
sponsored by FrontRange Solutions Inc.
WHITE PAPER: Discover four key challenges associated with enterprise mobility and how to solve them usingthe most effective EMM solution.
Posted: 18 Jul 2014 | Published: 18 Jul 2014

FrontRange Solutions Inc.

Supporting Workforce Mobility: Best Practices in Enterprise Mobility Management
sponsored by FrontRange Solutions Inc.
WHITE PAPER: In this white paper, explore several best practises that should be implemented to support workforce mobility.
Posted: 24 Jul 2014 | Published: 31 Dec 2013

FrontRange Solutions Inc.

BlackBerry COBO: Ultimate Mobile Security and Control
sponsored by BlackBerry
WHITE PAPER: When security and control are of paramount concern a COBO option can provide optimal protection against data loss and strict compliance with regulatory requirements. Read this whitepaper if you want to know your high-security users are equipped with mobile computing and communications capabilities that meet your corporate-only requirements.
Posted: 30 Jul 2014 | Published: 30 Jul 2014

BlackBerry

Advanced Cyber Threats Demand a New Privileged Account Security Model
sponsored by Cyber-Ark Software
WHITE PAPER: In this ESG report, discover how to better protect your privileged accounts by embracing new centralized architectural solutions.
Posted: 30 Jul 2014 | Published: 29 Jun 2013

Cyber-Ark Software

Architecting for the Cloud: Best Practices
sponsored by Amazon Web Services
WHITE PAPER: This paper focuses in on concepts, principles and best practices in creating new cloud applications or migrating existing apps to the cloud. Discover how elasticity and other concepts have emerged due to the cloud's dynamic nature.
Posted: 18 Jul 2014 | Published: 30 Jan 2011


Introducing LogRhythm v6.2
sponsored by LogRhythm, Inc.
WHITE PAPER: Although security professionals do as much as they can to prevent error or risks, they must always be prepared for something to go wrong. Now they can with a powerful monitoring and auditing platform that keeps security personnel informed with an excellent investigatory tool.
Posted: 29 Jul 2014 | Published: 30 Apr 2014

LogRhythm, Inc.

A Secure Transition to iOS
sponsored by IBM
WHITE PAPER: Read this white paper to learn about a security solution that has a clean and intuitive interface with easy reporting and usage tracking for expense management.
Posted: 22 Jul 2014 | Published: 22 Jul 2014

IBM

It's Time for a Serious Talk: 3 Questions to Ask Your DNS Host about Lowering DDoS Risks
sponsored by Neustar®
WHITE PAPER: This white paper provides answers to three questions about DDoS attacks that you need to ask your DNS host before, not after, your company becomes a target.
Posted: 14 Jul 2014 | Published: 14 Jul 2014

Neustar®

Effective Security in a BYOD Environment: Arming Your Organization Against the Unknown
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Learn how to get ahead of threats and develop a pragmatic strategy to secure data and assets from malware and theft – without impeding the flexibility, agility and efficiency BYOD can deliver for your enterprise.
Posted: 21 Jul 2014 | Published: 15 Nov 2012

Dell, Inc. and Intel®

ROI and Benefits of a Cloud-Based Application Security Service
sponsored by Veracode, Inc.
WHITE PAPER: In this report from Forrester Research, Inc., discover the potential ROI you could achieve by deploying a cloud-based application security service. Explore the costs and risk of this technology, and weigh them with the benefits you could experience.
Posted: 24 Jul 2014 | Published: 24 Jul 2014

Veracode, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement