IT Management  >   Systems Operations  >  

Systems Security

RSS Feed    Add to Google    Add to My Yahoo!
Systems Security White Papers (View All Report Types)
 
Protect Your Fleet With Simple, Policy-Based Print Security
sponsored by Hewlett-Packard Limited
WHITE PAPER: This white paper explains the importance of securing your printing and imaging environment, and introduces a streamlined, policy-based approach to securing these devices before a data breach occurs.
Posted: 22 Jan 2015 | Published: 31 Oct 2014

Hewlett-Packard Limited

The Enemy Within: Why Insiders Are Still the Weakest Link in Your Data Security Chain
sponsored by Absolute Software
WHITE PAPER: This white paper describes the 5 steps that your enterprise needs to take in order to foster a conscientious data security environment within your enterprise, despite the challenges of the digital era.
Posted: 21 Jan 2015 | Published: 29 Dec 2014

Absolute Software

Point of Sale (POS) Systems and Security
sponsored by Bit9 + Carbon Black
WHITE PAPER: This white paper explains why organizations need more than the PCI DSS compliance stamp in order to truly secure their POS systems; describes how to secure your POS systems against common attacks; and discusses the Council on CyberSecurity's top 20 suggestions for protecting payment card information.
Posted: 16 Jan 2015 | Published: 31 Oct 2014

Bit9 + Carbon Black

Content Management 101: Secure and Efficient Document Printing
sponsored by Hewlett-Packard Limited
WHITE PAPER: This exclusive resource takes an in-depth look at how legacy printing strategies are no longer safe and why it may be time to modernize your printing infrastructure. Read on to learn more.
Posted: 27 Jan 2015 | Published: 27 Jan 2015

Hewlett-Packard Limited

Six Areas Where Citrix XenApp Outperforms VMware Horizon Apps
sponsored by Citrix
WHITE PAPER: In this white paper, explore an application virtualization strategy that includes the capabilities organizations need for full mobile productivity and how any strategy you choose should take into consideration the end-user and IT.
Posted: 02 Jan 2015 | Published: 28 Nov 2014

Citrix

Securing the Future of Trust on the Internet
sponsored by Symantec Corporation
WHITE PAPER: This white paper explains why public key infrastructure (PKI) is the key to the future of trust on the Internet, and the steps that must be taken to build a stronger, more trustworthy PKI ecosystem.
Posted: 20 Jan 2015 | Published: 28 Feb 2014

Symantec Corporation

Reliable, Secure, and Direct Cloud Access Is Attainable
sponsored by Equinix
WHITE PAPER: View this resource to learn how the Equinix Cloud Exchange brings together cloud service providers and users, and enables private virtual connections for direct cloud access.
Posted: 26 Dec 2014 | Published: 26 Dec 2014

Equinix

Key MDM Features That Affect Mobile Security Management
sponsored by BlackBerry
WHITE PAPER: In this e-guide, learn about the factors that are most important to address while crafting or updating your mobile security policy. Additionally, discover the top tips that IT can use to help get managers involved in supporting a BYOD program, including regular communication, inducting managers into the program first, and more.
Posted: 20 Jan 2015 | Published: 20 Jan 2015

BlackBerry

Why You Need a Next-Generation Firewall
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper explores the reasons why enterprises benefit from implementing next-generation firewalls (NGFWs) and lays out a path to success.
Posted: 27 Jan 2015 | Published: 27 Jan 2015

Hewlett-Packard Company

A Quick Guide to SSL for Apps
sponsored by Symantec Corporation
WHITE PAPER: This white paper lists the steps that your enterprise needs to take in order to create a stronger, more trustworthy SSL implementation.
Posted: 20 Jan 2015 | Published: 28 Feb 2014

Symantec Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement