IT Management  >   Systems Operations  >  

Active Security Solutions

RSS Feed    Add to Google    Add to My Yahoo!
Active Security Solutions Reports
 
Implement a Proactive Strategy for Data Security
sponsored by IBM
WHITE PAPER: Access this white paper to learn the 5 key findings of a recent Forrester study that evaluated data security decision-making by security buyers and influencers, and what it means to engage in proactive data security and privacy efforts.
Posted: 10 Feb 2015 | Published: 30 Sep 2014

IBM

6 Risks Enterprises Face with a Fractured CCI Road Map
sponsored by NetScout Systems, Inc.
WHITE PAPER: Access this white paper to discover six major risks that enterprises face when dealing with a fractured or non- existent CCI road map.
Posted: 26 Feb 2015 | Published: 26 Feb 2015

NetScout Systems, Inc.

Top Enterprise Mobile Security Issues
sponsored by BlackBerry
WHITE PAPER: In this expert guide, Kathleen Richards and Robert Westervelt parse the results of an informative SearchSecurity.com survey that elucidates the mobile security issues continuing to mount in enterprises today.
Posted: 13 Feb 2015 | Published: 13 Feb 2015

BlackBerry

Internet of Things
sponsored by Axway
WHITE PAPER: The Internet of Things can be very beneficial, but security and privacy are crucial. Since the devices in the Internet of Things rely on APIs to communicate, the management of these APIs is also crucial. Access this white paper key to learn how to enable the Internet of Things through efficient API management implemented with speed and security.
Posted: 19 Feb 2015 | Published: 24 Sep 2013

Axway

Win the War on Cybercrime with Four Key Elements
sponsored by IBM
WHITE PAPER: The following white paper helps you stay ahead of cybercriminals by outlining the four key elements of fraud prevention.
Posted: 24 Feb 2015 | Published: 31 Dec 2013

IBM

Striking the Right Balance Between App Security and Usability
sponsored by CA Technologies.
WHITE PAPER: Access this informative white paper to discover how to balance mobile security with usability.
Posted: 23 Feb 2015 | Published: 23 Feb 2015

CA Technologies.

Whitelisting: Develop Advanced Malware Protection
sponsored by Viewfinity
EGUIDE: This guide gives you a rundown on how whitelisting can help your security and what you can do to implement it.
Posted: 17 Feb 2015 | Published: 17 Feb 2015

Viewfinity

7 Steps to Securing Healthcare Infrastructures Using a Cloud Security Plan
sponsored by NaviSite
WHITE PAPER: This resource outlines the 7 steps you need to follow in order to secure infrastructures using a cloud security plan. By adhering to the following seven-step plan, you can bank on a proven methodology for cost-effectively and securely leveraging cloud services.
Posted: 19 Feb 2015 | Published: 18 Feb 2015

NaviSite

Printers Can Do More than Ever – Including Invite Hacks
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper explores the key security risks presented by today's networked printer and offers an overview of some innovative solutions that address them.
Posted: 11 Feb 2015 | Published: 30 Sep 2014

Hewlett-Packard Company

Get Organized to Stop the Communications and Collaboration Infrastructure Civil War
sponsored by NetScout Systems, Inc.
ANALYST REPORT: View this Forrester report to learn why creating a comprehensive CCI road map is difficult for many IT organizations, as well as a checklist to help you achieve a unified CCI strategy.
Posted: 24 Feb 2015 | Published: 10 Nov 2014

NetScout Systems, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement