IT Management  >   Systems Operations  >  

Active Security Solutions

RSS Feed    Add to Google    Add to My Yahoo!
Active Security SolutionsReports
 
Unleashing Business Transformation Through Mobility: Next-Gen Enterprise Mobility
sponsored by BlackBerry
WHITE PAPER: Access this white paper to find out the best practices and guidelines for adapting to the evolution of enterprise mobility.
Posted: 19 Aug 2014 | Published: 19 Aug 2014

BlackBerry

Securing Your IT Infrastructure with SOC/NOC Collaboration
sponsored by Hewlett-Packard Company
WHITE PAPER: Get help seamlessly integrating log management into IT operations to effectively integrate SOC and NOC, empowering your organization to effectively manage your IT infrastructure while simultaneously ensuring its security.
Posted: 19 Aug 2014 | Published: 28 Sep 2012

Hewlett-Packard Company

Online Brand Infringement: Where Do You Start?
sponsored by DomainTools
WHITE PAPER: In this informative white paper, discover a new brand monitoring solution that can quickly identify and notify you of any domain registration that possibly infringes on your brand.
Posted: 28 Aug 2014 | Published: 28 Aug 2014

DomainTools

Understaffed And At Risk: Today’s IT Security Department
sponsored by HP and Intel
WHITE PAPER: This Ponemon study explores how organizations can most effectively hire and retain expert security staff in order to help achieve business goals.
Posted: 22 Aug 2014 | Published: 28 Feb 2014

HP and Intel

Finding the Security Balance for Virtual Environments
sponsored by Kaspersky Lab
WHITE PAPER: This in-depth white paper will help you identify the right security approach for your virtual environment that won't be a drain your system's performance.
Posted: 21 Aug 2014 | Published: 21 Aug 2014

Kaspersky Lab

Managed File Transfer: Business Users Need Visibility
sponsored by IBM
WHITE PAPER: End-users are striving to enable collaboration and integrate as many business processes as possible, and in our information-driven society, managed file transfer (MFT) is tied closely with achievement of critcal business objectives.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

IBM

Safety Through Synergy
sponsored by NEC Corporation of America
WHITE PAPER: Governments and city planners must be prepared for a wide variety of threats to public safety.  This makes IT Professionals realize just how important it really is to secure sensitive information.
Posted: 27 Aug 2014 | Published: 27 Aug 2014

NEC Corporation of America

Keep Your Endpoints Secure with Customizable Advanced Threat Protection
sponsored by Bit9 + Carbon Black
WHITE PAPER: This informative resource outlines a new approach to endpoint security that can provide your organization with real-time visibility and increased protection against modern cyber-attacks, including advanced persistent threats (APTs).
Posted: 25 Aug 2014 | Published: 25 Aug 2014

Bit9 + Carbon Black

The Impact of Data Breaches: Why Application Security is a Business Imperative
sponsored by Veracode, Inc.
WHITE PAPER: 64% of internally developed enterprise applications remain untested for security vulnerabilities. View this informative whitepaper now to learn the impact of security breaches, and the hurdles companies must overcome to develop apps with security as a priority.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

Veracode, Inc.

Automating and Securing Healthcare Information with Cloud-Based Fax Messaging
sponsored by OpenText
WHITE PAPER: Learn how this cloud-based fax messaging solution will secure patients' information at a low cost and meets federal regulations.
Posted: 19 Aug 2014 | Published: 31 Dec 2013

OpenText
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement