IT Management  >   Systems Operations  >  

Active Security Solutions

RSS Feed    Add to Google    Add to My Yahoo!
Active Security Solutions Reports
 
Network Based Security Infographic
sponsored by Level 3 Communications, Inc.
RESOURCE: To stop network threats, you first have to see them coming. Access this infographic that explains how implementing a network-based security platform, that provides full protection by wrapping your data, applications and infrastructure in a continuous cycle of protection, stops even the most sophisticated attacks.
Posted: 08 Jul 2016 | Published: 01 Jun 2016

Level 3 Communications, Inc.

Pairing SuccesFactors with a HCM Suite to Introduce Innovation to HR Operations
sponsored by Accenture
WHITE PAPER: Explore how SAP SuccessFactors users can leverage a modern HCM suite to enhance productivity, reduce costs, improve HR operations, transfer data sets securely between systems in the cloud, and more.
Posted: 13 Jul 2016 | Published: 31 Dec 2015

Accenture

A CISO’s Guide to Mobile Threat Prevention
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Discover the 5 major threats to mobile security, an in-depth analysis of their methods, best practices to prevent them, and how to stop mobile attacks before they start.
Posted: 13 Jul 2016 | Published: 13 Jul 2016

Check Point Software Technologies Ltd.

5 Steps to Implement and Maintain PCI DSS Compliance
sponsored by AlienVault
RESOURCE: In this resource you'll find an easy to follow guide for success when it comes to the troubles Payment Card Industry Data Security Standards can cause your enterprise.
Posted: 26 Jul 2016 | Published: 26 Jul 2016

AlienVault

5 Foundations For Managing Encrypted Traffic
sponsored by Blue Coat Systems
RESOURCE: Discover the top 5 things that your enterprise can leverage when managing encrypted traffic. Uncover hidden benefits for sites that use encryption with SSL/TLS, how to expose unseen malware, and more.
Posted: 21 Jul 2016 | Published: 21 Jul 2016

Blue Coat Systems

5 Benefits of Building Apps for Healthcare
sponsored by CloudMine
RESOURCE: In this infographic, discover 5 benefits of building applications for healthcare, including secure and HIPAA compliant communication, increased interoperability, and more.
Posted: 28 Jun 2016 | Published: 28 Jun 2016


Improving Passwords is Critical to Modern Security
sponsored by Verizon
VIDEO: Discover how hackers gain access to your networks using password vulnerabilities. In this short video you'll find out how to begin improving your defenses based on this prevalent, but easily manageable, vulnerability.
Posted: 27 Jun 2016 | Premiered: 04 May 2016

Verizon

A letter from the CEO: Connected Health Cloud Release
sponsored by CloudMine
WHITE PAPER: If you've been struggling to derive meaningful data insights, now you can with a HIPAA-compliant cloud solution that won't break the bank. It connects with big-data analytics platforms to help you gain a better understanding of patient data and take action to improve outcomes (all with impeccable threat detection capabilities).
Posted: 28 Jun 2016 | Published: 01 Mar 2016


Survey Results: Wireless Security Trends
sponsored by Fortinet, Inc.
WHITE PAPER: Over half of 1,300 surveyed IT decision-makers revealed their preference for cloud-based wireless network management. Explore how to enable the segmentation of devices and access layers across wired/wireless networks.
Posted: 23 Jun 2016 | Published: 23 Jun 2016

Fortinet, Inc.

Sandbox Technology: Building an Effective Breach Detection and Response Strategy
sponsored by Fortinet, Inc.
WHITE PAPER: Security professionals need to detect threats and manage risks to avoid data breaches. Discover why sandboxing is an essential component of a comprehensive prevention, detection, and response strategy to mitigate future attacks.
Posted: 23 Jun 2016 | Published: 30 Oct 2015

Fortinet, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement