IT Management  >   Systems Operations  >  

Active Security Solutions

RSS Feed    Add to Google    Add to My Yahoo!
Active Security SolutionsReports
 
HP Security Cyber Risk Report
sponsored by Hewlett-Packard Company
WHITE PAPER: This HP Security Cyber Risk Report provides industry-wide data on vulnerabilities in software, mobile, and web applications; examines how specific technologies like iOS, Android, and JAVA contribute to the attack surface; and more.
Posted: 19 Nov 2014 | Published: 31 Jan 2014

Hewlett-Packard Company

The Cloud Pillars: Five Foundational Building Blocks for Apps in the Cloud
sponsored by Rackspace
WHITE PAPER: This white paper explains the five pillars associated with cloud applications.
Posted: 13 Nov 2014 | Published: 13 Nov 2014

Rackspace

Enterprise Mobile Security Needs Shift from Devices to Data
sponsored by Symantec Corporation
EGUIDE: In this expert eguide, examine how the mobile security market has evolved in recent years, beginning with the first iPhone in June 2007.
Posted: 21 Nov 2014 | Published: 21 Nov 2014

Symantec Corporation

A Powerful Foundation for Virtual Environments and Cloud Computing Infrastructure
sponsored by Intel Corporation
WHITE PAPER: Access this white paper to learn how you can virtualize any workload and create a more flexible and secure data center and deliver advanced cloud computing functionality. Read on to find out how this approach allows you to strengthen security and compliance, reduce IT costs, and more.
Posted: 20 Nov 2014 | Published: 28 Feb 2013

Intel Corporation

Growing the Security Analyst
sponsored by Hewlett-Packard Company
WHITE PAPER: In the fight against cyber bad guys, having smart, skilled good guys is critical. But even as businesses increase their reliance on security analysts, they face a serious workforce shortage as they attempt the find and hire the talent needed. The solution: grow your own.
Posted: 20 Nov 2014 | Published: 20 Nov 2014

Hewlett-Packard Company

A Cheat Sheet for Comparing Cloud Encryption Schemes
sponsored by SkyHigh
WHITE PAPER: This cheat sheet provides an overview of cloud encryption schemes and their relative strengths and weaknesses.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

SkyHigh

Protecting your Executives and Important Information from Risk
sponsored by Gemalto
WHITE PAPER: Check out this exclusive whitepaper for an overview of protecting executive-level information and uncover some ways to simplify management.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

Gemalto

Endpoint Management for Data Centers - Under the Hood of a Data Center
sponsored by IBM
WHITE PAPER: Download this exclusive infographic to learn more about the current threat landscape and how you can improve security with effective endpoint management.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

IBM

PCI DSS Cloud Compliance Requirements
sponsored by SkyHigh
WHITE PAPER: This exclusive whitepaper serves as a cheat sheet to the ins-and-outs of the payment card industry data security standard.
Posted: 17 Nov 2014 | Published: 17 Nov 2014

SkyHigh

IBM Endpoint Manager, Built on BigFix Technology
sponsored by IBM
WHITE PAPER: This exclusive whitepaper explores how you can take control of your heterogeneous computing devices with effective endpoint management.
Posted: 11 Nov 2014 | Published: 09 May 2012

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement