IT Management  >   Systems Operations  >  

Active Security Solutions

RSS Feed    Add to Google    Add to My Yahoo!
Active Security Solutions Reports
How Boston Properties Stays One Step Ahead of Advanced Threats
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Access this case study to discover how Boston Properties, a real estate company, found a security tool that could catch any cybersecurity threat, even unknown ones.
Posted: 12 Nov 2015 | Published: 12 Nov 2015

Check Point Software Technologies Ltd.

The Global Cost of Cyber Crime
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Discover the most salient findings of this enterprise security and intelligence study and learn what you can do to protect your organization.
Posted: 20 Nov 2015 | Published: 31 Oct 2015

Hewlett Packard Enterprise

When it Comes to File Sync-and-Share, Security is Vital
sponsored by Linoma Software
EGUIDE: This e-guide discusses 3 approaches to file sync-and-share strategies, and the security concerns associated. Access now to find out how you can share your files while remaining confident in their security.
Posted: 09 Nov 2015 | Published: 09 Nov 2015

Linoma Software

Top 10 Reasons to Strengthen Information Security with App and Desktop Virtualization
sponsored by Citrix
WHITE PAPER: Access this white to learn how desktop and app virtualization strategies are used to strengthen information security. You'll examine the challenges of maintaining information security in today's evolving enterprise environment and 10 benefits of using app and desktop virtualization for information security.
Posted: 13 Nov 2015 | Published: 30 Jan 2015


Securing Virtual Data Centers from Malware
sponsored by BitDefender
EGUIDE: Access this expert guide for tips on giving your virtual environment the level of security it needs.
Posted: 23 Nov 2015 | Published: 23 Nov 2015


Managing the Insider Threat with Active Directory Security
sponsored by Dell, Inc.
WHITE PAPER: This white paper discusses the dangers malicious actors pose to Active Directory and gives suggestions for AD security best practices.
Posted: 10 Nov 2015 | Published: 10 Nov 2015

Dell, Inc.

The Mobile Cloud: How Cloud Services Cast Dark Shadows on Mobile Activity
sponsored by IBM
WHITE PAPER: Access this article to learn how cloud app security brokers solutions (CASBs) are giving CISOs visibility into employee usage of cloud apps in the enterprise, as well as the benefits of integrating this technology with enterprise mobility management (EMM.)
Posted: 01 Dec 2015 | Published: 04 Nov 2015


Outrunning the Bear: 5 Critical Ways To Take a More Collaborative Approach To IT Security
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This white paper examines the challenges inhibiting faster threat response and suggests five critical steps organizations can take to turn security intelligence into action.
Posted: 12 Nov 2015 | Published: 29 May 2015

Hewlett Packard Enterprise

Orchestrating Enterprise Security in the Cloud
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Access this SANS survey report to learn how today's security professionals are responding to the challenges of the cloud.
Posted: 24 Nov 2015 | Published: 30 Sep 2015

Hewlett Packard Enterprise

Competing on Trust
sponsored by Unisys
RESOURCE: Access this blog post now uncover three steps to building trust and driving revenue.
Posted: 09 Nov 2015 | Published: 09 Mar 2015

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement