IT Management  >   Systems Operations  >   Security  >  

Auditing (Computer Security)

RSS Feed    Add to Google    Add to My Yahoo!
Auditing (Computer Security) Reports
 
Cybersecurity: Turning Threat Data Into Threat Intelligence
sponsored by Farsight Security
WHITE PAPER: Learn how real-time DNS observations improve the accuracy and response time to cyberattacks and how to use passive DNS to escalate the discovery and accelerate the investigative timeline.
Posted: 08 May 2017 | Published: 08 May 2017

Farsight Security

Ensure the Right Solution for your RSA Data Protection Manager Migration
sponsored by Gemalto
WHITE PAPER: When looking to migrate your data protection manager (DPM), don't settle for re-packaged solutions that are not purpose built for your specific use case. This white paper details how to migrate your RSA DPM manager smoothly.
Posted: 15 Mar 2017 | Published: 15 Mar 2017

Gemalto

What Security Monster is Lurking in Your IT Closet?
sponsored by BDNA
WHITE PAPER: Learn how to build continuous awareness, monitoring, and mitigation of IT vulnerabilities with security automation.
Posted: 11 Apr 2017 | Published: 11 Apr 2017

BDNA

Turning GDPR Compliance into Data Security
sponsored by Commvault
WHITE PAPER: Discover how to lay a solid foundation for holistic information governance and mitigate the burden of GDPR compliance
Posted: 05 Jun 2017 | Published: 05 Jun 2017

Commvault

Your IIoT Security Plan: Risks in Manufacturing
sponsored by Bayshore Networks
EGUIDE: In this e-guide learn how to get smart about industrial IoT security risks in manufacturing, as well as how to map out an industrial IoT plan to create a smooth-running, smart factory.
Posted: 02 Jun 2017 | Published: 26 May 2017

Bayshore Networks

Is your IT Security Affecting your Workforce Productivity?
sponsored by Dell India
RESEARCH CONTENT: In this Forrester report discover if your IT security is affecting your workforce productivity. Learn how employee experience and security must go hand in hand, how enterprise endpoints are not secure, and more.
Posted: 05 Apr 2017 | Published: 05 Apr 2017

Dell India

Why Conventional MSSPs are No Longer Sufficient
sponsored by InteliSecure
EGUIDE: Learn how traditional, legacy managed security services are no longer holding up in this new era of next gen MSSPs.
Posted: 23 May 2017 | Published: 23 May 2017

InteliSecure

Your Guide to Combatting Ransomware's Domination of 2017
sponsored by CyberArk Software, Inc
EGUIDE: Learn how to boost your ransomware security awareness in this expert e-guide. Additionally, discover why ransomware continues to be a major threat and what ransomware prevention tools can help you win the battle.
Posted: 06 Jun 2017 | Published: 02 Jun 2017

CyberArk Software, Inc

See an Endpoint Security Vendor Put Through Their Paces
sponsored by Carbon Black
WHITE PAPER: In this report excerpt, discover how IDC research evaluated the capabilities of an endpoint security vendor and who the major players and leaders are in the endpoint security space.
Posted: 10 May 2017 | Published: 10 May 2017

Carbon Black

Application Development Security Requires Forethought
sponsored by tCell
EGUIDE: Learn how to define security requirements at the beginning, and what can be learned from the RASP approach in closing the gap left by application security testing.
Posted: 28 Mar 2017 | Published: 28 Mar 2017

tCell
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement