Software  >   Systems Software  >  

Auditing Software (Security)

RSS Feed    Add to Google    Add to My Yahoo!
Auditing Software (Security)Reports
 
C&J Energy: Going Public and Outgrowing Its Infrastructure
sponsored by Alert Logic
WHITE PAPER: This white paper describes how C&J Energy, an oilfield services firm, collaborated with Alert Logic in order to meet user needs and achieve SOX compliance quickly without compromising protected information or spending unnecessary time on installation and implementation.
Posted: 22 Oct 2014 | Published: 22 Oct 2014

Alert Logic

Power vs x86 Solitaire video
sponsored by IBM
VIDEO: This webcast compares X86 servers with the newer IBM Power system and notes the major differences. IBM Power servers lower costs by as much as 75%. You can redirect resources without needing additional servers. Power comes with an integrated security solution
Posted: 31 Oct 2014 | Premiered: 06 Jun 2013

IBM

How Would Self-Reset Password Solutions Impact Enterprises Around the World?
sponsored by Tools4ever
WHITE PAPER: This white paper explores the results of a survey on self-reset password solutions and the impact that they could have on IT helpdesks.
Posted: 08 Dec 2014 | Published: 08 Dec 2014


What can you do differently to guard against threats from rapidly evolving mobile malware?
sponsored by IBM
WHITE PAPER: This must-see white paper discusses the emerging and evolving risks associated with mobile computing and applications. Also inside, find insight to help you effectively address mobile vulnerabilities.
Posted: 05 Mar 2014 | Published: 31 Jan 2014

IBM

Winning security use cases in the Computer Weekly European 2014 Awards
sponsored by ComputerWeekly.com
CASE STUDY: Warwick Ashford presents five IT security case studies selected from the winners of Computer Weekly's European User Awards.
Posted: 17 Nov 2014 | Published: 17 Nov 2014

ComputerWeekly.com

Monitor and Protect Critical Web Applications with a Web Application Firewall
sponsored by Imperva
VIDEO: While the growth of business applications has grown, corporate resources have become more exposed to security threats. This resource takes a look at the growing risk of application attacks via SQL injection.
Posted: 19 Feb 2014 | Premiered: 19 Feb 2014

Imperva

Secure Managed File Transfers: How They Can Help Meet Compliance Regulations And Secure Your Data
sponsored by OpenText
WHITE PAPER: In this technical guide, gain expert insight on managed file transfer (MFT) systems, which help in meeting increased demands for security, compliance, and other operations, and why it should be your sole means for transmitting data within and outside of your organization.
Posted: 30 Oct 2013 | Published: 30 Oct 2013

OpenText

Webroot Projects Appleby as it Grows into the Largest Offshore Law Firm in the World
sponsored by Webroot
CASE STUDY: This case study describes how the leading offshore law firm Appleby Global leveraged the right security service in order to overcome the security challenges introduced by business growth – including web policy inconsistency, managerial complexity, and more.
Posted: 02 Aug 2013 | Published: 02 Aug 2013

Webroot

Taking your enterprise mobile:  Executive checklist
sponsored by Citrix
WHITE PAPER: This exclusive paper discusses a mobile computing solution that delivers the real-time defense your organization needs to capture the business opportunities that mobile business brings while safeguarding critical and sensitive information. Read on for a helpful checklist to determine how this solution can bring to your environment.
Posted: 02 Jan 2014 | Published: 02 Jan 2014

Citrix

Endpoint Security IT Decision Center Handbook 3
sponsored by SearchSecurity.com
EGUIDE: Access this expert handbook for 6 questions to ask about your next endpoint security software solution and its ability integrate into your environment.
Posted: 26 Nov 2013 | Published: 26 Nov 2013

SearchSecurity.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement