Software  >   Systems Software  >  

Auditing Software (Security)

RSS Feed    Add to Google    Add to My Yahoo!
Auditing Software (Security) Reports
 
Anti-Exploit Tools: The Next Wave of Enterprise Security
sponsored by Malwarebytes Corporation
WHITE PAPER: In this white paper, discover the shortcomings of traditional preventative security approaches and what you can do to move beyond them.
Posted: 01 May 2015 | Published: 01 May 2015


Microsoft Office 365: Strengthening Security, Compliance, and Control
sponsored by Mimecast
WHITE PAPER: This white paper discusses how third party enhancements focused on security, archiving, and encryption can provide more capable, granular services than Microsoft offers in Office 365.
Posted: 12 Jun 2014 | Published: 20 Feb 2014

Mimecast

Detecting Mobile App Security Gaps
sponsored by IBM
PRODUCT DEMO: Access this resource today for your free download of IBM's Security AppScan Mobile Analyzer to detect any gaps in your app mobile app security.
Posted: 24 Feb 2015 | Premiered: 04 Feb 2015

IBM

What's Missing from Your BYOD Strategy?
sponsored by Citrix
WHITE PAPER: Access this white paper to discover why moving beyond MDM and adopting an enterprise mobility management (EMM) solution is the key to properly handling mobility.
Posted: 21 Apr 2015 | Published: 27 Mar 2015

Citrix

Using Intrusion Detection Systems for Improving ROI
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, discover how a strong IDS not only enhances your security, but also builds up your ROI.
Posted: 14 May 2015 | Published: 14 May 2015

Hewlett-Packard Company

Winning security use cases in the Computer Weekly European 2014 Awards
sponsored by ComputerWeekly.com
CASE STUDY: Warwick Ashford presents five IT security case studies selected from the winners of Computer Weekly's European User Awards.
Posted: 17 Nov 2014 | Published: 17 Nov 2014

ComputerWeekly.com

Mitigating the cyber threat from malicious insiders
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security Thesis Series provides an examination of a malicious insider attack as a sequence of phases and a practical 10-step programme for mitigating the threat.
Posted: 12 Mar 2015 | Published: 12 Mar 2015

ComputerWeekly.com

Cisco 2015 Annual Security Report
sponsored by Cisco Systems, Inc.
WHITE PAPER: Access this white paper to read the Cisco 2015 annual report and discover research, insights, and techniques straight from security experts that can protect your business.
Posted: 09 Feb 2015 | Published: 09 Feb 2015

Cisco Systems, Inc.

Manage Data Security and Application Threats with a Multi-Tiered Approach
sponsored by IBM
WHITE PAPER: This resource introduces a portfolio of security tools that work together to provide the layered, multi-tier data and application protection that you're looking for.
Posted: 05 Mar 2014 | Published: 31 Jan 2014

IBM

Webroot SecureAnywhere Business Endpoint Protection vs. Seven Competitors (February 2014)
sponsored by Webroot
WHITE PAPER: This resource outlines testing results of 8 competing endpoint security software products and breaks down how each perform in relation to a wide variety of criteria.
Posted: 18 Apr 2014 | Published: 28 Feb 2014

Webroot
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement