Software  >   Systems Software  >  

Auditing Software (Security)

RSS Feed    Add to Google    Add to My Yahoo!
Auditing Software (Security)Reports
 
Security Management 2.5: Replacing Your SIEM Yet?
sponsored by IBM
WHITE PAPER: This white paper offers insight on the needs and requirements that security information and event management (SIEM) solutions should address. Read on to learn if your current SIEM vendor is enough, or if you should consider a replacement that better fits today's IT environment.
Posted: 20 Mar 2014 | Published: 01 Feb 2014

IBM

Securely Accelerate Your Mobile Business
sponsored by CA Technologies.
WHITE PAPER: This exclusive paper discusses how you can take an application- and data-centric approach to mobile security so you can balance business enablement with protection, all the while maintaining user privacy.
Posted: 11 Dec 2013 | Published: 11 Dec 2013

CA Technologies.

Best Practices for Improving Mobile Data Security
sponsored by SearchSecurity.com
EGUIDE: This expert guide from SearchConsumerization.com takes an in-depth look at mobile data security best practices, including creating a robust PIN or passcode, implementing anti-malware, understanding the top mobile risks and how to offset them, and much more.
Posted: 15 Jul 2013 | Published: 15 Jul 2013

SearchSecurity.com

Top Five Alternatives to Endpoint Antivirus Software
sponsored by Bit9 + Carbon Black
WHITE PAPER: In this in-depth Forrester report, discover the top 5 technologies that security professionals are using to replace outdated antivirus software.
Posted: 26 Aug 2014 | Published: 09 Jun 2014

Bit9 + Carbon Black

Symantec Managed Security: Integrating the Network and Endpoints
sponsored by Symantec Corporation
WHITE PAPER: In this informative white paper, discover a new threat protection platform that integrates security across the network and endpoint, while also providing critical context to detected attacks.
Posted: 26 Aug 2014 | Published: 26 Aug 2014

Symantec Corporation

Special report on EMC
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 12 page special report from Computer Weekly, updated for 2013, gives you the facts on EMC, its strategy, products and services and financial performance.
Posted: 04 Dec 2013 | Published: 04 Dec 2013

ComputerWeekly.com

Governance and Control of Privileged Identities to Reduce Risk
sponsored by CA Technologies.
WHITE PAPER: This resource outlines the top risks of governing privileged identities and shared accounts and details how an automated governance of privileged identities can help you overcome them. View now to learn more!
Posted: 22 Jul 2013 | Published: 28 Feb 2013

CA Technologies.

MDM for a Secure Mobile Workforce
sponsored by BlackBerry
EGUIDE: This expert guide from SearchSecurity.com provides an in-depth and highly topical review of current and near-future technologies, and deployment-tested implementation procedures that can help your organization secure your mobile workforce. Read on to learn more.
Posted: 18 Nov 2013 | Published: 18 Nov 2013

BlackBerry

Cloud Based Application Penetration Testing Trial
sponsored by iViZ
WHITE PAPER: Inside this resource, unveil your access code for a 15-day trial of a cloud-based application penetration testing solution that combines automated testing with manual validation to provide optimum security monitoring.
Posted: 19 Dec 2013 | Published: 19 Dec 2013

iViZ

Symantec Internet Security Threat Report
sponsored by Symantec Corporation
WHITE PAPER: This report reveals the latest information about today's top security vulnerabilities and threats – from targeted attacks and exploits to spam and phishing – to help you keep your organization safe. View now to learn more!
Posted: 23 Jul 2013 | Published: 30 Apr 2013

Symantec Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement