Software  >   Systems Software  >  

Auditing Software (Security)

RSS Feed    Add to Google    Add to My Yahoo!
Auditing Software (Security) Reports
 
Security Management 2.5: Replacing Your SIEM Yet?
sponsored by IBM
WHITE PAPER: This white paper will walk you through the process of evaluating, selecting, and deploying SIEM. Read on to learn if your current SIEM vendor is meeting your IT security needs and receive expert advice on how to get the job done.
Posted: 20 Mar 2014 | Published: 01 Feb 2014

IBM

A Guide to Cyber Risk
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Insurer Allianz Global Corporate & Specialty (AGCS) examines the latest trends in cyber risk and emerging perils around the globe.
Posted: 19 Jan 2016 | Published: 19 Jan 2016

ComputerWeekly.com

Winning security use cases in the Computer Weekly European 2014 Awards
sponsored by ComputerWeekly.com
CASE STUDY: Warwick Ashford presents five IT security case studies selected from the winners of Computer Weekly's European User Awards.
Posted: 17 Nov 2014 | Published: 17 Nov 2014

ComputerWeekly.com

Six Steps to SIEM Success
sponsored by AlienVault
WEBCAST: Tune in for this webcast to learn 6 practical steps every IT admin should take before embarking on a SIEM deployment.
Posted: 18 Jan 2016 | Premiered: Jan 6, 2016

AlienVault

Combating the Next Generation of Advanced Malware
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This white paper invites you to take a look beyond traditional network security measures. Read on and discover how a cloud-based sandbox with full system emulation can detect and block advanced malware and zero day attacks.
Posted: 18 Jan 2016 | Published: 18 Jan 2016

WatchGuard Technologies, Inc.

Mobile Malware Hits ActiveSynch-Only Devices
sponsored by MobileIron
WHITE PAPER: In this white paper, learn about four major threats to mobile device security, including: Stagefright, XcodeGhost, and 2 more. Additionally, learn how an enterprise mobility management provider can protect your business by detecting and mitigating threats to mobile devices.
Posted: 11 Feb 2016 | Published: 11 Feb 2016

MobileIron

Building confidence in data security
sponsored by ComputerWeekly.com
ANALYST REPORT: Businesses need to engage online with users from external organisations and mobile workers about data security. Analysts Bob Tarzey and Clive Longbottom explain why.
Posted: 12 Jan 2016 | Published: 12 Jan 2016

ComputerWeekly.com

IBM CIO Case Study: Fast and Easy Mobility Strategy Deployment
sponsored by Maas360 by IBM
CASE STUDY: This case study explains how the IBM CIO Office rapidly deployed a mobile device management strategy and on-boarded 15,000 devices in just one day. Read more to learn how one simple software solution can erase all of your worries about adopting a mobile strategy.
Posted: 19 Mar 2015 | Published: 28 Mar 2014

Maas360 by IBM

Join SafeNet Authentication Free Trial
sponsored by SafeNet Asia Ltd
TRIAL SOFTWARE: Experience low-maintenance and low-cost authorization controls by downloading your free 30-day trial of SafeNet Authentication Service, a cloud-based solution featuring token and self-service capabilities.
Posted: 10 Jan 2014 | Premiered: 10 Jan 2014

SafeNet Asia Ltd

Endpoint Security Technology
sponsored by Symantec Corporation
EGUIDE: Access this expert e-guide for a technical overview of endpoint protection software, and learn to evaluate various vendors through valuable insight on software's different capabilities in reducing security risks for business well-being.
Posted: 04 Nov 2013 | Published: 04 Nov 2013

Symantec Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement