IT Management  >   Systems Operations  >   Security  >  

Audits

RSS Feed    Add to Google    Add to My Yahoo!
Audits Reports
 
How Data Privacy Laws Impact Cloud Adoption In The UK
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Learn the strengths of tokenization when applied to ensuring regulated data never leaves the domain or control of your organization, risking falling out of compliance with the law.
Posted: 23 Feb 2017 | Published: 31 Dec 2016

Symantec & Blue Coat Systems

Single Secure Credential to Access Facilities and IT Resources
sponsored by HID
WHITE PAPER: Securing your premises can be just as important as securing your network. Access this white paper to learn how your organization can improve their security posture with advanced identity and access management.
Posted: 22 Mar 2017 | Published: 22 Mar 2017

HID

Six Steps to a Better Security Strategy
sponsored by Armor
WHITE PAPER: In this Forrester report, discover 6 straightforward steps you can take immediately to start building a truly business-savvy security strategy.
Posted: 08 Mar 2017 | Published: 22 Jan 2016

Armor

Understanding the IoT Explosion and Its Impact on Enterprise Security
sponsored by Fortinet, Inc.
WHITE PAPER: Understanding and leveraging the explosive growth and innovation of the Internet of Things is vital if an organization is striving for success. But how do you take advantage of it without introducing security risks? Delve into the complexities of IoT including security, data management, trends, and more.
Posted: 16 Mar 2017 | Published: 16 Mar 2017

Fortinet, Inc.

Six Steps to Implementing a Risk-Based Security Approach
sponsored by Dell SecureWorks
WHITE PAPER: Let this white paper be your guide to implementing an effective, risk-based security approach. Learn how to identify the 6 key components needed to launch this type of approach, why it's effective at mitigating threats, and where you can customize the approach to provide maximum protection.
Posted: 07 Mar 2017 | Published: 07 Mar 2017

Dell SecureWorks

Why Threat Intelligence Matters to your Organization
sponsored by Recorded Future
WEBCAST: Gain an expert's viewpoint on what threat intelligence is, how it works and why it matters. Uncover how you can keep your information security teams stay ahead of cyberattacks.
Posted: 06 Mar 2017 | Premiered: Mar 6, 2017

Recorded Future

5 Ways to Securely Ensure Digital Business Success
sponsored by Entrust, Inc.
WHITE PAPER: Discover what the digital transformation means to you, how you can capitalize on it, and how to keep your data secure in a future where borderless networks like the cloud and the connectivity of the IoT are bringing us closer together every day.
Posted: 21 Mar 2017 | Published: 21 Mar 2017

Entrust, Inc.

Securing Your Amazon Web Services Environment
sponsored by Armor
WHITE PAPER: Learn how to make better-informed decisions about the security control options for AWS usage so you can choose the best combination of controls for your organization's situation and needs.
Posted: 09 Mar 2017 | Published: 09 Mar 2017

Armor

4 Essential Capabilities for Advanced Malware Protection
sponsored by Cisco Systems, Inc.
WHITE PAPER: Uncover the essential capabilities you need to deploy advanced malware protection, the key questions you should ask your vendor, and how to combat today's advanced malware attacks using a combination of 4 techniques.
Posted: 24 Feb 2017 | Published: 24 Feb 2017

Cisco Systems, Inc.

What Constitutes Effective Security Awareness Training?
sponsored by KnowBe4
WHITE PAPER: Learn how to create a comprehensive security training program to truly make your employees more security-aware. Proper training methods should not only engage your personnel, but also provide employees with continuous learning to reinforce strong security practices.
Posted: 12 Dec 2016 | Published: 30 Nov 2016

KnowBe4
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement