IT Management  >   Systems Operations  >  

Closed Loop Security

RSS Feed    Add to Google    Add to My Yahoo!
Closed Loop SecurityReports
 
RSA Web Threat Detection - Innovative and Effective Online Threat Detection
sponsored by RSA, The Security Division of EMC
WHITE PAPER: This white paper features a Web threat detection solution that uses business intelligence to better pinpoint and predict the anomalies, improving investigation and analysis of malicious behavior.
Posted: 08 Apr 2014 | Published: 31 Jan 2014

RSA, The Security Division of EMC

How to Consolidate Identities for Office 365 and Cloud Access
sponsored by Radiant Logic, Inc.
WEBCAST: This webcast offers top, simple recommendations on how to extend existing identity and access management strategies to the cloud.
Posted: 18 Apr 2014 | Premiered: Apr 18, 2014

Radiant Logic, Inc.

Data Privacy: Where Should I House My Data?
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper offers 6 top recommendations on how to keep your data protected in the cloud and compliant with varying regulatory mandates across country borders.
Posted: 17 Apr 2014 | Published: 17 Apr 2014

IntraLinks, Inc

Top 8 Secure Messaging Policy Best Practices
sponsored by TigerText, Inc.
WHITE PAPER: In this white paper, explore 8 valuable recommendations on how to develop a secure text messaging policy to ensure data security and compliance.
Posted: 17 Apr 2014 | Published: 31 Dec 2013

TigerText, Inc.

Prevent Data Leakage and Keep Business Users Happy
sponsored by BlackBerry
WHITE PAPER: Consult the following informative white paper to explore how device containerization solutions can improve productivity and reduce security risks without compromising user experience. Learn how to correctly select containerization solutions that best meet your unique requirements and much more.
Posted: 09 Apr 2014 | Published: 09 Apr 2014

BlackBerry

The future of digital forensics
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security series looks at the challenges investigators face when tackling the complexities of full disk encryption.
Posted: 10 Apr 2014 | Published: 10 Apr 2014

ComputerWeekly.com

Stock Yards Bank and Trust Makes Employees Productive and Keeps Data Secure
sponsored by Imprivata
WHITE PAPER: This case study features one large, trusted U.S. bank's experience with a simplified authentication solution that enabled increased productivity, compliance, and security levels.
Posted: 10 Apr 2014 | Published: 28 Feb 2010

Imprivata

Simplify and Consolidate Data Protection for Better Business Results
sponsored by IBM
WHITE PAPER: This white paper explores how IBM introduced a next-generation graphical user interface to provide advanced visualization, built-in analytics and integrated workflow automation features that leapfrog traditional backup user interfaces, and dramatically simplify backup administration.
Posted: 10 Apr 2014 | Published: 30 Jun 2013

IBM

Predictions 2014: Identity and Access Management
sponsored by IBM
ANALYST REPORT: This Gartner report reveals predictions for identity and access management (IAM) tools needed for 2014.
Posted: 17 Apr 2014 | Published: 26 Nov 2013

IBM

2013 RSA Archer GRC Summit: Key Findings
sponsored by RSA, The Security Division of EMC
WHITE PAPER: View this white paper for the top findings from the most recent RSA GRC (governance, risk, and compliance) Forum to learn which of the latest compliance and risk management trends you should consider for your own strategy.
Posted: 15 Apr 2014 | Published: 30 Sep 2013

RSA, The Security Division of EMC
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement