IT Management  >   Systems Operations  >  

Closed Loop Security

RSS Feed    Add to Google    Add to My Yahoo!
Closed Loop Security Reports
 
The Realities of FedRAMP Continuous Monitoring and Penetration Testing Requirements
sponsored by Coalfire
WEBCAST: This webcast explores the requirements that CSPs must meet on monthly, quarterly and an annual basis. Find answers to common FedRAMP questions, solutions for complexities that continuous monitoring can present and lessons learned from the continuous monitoring portion of FedRAMP.
Posted: 26 Jan 2016 | Premiered: Sep 16, 2015

Coalfire

IDC: Securing Data in a Borderless Enterprise
sponsored by Vera
WHITE PAPER: Access this white paper and learn how you can set security and sharing policies for your data wherever it goes, set and change data-access rights in real time, control what people can and can't do with data, and more.
Posted: 25 Jan 2016 | Published: 08 Jul 2015

Vera

Big Data Security for Dummies
sponsored by Blue Coat Systems
WHITE PAPER: This white paper defines Big Data Security and its underlining security analytics and malware analysis technology.
Posted: 04 Feb 2016 | Published: 31 Dec 2015

Blue Coat Systems

Addressing the Full Attack Continuum Before, During, and After an Attack
sponsored by Cisco
WHITE PAPER: In this white paper, you will discover a new threat-centric security model that delivers visibility and control your business needs across its extended network.
Posted: 04 Feb 2016 | Published: 31 Dec 2014

Cisco

Smart Access Policies Are Key to Protecting Organizational Secrets
sponsored by Veritas
RESOURCE CENTER: In this article, you will learn how to restrict inappropriate access from hackers, malware and seemingly innocent attempts to use data services by unauthorized users.
Posted: 01 Feb 2016 | Published: 16 Dec 2015

Veritas

FedRAMP for SaaS
sponsored by Coalfire
WEBCAST: Watch this webcast to discover how FedRAMP can increase your confidence in the security of your cloud solutions.
Posted: 26 Jan 2016 | Premiered: Mar 18, 2015

Coalfire

Beware the Botnets: Botnets Correlated to a Higher Likelihood of a Significant Breach
sponsored by BitSight
WHITE PAPER: This white paper shows you the relationship between publicly disclosed data breaches and the factors that go into an organization's security rating.
Posted: 03 Feb 2016 | Published: 30 Apr 2015

BitSight

Prioritizing Security at management and board levels
sponsored by Cisco
WHITE PAPER: This white paper analyzes the IT security capabilities in the UK.
Posted: 08 Feb 2016 | Published: 31 Dec 2015

Cisco

Infographic: Safely Adopt Cloud Services Without Sacrificing Security
sponsored by F5 Networks
RESOURCE: In this infographic, learn some common by often overlooked risks that come with cloud application adoption. Additionally, explore the benefits of one security option that can mitigate these risks, including: ease users' password management, multi-factor authentication, and more.
Posted: 26 Jan 2016 | Published: 26 Jan 2016

F5 Networks

SANS- A Proactive Response to Incident Response
sponsored by Blue Coat Systems
WHITE PAPER: In this white paper, you will discover the keys to lowering IR costs and maximizing ROI, View now and learn how to increase your organization's security level by developing an IR process utilizing manual and basic forensics.
Posted: 29 Jan 2016 | Published: 31 Dec 2015

Blue Coat Systems
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement