IT Management  >   Systems Operations  >  

Closed Loop Security

RSS Feed    Add to Google    Add to My Yahoo!
Closed Loop SecurityReports
 
Five Must-Haves for Enterprise File Sync and Share Flexibility
sponsored by Code42
WHITE PAPER: This is why it's vital to have an enterprise-grade sync and share solution in place, but what constitutes enterprise grade? Read this whitepaper for five must-haves for enterprise sync and share flexibility.
Posted: 13 Oct 2014 | Published: 13 Oct 2014

Code42

Information-Driven Security through RSA Security Analytics 10.4 and RSA ECAT 4.0
sponsored by RSA, The Security Division of EMC
VIDEO: Learn what CISOs can do to better protect their organizations from security breaches, and why a Big Data security analytics architecture is necessary for threat detection and response.
Posted: 23 Oct 2014 | Premiered: 23 Oct 2014

RSA, The Security Division of EMC

Cloud-Managed Mobility Platform for Education
sponsored by Aerohive Networks
WHITE PAPER: This white paper outlines the major trends impacting the education sector surrounding mobile devices and modernised infrastructures.
Posted: 10 Oct 2014 | Published: 10 Oct 2014

Aerohive Networks

Take Authentication Beyond Passwords with Secure Remote Access
sponsored by HID
VIDEO: This short video describes how you can take authentication beyond passwords with HID Global's ActivID® authentication solutions, which provide secure remote access supporting the latest tablet and mobile devices.
Posted: 20 Oct 2014 | Premiered: 20 Oct 2014

HID

Taming Shadow IT
sponsored by BitGlass
WHITE PAPER: This white paper offers an in-depth guide book to IT security in regards to cloud computing and applications.
Posted: 21 Oct 2014 | Published: 21 Oct 2014


Computer Weekly – 28 October 2014: Securing critical industrial systems
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine the security threats to the industrial control systems that power the UK's critical national infrastructure. We look at the key considerations when choosing an infrastructure as a service supplier. And we compare six of the top hybrid flash array products. Read the issue now.
Posted: 24 Oct 2014 | Published: 24 Oct 2014

ComputerWeekly.com

It is Critical to Become an IdP to Mitigate New Security Risks
sponsored by SecureAuth
WHITE PAPER: This white paper addresses the reasons enterprises should become Identity Providers (IdPs), what becoming an IdP involves, and why you should consider automating this process as much as possible.
Posted: 24 Oct 2014 | Published: 24 Oct 2014

SecureAuth

Computer Weekly – 14 October 2014: Why has HP split?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, HP has announced plans to split in two – we look at the reasons and assess the future prospects for the IT giant. We examine the best practice in security policy to support a bring your own device (BYOD) scheme. And we find out how one company moved its entire datacentre from Berlin to London. Read the issue now.
Posted: 10 Oct 2014 | Published: 10 Oct 2014

ComputerWeekly.com

Your Data has Left the Building; What are You Doing to Protect it?
sponsored by Code42
WEBCAST: This webcast focuses on enabling mobile workforce productivity without putting your organization at risk. Learn more about this backup solution.
Posted: 14 Oct 2014 | Premiered: Oct 14, 2014

Code42

What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware?
sponsored by IBM
WHITE PAPER: Mobile security is about more than the device: It's also about protecting apps on the device. Learn how IBM can help.
Posted: 09 Oct 2014 | Published: 31 Jan 2014

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement