IT Management  >   Systems Operations  >  

Closed Loop Security

RSS Feed    Add to Google    Add to My Yahoo!
Closed Loop Security Reports
5 Steps to Migrate Your Applications to the Cloud Stress Free
sponsored by Commvault
WHITE PAPER: In this white paper, you'll find a five-step process for securely migrating your applications to the cloud and keeping them secure once they're there.
Posted: 29 Sep 2015 | Published: 29 Sep 2015


Vulnerability Remediation: If you Ranked It, You Should Have Put a Patch on It
sponsored by WhiteHat Security
WEBCAST: Access this webcast now for an in-depth review of the various web security vulnerabilities you need to protect yourself from, and also discover a step-by-step guide for remediating these threats. View it now to uncover the truth about web security.
Posted: 01 Oct 2015 | Premiered: Apr 13, 2015

WhiteHat Security

What to Look for in Vulnerability Management
sponsored by
EBOOK: This Buyer's Essentials guides InfoSec pros in the assessment and purchase of vulnerability management tools. It explains how they work and highlights key features corporate buyers should look for.
Posted: 07 Oct 2015 | Published: 07 Oct 2015

TOPICS:  Security

2015 Gartner Magic Quadrant for Web App Firewall
sponsored by Imperva
WHITE PAPER: Imperva, a leading provider of cyber security solutions is once again the only leader in Gartner's Magic Quadrant for Web Application Firewall. Access the report to find out why.
Posted: 06 Oct 2015 | Published: 15 Jul 2015


PCI 3.0: Top 10 Ways PCI 3.0 Will Affect Your Application Security Program
sponsored by WhiteHat Security
WEBCAST: This recording of a live webcast provides a detailed description about how the newest PCI requirements will affect your application security program.
Posted: 01 Oct 2015 | Premiered: Dec 31, 2013

WhiteHat Security

Special Report: Threat Intelligence in Late 2015
sponsored by IBM
WHITE PAPER: This quarterly threat intelligence report reveals the newest developments in cybercrime, helping you know which threats to look out for.
Posted: 13 Oct 2015 | Published: 31 Aug 2015


Case Study: Oxford University Hospitals Cuts Waste with Single Sign-On
sponsored by Imprivata
WHITE PAPER: Access this case study to discover how Oxford University Hospitals sped up the process of secure EPR access, cutting out waste and freeing up more time for patient care.
Posted: 25 Sep 2015 | Published: 31 Dec 2014


Data Protection and Business Continuity in a Mobile World: A Guide for SMBs
sponsored by Hewlett-Packard Company
WHITE PAPER: This report discusses the specific security challenges that face SMBs and gives advice for how they can keep their data secure with the resources they have.
Posted: 30 Sep 2015 | Published: 30 Jun 2015

Hewlett-Packard Company

Social Threat Intelligence: A New Way to Stay Ahead of Hackers
sponsored by Threatstream
PODCAST: This podcast explores social threat intelligence, a new approach to threat intelligence that enables you to share threat information with other businesses in real time.
Posted: 25 Sep 2015 | Premiered: Jun 15, 2015


10 Features Every Web Application Firewall Should Provide
sponsored by Imperva
WHITE PAPER: This paper explains in detail the 10 features that every Web application firewall must provide.
Posted: 01 Oct 2015 | Published: 01 Oct 2015

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement