IT Management  >   Systems Operations  >  

Closed Loop Security

RSS Feed    Add to Google    Add to My Yahoo!
Closed Loop SecurityReports
 
Building Trust and Compliance in the Cloud with IntelĀ® Trusted Execution Technology
sponsored by Intel Corporation
WHITE PAPER: This white paper explores how Intel helped the Taiwan Stock Exchange Corporation to build a more secure foundation for its sensitive cloud workloads.
Posted: 17 Nov 2014 | Published: 31 Dec 2013

Intel Corporation

Best Practices to Enable Mobility without Sacrificing Security
sponsored by Citrix
WHITE PAPER: This exclusive white paper can help you understand mobility and its best practices for healthcare and other large organizations. Read on to learn more.
Posted: 17 Nov 2014 | Published: 17 Nov 2014

Citrix

PCI DSS Cloud Compliance Requirements
sponsored by SkyHigh
WHITE PAPER: This exclusive whitepaper serves as a cheat sheet to the ins-and-outs of the payment card industry data security standard.
Posted: 17 Nov 2014 | Published: 17 Nov 2014

SkyHigh

Making Risk Management More Effective with Security Ratings
sponsored by BitSight
WHITE PAPER: Download this exclusive whitepaper now to learn about three use cases that can help you identify, quantify, and mitigate risk throughout your environment.
Posted: 25 Nov 2014 | Published: 15 Apr 2014

BitSight

Protecting your Executives and Important Information from Risk
sponsored by Gemalto
WHITE PAPER: Check out this exclusive whitepaper for an overview of protecting executive-level information and uncover some ways to simplify management.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

Gemalto

Weighing Risk Against the Total Cost of a Data Breach
sponsored by Akamai Technologies
WHITE PAPER: This white paper provides an approach to determine the risk of web application cyber-attacks that could potentially affect your company.
Posted: 11 Nov 2014 | Published: 01 Aug 2014

Akamai Technologies

Mitigating User-Based Risks: Where Infrastructure Monitoring Falls Short, User-Based Monitoring Excels
sponsored by ObserveIT
WHITE PAPER: This white paper discusses the roles of trusted insiders versus outsiders in data breaches; identifying activities and intent when it comes to user-based threats; why user-based monitoring is a promising solution; and more.
Posted: 14 Nov 2014 | Published: 31 Oct 2014

ObserveIT

24/7 Visibility into Advanced Malware on Networks and Endpoints
sponsored by Tenable Network Security
WHITE PAPER: This white paper argues that containing the massive-scale security breaches that many high-profile organizations are experiencing requires a holistic approach that addresses vulnerabilities and threats at the network and system levels, and leverages threat intelligence to accurately identify attacks in progress.
Posted: 12 Nov 2014 | Published: 24 Oct 2014

Tenable Network Security

Identity and Access Governance Buyer's Guide
sponsored by Courion Corporation
WHITE PAPER: This Identity and Access Governance Buyer's Guide is designed to help you define requirements for an Identity and Access Governance solution for your enterprise.
Posted: 21 Nov 2014 | Published: 21 Nov 2014

Courion Corporation

The case for Privilege Management: 8 reasons why you need it
sponsored by AppSense
WHITE PAPER: Access this white paper to learn about 8 reasons why you should consider implementing a privilege management technology.
Posted: 19 Nov 2014 | Published: 19 Nov 2014

AppSense
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement