IT Management  >   Systems Operations  >  

Closed Loop Security

RSS Feed    Add to Google    Add to My Yahoo!
Closed Loop Security Reports
 
Five Security Concerns with Mobile Payment Systems
sponsored by Global Knowledge
WHITE PAPER: This white paper details the 5 security concerns you should keep in mind before linking your finances to a mobile payment solution.
Posted: 31 Mar 2015 | Published: 10 Mar 2015

Global Knowledge

Achieve offline VDI with no infrastructure costs
sponsored by 1e Inc
EGUIDE: In this informative e-guide, learn important tips to help avoid POS security breaches. Additionally, find out about client virtualization software from 1E that offers offline VDI without infrastructure costs, and how you can ditch unnecessary software licenses.
Posted: 30 Mar 2015 | Published: 30 Mar 2015

1e Inc

What Makes Two Security Programs Different?
sponsored by Prelert
WHITE PAPER: This blog post compares two anomaly detection programs and discussing their rate of false positives, ability to analyze multiple instances, and more.
Posted: 19 Mar 2015 | Published: 04 Nov 2013

Prelert

How to Improve Your Threat Intelligence
sponsored by Threatstream
WHITE PAPER: This white paper discusses those problems and how threat intelligence is evolving to fix them.
Posted: 18 Mar 2015 | Published: 01 Jan 2015

Threatstream

A10 Networks Joins the Cisco ACI Ecosystem
sponsored by Cisco Systems, Inc.
VIDEO: This video contains an interview between A10 Networks CTO, Raj Jalan, and Cisco Sr. Director, Shashi Kiran, in which they discuss a new application-centric infrastructure (ACI) solution.
Posted: 12 Mar 2015 | Premiered: 26 Jan 2015

Cisco Systems, Inc.

Choosing the Right Wi-Fi and APM Tools for Your Organization
sponsored by Extreme Networks
EGUIDE: Access this expert e-guide to discover the importance of strong Wi-Fi connectivity in healthcare—especially when it boils down to security and privacy.
Posted: 19 Mar 2015 | Published: 19 Mar 2015

Extreme Networks

Create a Business Case for Better Security
sponsored by FireEye
VIRTUAL TRADESHOW: The white paper presents tips for creating a persuasive business case for better security investment.
Posted: 30 Mar 2015 | Premiered: Dec 31, 2014

FireEye

Everbridge Case Study: Optimizing Network Security Management
sponsored by F5 Networks
WHITE PAPER: Read more to learn how you can boost your network security and efficiency while also cutting costs.
Posted: 23 Mar 2015 | Published: 23 Mar 2015

F5 Networks

Distilling Alert Noise to Find Real Problems
sponsored by Prelert
WHITE PAPER: Read this brief article to discover how anomaly detection programs can lower your rates of false positives and make security management much more efficient.
Posted: 24 Mar 2015 | Published: 04 Mar 2015

Prelert

Information security in the retail chain
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security Thesis Series looks at how automated distribution centres play a business-critical role in the retail supply chain, and any challenge to their continuous availability and the services they provide must be overcome.
Posted: 12 Mar 2015 | Published: 12 Mar 2015

ComputerWeekly.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement