IT Management  >   Systems Operations  >  

Closed Loop Security

RSS Feed    Add to Google    Add to My Yahoo!
Closed Loop Security Reports
 
Unified Network Solutions Case Study: Kettering Health Network
sponsored by F5 Networks
WHITE PAPER: This white paper demonstrates how the KHN was able to achieve access to its electronic medical records system and other apps for its remote users. Read on here to key into the benefits of a unified network solution.
Posted: 27 Aug 2015 | Published: 27 Aug 2015

F5 Networks

Authentication That Keeps Your Mobile Devices Secure
sponsored by HID
WHITE PAPER: This white paper introduces a way for you to boost mobile security by enhancing your authentication practices.
Posted: 18 Aug 2015 | Published: 20 Feb 2013

HID

Steer Your Enterprise Towards Smooth Mobility
sponsored by SafeNet, Inc.
WHITE PAPER: This white paper weighs the benefits of securely adopting enterprise mobility and the potential roadblocks of doing so. Read on to learn more about secure enterprise mobility and its potential to impact every facet of your organization, from VPN to VDI.
Posted: 19 Aug 2015 | Published: 19 Aug 2015

SafeNet, Inc.

Insider Threat Report 2015
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This survey of 500 cyber security professionals offers insight into the state of insider threats and solutions to prevent them.
Posted: 18 Aug 2015 | Published: 18 Aug 2015

ComputerWeekly.com

Understanding Zero-Day Attacks and Gaining Control
sponsored by Malwarebytes Corporation
WEBCAST: This webcast discusses specific ways to address zero-day risks and fight exploit attempts.
Posted: 17 Aug 2015 | Premiered: Jul 31, 2015


A guide to multi-layered web security
sponsored by Akamai
ESSENTIAL GUIDE: This essential guide details threats common to websites and web applications and what you can do to mitigate them. Read on to learn more.
Posted: 18 Aug 2015 | Published: 31 Dec 2014

Akamai

What You Need to Know Now About Next Generation Data Protection Architecture
sponsored by arcserve
WHITE PAPER: This white paper walks you through the driving forces behind rapidly evolving data protection architectures, the trends you'll want to keep an eye on, and more.
Posted: 19 Aug 2015 | Published: 19 Aug 2015

arcserve

Protecting Data on the Go
sponsored by SearchSecurity.com
EBOOK: This guide informs InfoSec pros on the risks to business data carried on or accessed by employees' mobile devices and the best available protections for this business data on the go.
Posted: 18 Aug 2015 | Published: 18 Aug 2015

SearchSecurity.com

AWS Partner Webcast - Use AWS CloudTrail Data and Splunk Software to Improve Security and Compliance
sponsored by Splunk
WEBCAST: Watch this webcast to learn how you can use AWS CloudTrail Data and Splunk Software to improve security and compliance in your AWS environment.
Posted: 21 Aug 2015 | Premiered: May 23, 2014

Splunk

Case Study: Rethinking Endpoint Security
sponsored by Malwarebytes Corporation
WHITE PAPER: This case study tells of how Sun Products, a leading provider of household products, rethought its endpoint security strategy to better fight malware.
Posted: 31 Aug 2015 | Published: 31 Aug 2015

 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement