IT Management  >   Systems Operations  >  

Closed Loop Security

RSS Feed    Add to Google    Add to My Yahoo!
Closed Loop SecurityReports
 
Data Breaches in Europe
sponsored by ComputerWeekly.com
RESEARCH CONTENT: The personal data of millions of Europeans have been compromised with 89% of the breaches the fault of corporations, according to this investigation by the Central European University.
Posted: 14 Oct 2014 | Published: 14 Oct 2014

ComputerWeekly.com

How to Manage Data Security and Compliance Within an Enterprise
sponsored by IBM
WHITE PAPER: This white paper introduces a data security solution that puts an end to potential hackers and privileged insiders by eliminating unauthorized activity.
Posted: 07 Oct 2014 | Published: 31 Oct 2013

IBM

Watering Hole Attacks: Detect End-User Compromise Before the Damage is Done
sponsored by AlienVault
WEBCAST: This exclusive webcast covers a unified security management platform that will protect your end-users from watering hole attacks.
Posted: 08 Oct 2014 | Premiered: Oct 8, 2014

AlienVault

The Definitive Guide to Managing Cloud Security
sponsored by Cisco & Fujitsu
BOOK: This helpful book serves as a clear and unbiased guide to navigating the complexities of cloud security.
Posted: 17 Oct 2014 | Published: 17 Oct 2014

Cisco & Fujitsu

Weighing Risk Against the Total Cost of a Data Breach: Can You Afford a Web Application Layer Attack?
sponsored by Akamai Technologies
WHITE PAPER: This white paper presents a proven, industry-standard approach to determining a company's risk of web application cyber-attacks. The provided equation can help you justify the cost of proactively deploying cybersecurity products and services to protect against web application attacks, including those that could lead to data breaches.
Posted: 08 Oct 2014 | Published: 08 Oct 2014

Akamai Technologies

Five Critical Steps to Achieving an Effective Application Security Program
sponsored by IBM
WHITE PAPER: Discover steps you can incorporate into every phase of the development process to improve your application security, and get an overview of application threats and the types of risks to prioritize and remediate.
Posted: 08 Oct 2014 | Published: 31 Dec 2013

IBM

10 Things Every IT Manager Must Know About the Enemy Within
sponsored by Clearswift
WHITE PAPER: This white paper contains critical information on where insider threats originate and explores one company's innovative tools for preventing data breaches within your enterprise.
Posted: 16 Oct 2014 | Published: 16 Oct 2014

Clearswift

Improve Intrusion Detection with Effective Threat Management
sponsored by Alert Logic
CASE STUDY: This exclusive case study explores the threat management solution one organization chose to improve their intrusion detection.
Posted: 20 Oct 2014 | Published: 20 Oct 2014

Alert Logic

5 New Laws of Antimalware Protection: Keep Up with Evolving Threats
sponsored by Cisco Systems, Inc.
WHITE PAPER: This exclusive whitepaper offers up five new laws you must know in order to protect your organization from ever-evolving malware threats.
Posted: 15 Oct 2014 | Published: 15 Oct 2014

Cisco Systems, Inc.

Shavlik Protect: Everything You Need to Patch the OS, VMware and Third-Party Applications
sponsored by Shavlik Technologies
WHITE PAPER: This exclusive whitepaper explores a patching solution that can keep every Windows machine in your organization current with the latest software.
Posted: 14 Oct 2014 | Published: 14 Oct 2014

Shavlik Technologies
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement