IT Management  >   Systems Operations  >   Security  >  

Computer Security Management

RSS Feed    Add to Google    Add to My Yahoo!
Computer Security Management Reports
 
Cyber Liability: Risks, Ramifications, and Mitigation
sponsored by eSentire
WHITE PAPER: Find out how you can better defend your organization against external attack and limit exposure by reducing your attack profile available to attackers by accessing this resource.
Posted: 13 Apr 2016 | Published: 31 Dec 2015

eSentire

Business Continuity, Disaster Recovery Plan Best Practices
sponsored by Cirrity
EGUIDE: This brief e-guide highlights best practices for implementing a successful disaster recovery (DR) and business continuity (BC) plan. Discover Andre Gold's, head of IT operations and security for AutoTrader.com, tips for DR planning and learn from security expert Mike Rothman about the differences between BC planning and operational risk management.
Posted: 06 Apr 2016 | Published: 01 Apr 2016

Cirrity

5 Tips for Managing Guest Wireless Network Access
sponsored by Rogers Communications, Inc.
EGUIDE: In this e-guide, you'll learn about 5 key considerations when setting up a network access policy for guests including, operational specifications, splash-page agreement and 3 more.
Posted: 18 Mar 2016 | Published: 15 Mar 2016

Rogers Communications, Inc.

Fraud Protection Doesn't have to be an uphill battle
sponsored by IBM
WHITE PAPER: This white paper shows you how you may reduce the time and cost of fraud protection while helping make your customers' transactions safer. Learn about highly effective intelligence and evidence-based fraud detection with fewer false positive.
Posted: 26 Apr 2016 | Published: 01 Mar 2016

IBM

Make Micro-segmentation Work for Your Network: A Collection of Customer Stories
sponsored by VMware, Inc.
CASE STUDY: Read now to discover how organizations have used micro-segmentation – a breakthrough model for data center security – to improve network security, agility, and flexibility.
Posted: 11 Apr 2016 | Published: 31 Jul 2015

VMware, Inc.

Enhancing Security and System Functionality with the Cloud
sponsored by Splunk
CASE STUDY: This case study explores how a marketing company leveraged a cloud service to protect their systems from potential brute force attacks, while lowering tens of thousands in operational costs and reducing time resolution for errors.
Posted: 07 Apr 2016 | Published: 07 Apr 2016

Splunk

Cybersecurity and Data Theft Prevention
sponsored by Forcepoint
WHITE PAPER: This white paper provides a non-technical overview on cybersecurity and provides topics that every CEO should consider. Learn how to identify the critical data at the heart of your organization and conduct an in-depth assessment of your current security posture.
Posted: 28 Apr 2016 | Published: 01 Mar 2016

Forcepoint

A Guide to Corporate Social Media Security
sponsored by Proofpoint, Inc.
WHITE PAPER: This white paper helps you understand this new kind of attack and develop a plan to protect your organization's reputation.
Posted: 25 Apr 2016 | Published: 01 Mar 2016

Proofpoint, Inc.

How Healthcare Organizations Both Enable Mobile Users and Stay Compliant
sponsored by BlackBerry
WHITE PAPER: Discover how to stay HIPAA compliant even when mobile devices come into play. Read on to uncover insight for securing your enterprise and BYOD to protect sensitive data, and learn about containerization, application-wrapping, and more.
Posted: 21 Apr 2016 | Published: 21 Apr 2016

BlackBerry

Extend Security and Control from the Data Center Edge to the Core
sponsored by VMware, Inc.
EBOOK: This eBook presents solutions to three of today's common network security issues and how software-defined data centers are here to provide the tools that you will need moving forward.
Posted: 22 Mar 2016 | Published: 16 Mar 2016

VMware, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement