IT Management  >   Systems Operations  >   Security  >  

Computer Security Management

RSS Feed    Add to Google    Add to My Yahoo!
Computer Security Management Reports
Cloud Security Risks Still An Issue for CIOs, but Change Is in the Air
sponsored by Oracle Corporation
EGUIDE: This e-guide discusses how cloud security risks will be less of a barrier to adoption as cloud service providers are allowing potential customers to conduct infrastructure assessments and publishing SOC reports on their security controls. Read on to learn more about how self-education and enlightened vendor response can ease your move to the cloud.
Posted: 20 Nov 2015 | Published: 20 Nov 2015

Oracle Corporation

Threat Intelligence Networks: The Next Generation
sponsored by Symantec Corporation
WEBCAST: This video discusses how information security architecture has shifted the focus of threat intelligence from reactive protection for individual threats to proactive risk management. Learn how you can build security into your infrastructure by utilizing an ecosystem of products that work together to minimize the risks of a data breach.
Posted: 11 Nov 2015 | Premiered: Nov 11, 2015

Symantec Corporation

The Cyber Threat Risk: Oversight Guidance for CEOs and Boards
sponsored by LogRhythm, Inc.
WHITE PAPER: This resource discusses what CEOs and other executives can do to ensure strong security in their enterprises.
Posted: 05 Nov 2015 | Published: 05 Nov 2015

LogRhythm, Inc.

A Security Champion's Guide to Web Application Security
sponsored by Akamai
WHITE PAPER: Access this resource for tips on ensuring your web applications aren't the weakest link in your enterprise security strategy.
Posted: 23 Nov 2015 | Published: 23 Nov 2015


Make Your SIEM the Best It Can be
sponsored by
EBOOK: This resource will help you use your SIEM system to your utmost advantage.
Posted: 09 Nov 2015 | Published: 09 Nov 2015

How Partitioning Technology Delivers Consolidation Without Compromising Performance, Security, or Isolation
sponsored by Unisys
WHITE PAPER: In this white paper learn about a new partitioning technology that is architected, designed, and developed to deliver a predictable, secure, scalable, distributed environment. Read on to see a comparison of modern partitioning vs. virtualization options.
Posted: 04 Nov 2015 | Published: 31 Dec 2014


Special Report: Healthcare Security in 2015
sponsored by Raytheon|Websense
WHITE PAPER: This report examines the issues and challenges surrounding IT security in the healthcare industry and gives advice on overcoming them.
Posted: 17 Nov 2015 | Published: 22 Sep 2015


A Strategic Approach to Combatting Security Threats Featuring ESG Analyst Jon Oltsik
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This paper discusses how organizations can take a more strategic approach to threat management by moving to a tightly integrated and centrally managed defense-in-depth architecture.
Posted: 12 Nov 2015 | Published: 31 Oct 2015

Check Point Software Technologies Ltd.

2015 Cost of Data Breach Study: India
sponsored by IBM
WHITE PAPER: Uncover the findings of this extensive study of 36 India-based companies in 12 industry sectors to learn about the impact of a data breach in 2015. Inside, discover the effect data breaches had on their businesses and various strategies and tools you can use to help avoid the same fate.
Posted: 06 Nov 2015 | Published: 06 Nov 2015


Encrypted Network Security Solutions - Infographic
sponsored by Unisys
RESOURCE: Learn about an innovative approach to securing your network in this infographic.
Posted: 18 Nov 2015 | Published: 04 Nov 2015

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement