IT Management  >   Systems Operations  >   Security  >  

Computer Security Management

RSS Feed    Add to Google    Add to My Yahoo!
Computer Security Management Reports
 
The Challenges of Managing SSL/TLS Encrypted Traffic
sponsored by Gigamon
RESEARCH CONTENT: Just 31% of companies say they have a plan in place to protect both their security sockets layer (SSL) and transport layer security (TLS) traffic in their network. In this SC Media survey, learn why it's so imperative to have a SSL/TLS plan.
Posted: 05 May 2017 | Published: 05 May 2017

Gigamon

Bridging the Gap Between IT Operations & Security
sponsored by Splunk
WHITE PAPER: Click inside and explore the legitimate differences between security and IT operations, as well as where they share some common ground, and how you can make use of these shared values to build a safer, more available network.
Posted: 17 May 2017 | Published: 17 May 2017

Splunk

Your Guide to Secure ESFF File Sharing
sponsored by BlackBerry
WHITE PAPER: Discover how EFSS can fulfill the needs of employees who want seamless mobile collaboration and to leverage tech to increase productivity, while also allowing IT to protect sensitive information and help the company embrace innovative new technology that can deliver on key business goals.
Posted: 11 May 2017 | Published: 11 May 2017

BlackBerry

How Technology helps with the reporting burden-KPMG
sponsored by Tagetik Software
WHITE PAPER: Discover how to maximize your CFO's greatest opportunities to contribute to or impact the value of the organization by leveraging EPM.
Posted: 11 May 2017 | Published: 11 May 2017

Tagetik Software

The IoT Explosion's Impact on Enterprise Security
sponsored by Fortinet, Inc.
WHITE PAPER: Find out what's driving the IoT explosion and how you can prepare your network for the potential security risks that accompany it.
Posted: 03 May 2017 | Published: 09 Feb 2017

Fortinet, Inc.

Your Endpoint Essentials Checklist
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Discover a comprehensive checklist to ensure that your endpoints have essential features to protect your enterprise from ransomware and other malicious activities.
Posted: 16 May 2017 | Published: 16 May 2017

Symantec & Blue Coat Systems

UNDER THE MICROSCOPE:THE ANATOMY OF MOBILE STRATEGY
sponsored by Lenovo
EBOOK: In this eBook, you'll learn how to balance the growing mobility needs of end users and the needs of IT. And, learn how to everything in your mobile ecosystem is interconnected and how to manage performance, security, flexibility connectivity and durability.
Posted: 01 May 2017 | Published: 01 May 2017

Lenovo

How Fortinet Security Fabric Addresses Today's Top Security Concerns
sponsored by Fortinet, Inc.
WHITE PAPER: In this white paper, learn how you can get the networks security you need to protect your organization from IoT, ransomware, a lack of skilled IT security staff and more.
Posted: 01 May 2017 | Published: 03 Mar 2017

Fortinet, Inc.

Enhance Data Protection with Analytics and Insights
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Learn how to maintain an agile data protection strategy that allows you to adapt to fast-changing markets, organizational demands, and the new demands of acquisitions.
Posted: 05 May 2017 | Published: 05 May 2017

Hewlett Packard Enterprise

What to Know About SIEM as a Service Before Deployment
sponsored by Splunk
EGUIDE: Access this expert e-guide to learn what would justify a product carrying the "SIEM as a service" label and what characteristics they bear that have contributed to the rising interest in them over the last few years.
Posted: 11 May 2017 | Published: 09 May 2017

Splunk
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement