IT Management  >   Systems Operations  >   Security  >  

Computer Security Management

RSS Feed    Add to Google    Add to My Yahoo!
Computer Security ManagementReports
 
Top Five Alternatives to Endpoint Antivirus Software
sponsored by Bit9 + Carbon Black
WHITE PAPER: In this in-depth Forrester report, discover the top 5 technologies that security professionals are using to replace outdated antivirus software.
Posted: 26 Aug 2014 | Published: 09 Jun 2014

Bit9 + Carbon Black

Research Report: Mobile Security Trends in the Workplace
sponsored by Bluebox
WHITE PAPER: In this informative report, get the facts on enterprise mobility trends and BYOD programs, and discover how organizations should adapt to this changing IT security landscape.
Posted: 15 Aug 2014 | Published: 30 Jun 2014

Bluebox

4 Steps to Effective Security Intelligence
sponsored by Hewlett-Packard Company
WHITE PAPER: In this infographic, learn about a new security event information management solution that enables faster event processing and real-time security information.
Posted: 21 Aug 2014 | Published: 21 Aug 2014

Hewlett-Packard Company

Security for a Faster World
sponsored by Hewlett-Packard Company
WHITE PAPER: This eBook presents a maturity model that will help you determine how secure you really are, explores five questions every CIO should be able to answer, and outlines a new approach based on intelligence gathering and research that can keep you ahead of the cybercriminals.
Posted: 19 Aug 2014 | Published: 13 Jun 2013

Hewlett-Packard Company

Fax Security: Minimizing Breaches and Compliance Risks
sponsored by OpenText
WHITE PAPER: In this in-depth resource, you'll gain critical insights into the best practices and strategies for maintaining process control, information integrity, privacy, and effective archiving for your fax communications.
Posted: 19 Aug 2014 | Published: 31 Dec 2013

OpenText

Get the Facts On APTs To Avoid Misguided Security Efforts
sponsored by IBM
WHITE PAPER: This expert E-Guide cuts through the confusion, explaining exactly what an APT is, what they are capable of, and how you can best defend your organization from them.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

IBM

Advanced Endpoint and Server Protection
sponsored by Bit9 + Carbon Black
WHITE PAPER: In this informative white paper, gain critical insights into new strategies for protecting your organization against today's advanced cyber-attacks, including advanced heuristics, application control, and isolation technologies.
Posted: 26 Aug 2014 | Published: 26 Aug 2014

Bit9 + Carbon Black

Breaking Down Cloud Archiving Myths
sponsored by Hewlett-Packard Company
WHITE PAPER: This exclusive whitepaper explores the misinformation and misconceptions that are preventing many organizations from taking full advantage of the cloud.
Posted: 25 Aug 2014 | Published: 21 Aug 2013

Hewlett-Packard Company

10 Ways to Build a Better Big Data Security Strategy
sponsored by Hewlett-Packard Company
WHITE PAPER: Data collection plays a huge role in today's security landscape, and this guide explores 10 ways that you can achieve effective security by utilizing big data analytics.
Posted: 19 Aug 2014 | Published: 31 Jan 2014

Hewlett-Packard Company

Rapidly Respond to Advanced Attacks in Motion with Carbon Black
sponsored by Bit9 + Carbon Black
EBOOK: Access this in-depth resource that explains why your organization would be better off by establishing a security lifecycle – one that reduces the area to attack while also detecting advanced threats in real time. Read on to learn more about evolving enemies, understanding the kill chain, and more.
Posted: 18 Aug 2014 | Published: 18 Aug 2014

Bit9 + Carbon Black
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement