IT Management  >   Systems Operations  >   Security  >  

Computer Security Management

RSS Feed    Add to Google    Add to My Yahoo!
Computer Security Management Reports
 
Balancing Personalization and Trust in the Age of the Customer
sponsored by Gigya
WHITE PAPER: Discover how to not only gain access to superior data on your customer base but also utilize that data to your enterprise's greatest advantage. Find out how such an approach has driven massive increases in usable customer data for companies such as Danone and Forbes.
Posted: 20 Jul 2016 | Published: 20 Jul 2016

Gigya

7 Modern Encryption Problems
sponsored by Blue Coat Systems
RESOURCE: In this resource discover 7 problems faced by your network that you can solve with encrypted traffic management. See how each issue arises, can damage your network, and can be alleviated.
Posted: 27 Jul 2016 | Published: 27 Jul 2016

Blue Coat Systems

Combating APT in a New Way
sponsored by Exabeam
WHITE PAPER: Discover how to provide a new layer for your enterprise's security analytics and stop data leaks due to Advanced Persistent Threats. Learn the fundamentals of these malicious attacks, how they are changing, and how you can change to combat them.
Posted: 27 Jul 2016 | Published: 27 Jul 2016

Exabeam

Taking a Decisive Stand against Fraud
sponsored by CyberSource
CASE STUDY: Learn how MetroDeal secured its site against a steadily growing level of fraud risk, and freed up staff time as an ancillary benefit. Access now to learn about the value they gained by taking a comprehensive stand against fraud.
Posted: 23 Jun 2016 | Published: 30 Aug 2013

CyberSource

Stay One Step Ahead of Cyber Attacks
sponsored by Verizon
VIDEO: Discover a "Data Breach Investigations Report" that provides organizations with information needed to prevent attacks, quickly detect breaches, and reduce damage. Access now and get the cybersecurity intelligence necessary for successful protection.
Posted: 07 Jul 2016 | Premiered: 27 Apr 2016

Verizon

The Devil's Right Hand: An Investigation on Malware-oriented Obfuscation Techniques
sponsored by ComputerWeekly.com
EGUIDE: This article in our Royal Holloway Security Series evaluates the role that obfuscation techniques play in malware and the importance of understanding their effectiveness.
Posted: 29 Jul 2016 | Published: 29 Jul 2016

ComputerWeekly.com

Five-Step Guide to Implementing Encrypted Traffic Management (ETM)
sponsored by Blue Coat Systems
RESOURCE: Discover a step-by-step guide on how to implement encrypted traffic management. Learn how to assess your network security tools, collaborate with multiple departments to ensure privacy compliance, and more.
Posted: 22 Jul 2016 | Published: 22 Jul 2016

Blue Coat Systems

Mobility In Government Services: A Checklist Towards Regulatory Compliance
sponsored by BlackBerry
WHITE PAPER: Discover the struggles faced by the mobile solutions used by government organizations and not only why compliance is so challenging, but also why it's vitally important.
Posted: 12 Jul 2016 | Published: 12 Jul 2016

BlackBerry

Cybersecurity Buyer's Guide
sponsored by Palo Alto Networks
RESOURCE: Inside this buyer's guide, you'll find 10 criteria for choosing a cybersecurity solution that can block cyberattacks and protect allowed traffic from threats, and advice on how to effectively evaluate cybersecurity solutions through the request for proposal (RFP) process.
Posted: 30 Jun 2016 | Published: 30 Jun 2016

Palo Alto Networks

How to Harden Your Servers In Elastic Infrastructures
sponsored by CloudPassage
WEBCAST: Learn about security in the context of changing infrastructure from traditional data centers into environments like AWS. Find out how you can deploy systems through automation and at scale, baking in security and compliance controls while keeping these measures from putting the brakes on DevOps.
Posted: 19 Jul 2016 | Premiered: Jun 21, 2016

CloudPassage
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement