IT Management  >   Systems Operations  >   Security  >  

Computer Security Management

RSS Feed    Add to Google    Add to My Yahoo!
Computer Security Management Reports
 
Introduction to Data Loss Prevention Tools
sponsored by InteliSecure
EGUIDE: In this e-guide discover what it means for security for data to be in use, in motion, and at rest; how DLP works in a standalone vs. integrated context; the DLP learning curve; and more.
Posted: 12 Jun 2017 | Published: 07 Jun 2017

InteliSecure

Biggest Security Threats to Your AWS Environment
sponsored by Cryptzone
WHITE PAPER: Learn how to remove operational complexity from achieving secure, and easily auditable, user access to your AWS systems.
Posted: 07 Jun 2017 | Published: 07 Jun 2017

Cryptzone

7 Steps to Successfully Implementing Security Controls in Your Organization
sponsored by Rapid7
WHITE PAPER: In this white paper, learn 7 practical steps to putting security controls into your network, both on the day-to-day level and for long-term planning.
Posted: 05 Jun 2017 | Published: 05 Jun 2017


10 Benefits to Help Combat Ransomware
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Discover 10 ways an incident response service can help your organization right now if you are, or are ever, infected with ransomware.
Posted: 15 Jun 2017 | Published: 15 Jun 2017

Symantec & Blue Coat Systems

11 Policies to Keep Your Apps Secure
sponsored by Blue Cedar
WHITE PAPER: This white paper outlines a suite of app platform policies to help you secure your applications and govern who has access to them, including certificate management, network integration control, secure microtunnels to application's back-end service, and more.
Posted: 15 Jun 2017 | Published: 15 Jun 2017

Blue Cedar

How to Simplify Your GDPR Compliance
sponsored by Commvault
WHITE PAPER: Learn how PGNiG (the leader of the Polish natural gas market) has implemented a platform to deliver end-to-end data management, improved cost efficiency and access, while also reducing business risk.
Posted: 06 Jun 2017 | Published: 06 Jun 2017

Commvault

The Total Economic Impact Of Gigamon
sponsored by Gigamon
RESEARCH CONTENT: Gigamon commissioned Forrester Consulting to conduct a Total Economic Impactâ„¢ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by deploying Gigamon. Access now to uncover a framework to evaluate the potential financial benefit of Gigamon on your organizations.
Posted: 12 Jun 2017 | Published: 22 Apr 2016

Gigamon

6 Security Facts You Should be Considering
sponsored by The Media Trust
WHITE PAPER: Learn 6 critical website security facts, shining light on how to keep your site safe in today's threat landscape.
Posted: 12 Jun 2017 | Published: 12 Jun 2017

The Media Trust

The State of Endpoint Security: Approaches, Opportunities and Conclusions
sponsored by TrendMicro
WHITE PAPER: Discover an overview and breakdown of approaches, opportunities and conclusions regarding of the current state of endpoint security.
Posted: 13 Jun 2017 | Published: 13 Jun 2017

TrendMicro

Security Delivery Platforms for Dummies
sponsored by Gigamon
EBOOK: Access this for dummies e-book to discover how a security delivery platform can eliminate network blind spots, optimize security tool performance and scalability and resolve conflict between network and security ops.
Posted: 13 Jun 2017 | Published: 30 Dec 2016

Gigamon
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement