IT Management  >   Systems Operations  >   Security  >  

Computer Security Management

RSS Feed    Add to Google    Add to My Yahoo!
Computer Security ManagementReports
 
Addressing the Full Attack Continuum- A New Security Model For Before, During and After an Attack
sponsored by Cisco
WHITE PAPER: This important whitepaper will teach you how to develop a threat-centric security approach.
Posted: 17 Nov 2014 | Published: 17 Nov 2014

Cisco

Information Security Magazine – November 2014
sponsored by SearchSecurity.com
EZINE: The votes are tallied. More than 1,700 security practitioners participated in our Security Readers' Choice Awards 2014. Did your tools make the cut?
Posted: 07 Nov 2014 | Published: 07 Nov 2014

SearchSecurity.com

Building Trust and Compliance in the Cloud with Intel® Trusted Execution Technology
sponsored by Intel Corporation
WHITE PAPER: This white paper explores how Intel helped the Taiwan Stock Exchange Corporation to build a more secure foundation for its sensitive cloud workloads.
Posted: 17 Nov 2014 | Published: 31 Dec 2013

Intel Corporation

10 Steps for Implementing Strong Authentication in your Organization
sponsored by Gemalto
WHITE PAPER: This important whitepaper covers 10 crucial steps you must take to implement strong authentication in your organization.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

Gemalto

Identity and Access Intelligence: How Big Data and Risk Analytics Will Revolutionize IAM
sponsored by Courion Corporation
WHITE PAPER: This white paper discusses the shortcoming of today's IAM systems and gives an overview of Identity and Access Intelligence Systems.
Posted: 25 Nov 2014 | Published: 30 Sep 2013

Courion Corporation

Utilizing Security Ratings for Enterprise IT Risk Mitigation
sponsored by BitSight
WHITE PAPER: Continue on to this important whitepaper now to explore the state of cyber-risk management in 2014.
Posted: 20 Nov 2014 | Published: 18 Jun 2014

BitSight

Winning security use cases in the Computer Weekly European 2014 Awards
sponsored by ComputerWeekly.com
CASE STUDY: Warwick Ashford presents five IT security case studies selected from the winners of Computer Weekly's European User Awards.
Posted: 17 Nov 2014 | Published: 17 Nov 2014

ComputerWeekly.com

Central Bank and Trust
sponsored by GFI
WHITE PAPER: This exclusive case study takes an in-depth look at how one bank was able to recover and continue business after a security breach. Read on to learn more.
Posted: 24 Nov 2014 | Published: 24 Nov 2014

GFI

Enterprise Software Security Strategies Pulse Report (SSA)
sponsored by Hewlett-Packard Company
WHITE PAPER: This survey report by Gatepoint Research explores the extent to which IT organizations employ application security testing and remediation solutions.
Posted: 18 Nov 2014 | Published: 31 Oct 2014

Hewlett-Packard Company

How Telcos Can Outpace Commoditization in the Application Economy
sponsored by CA Technologies.
WHITE PAPER: This white paper explores how telecommunications service providers are uniquely positioned to leverage their infrastructure, expertise, and insights to provide identity management services for the application economy.
Posted: 13 Nov 2014 | Published: 29 Aug 2014

CA Technologies.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement