IT Management  >   Systems Operations  >   Security  >  

Computer Security Management

RSS Feed    Add to Google    Add to My Yahoo!
Computer Security Management Reports
The Rise of the Anytime-Anywhere Mobile Worker
sponsored by Good Technology
WHITE PAPER: In this white paper, you will learn how to harness the power of your anytime-anywhere workforce by viewing 8 key considerations to evaluate mobile platforms. Discover how to securely mobilize your enterprise, while also considering mobile data protection, app development, and more.
Posted: 23 Nov 2015 | Published: 31 Dec 2014

Good Technology

Understanding the Dynamics of Virtualization Security
sponsored by BitDefender
EGUIDE: This expert guide analyzes the complexities of virtualization security and explains how you can successfully secure your virtual environments.
Posted: 24 Nov 2015 | Published: 24 Nov 2015


Enterprise Mobility Management: Improve Clinician Workflows and Patient Outcomes
sponsored by Citrix
WHITE PAPER: This white paper discusses how to address mobile IT challenges for healthcare and effectively manage devices in order to improve clinician productivity without compromising patient data or security overall.
Posted: 11 Nov 2015 | Published: 31 Dec 2014


Cybersecurity Spending Strategies to Help your Enterprise
sponsored by Unisys
EGUIDE: This expert guide offers tips on how to strategize your cybersecurity spending to get the most bang for your buck.
Posted: 13 Nov 2015 | Published: 13 Nov 2015


The 2015 State of Workforce Mobility in the United States
sponsored by Dimension Data
RESEARCH CONTENT: This report highlights the 2015 state of the mobile workforce in the United States, and examines the contributing factors behind the expansion of millennial mobile workers. Read on now to learn how to foster a collaborative mobile environment in your organization.
Posted: 05 Nov 2015 | Published: 05 Nov 2015

Dimension Data

Discovering the New Business Case for Cybersecurity
sponsored by Symantec Corporation
WEBCAST: This presentation demonstrates how cyber security creates wealth for stakeholders and justifies the investments that need to be made towards it. Learn how security can enable your digital information to have functional and economic value as property and can help you manage the risk of any potential threat or attack on your information.
Posted: 11 Nov 2015 | Premiered: Nov 11, 2015

Symantec Corporation

Securing Virtual Data Centers from Malware
sponsored by BitDefender
EGUIDE: Access this expert guide for tips on giving your virtual environment the level of security it needs.
Posted: 23 Nov 2015 | Published: 23 Nov 2015


The Cyber Security Balancing Act: Improving WAF Accuracy Without Impacting Legitimate Users
sponsored by Akamai
WHITE PAPER: Access this white paper to explore the challenges of improving WAF accuracy. Examine the benefits of a single measure for evaluating WAF efficacy and reducing the percentage of false positives that adversely affect legitimate users.
Posted: 05 Nov 2015 | Published: 30 Sep 2015


Data Theft Prevention for Healthcare
sponsored by Raytheon|Websense
WHITE PAPER: This white paper outlines a data-centric approach to protecting data and staying in compliance without sacrificing efficient patient care.
Posted: 17 Nov 2015 | Published: 17 Nov 2015


Critical Capabilities for Security Information and Event Management (SIEM)
sponsored by LogRhythm, Inc.
WHITE PAPER: Access this report for insight on aligning IT's needs with three key use cases to choose the best SIEM solution for the organization.
Posted: 12 Nov 2015 | Published: 21 Sep 2015

LogRhythm, Inc.
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement