IT Management  >   Systems Operations  >   Security  >  

Computer Security Management

RSS Feed    Add to Google    Add to My Yahoo!
Computer Security Management Reports
 
DLP Management and Monitoring
sponsored by IntraLinks, Inc
EGUIDE: This expert guide contains tips for adopting the most effective DLP management and monitoring system possible.
Posted: 06 Jul 2015 | Published: 06 Jul 2015

IntraLinks, Inc

Limiting Widespread Data Access
sponsored by Varonis
WHITE PAPER: This white paper discusses the problem of universal access to sensitive data and gives suggestions for solving this problem without interfering with the business process.
Posted: 24 Jun 2015 | Published: 24 Jun 2015

Varonis

The Importance of Mobile Infrastructure
sponsored by Dell, Inc. and IntelĀ®
EGUIDE: Access this expert eGuide and learn why IT shops must invest in modern infrastructures to meet the growing demands of mobility in the enterprise.
Posted: 26 Jun 2015 | Published: 26 Jun 2015

Dell, Inc. and IntelĀ®

Moving Beyond Your Mobile Blind Spot: An App Centric Approach to Enterprise Mobility
sponsored by Pulse Secure
WHITE PAPER: In this white paper, you'll learn how shifting the focus of a mobile strategy from device management to app-centric can improve user experience and workforce productivity while improving security.
Posted: 09 Jun 2015 | Published: 28 Mar 2014

Pulse Secure

How European Enterprises Are Preparing for Cybercrime
sponsored by Hewlett-Packard Limited
WHITE PAPER: This report reveals the results of a survey assessing Europe's cybercrime readiness.
Posted: 24 Jun 2015 | Published: 24 Jun 2015

Hewlett-Packard Limited

The 2015 Cyber Risk Report
sponsored by Hewlett-Packard Company
WHITE PAPER: The HP Cyber Risk Report 2015 provides a broad view of the 2014 threat landscape and gives you the insight you need to protect your business from both known vulnerabilities and unknown exploits.
Posted: 29 May 2015 | Published: 30 Apr 2015

Hewlett-Packard Company

Detect, Prevent, and Manage Cyber-Security Incidents
sponsored by Hewlett-Packard Limited
WHITE PAPER: This white paper suggests how you can partner with security services for more advanced and effective threat detection and mitigation.
Posted: 26 May 2015 | Published: 30 Apr 2015

Hewlett-Packard Limited

Unified Mobile Device, App and Data Security
sponsored by Pulse Secure
WHITE PAPER: Access this white paper to learn how you can implement a solution that unifies mobile app and network security technologies, eliminating headaches for IT departments.
Posted: 04 Jun 2015 | Published: 02 Oct 2014

Pulse Secure

Technical Considerations for Mobility in the Enterprise
sponsored by Data#3
WHITE PAPER: In this white paper, you'll learn how to look beyond MDM and security to see other important mobile components like workspace services and workspace delivery.
Posted: 25 Jun 2015 | Published: 25 Jun 2015

Data#3

6 Steps for Preventing Insider Threats
sponsored by Varonis
WEBCAST: This webcast outlines six ways you can stay safe from the ever-present threat of insider attacks.
Posted: 26 Jun 2015 | Premiered: Jun 26, 2015

Varonis
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement