IT Management  >   Systems Operations  >   Security  >  

Computer Security Management

RSS Feed    Add to Google    Add to My Yahoo!
Computer Security ManagementReports
 
Network Monitoring and your SIEM Solution
sponsored by LogRhythm, Inc.
WHITE PAPER: This informative guide provides insight into an effective network monitoring solution and how it can enhance your SIEM strategy.
Posted: 18 Apr 2014 | Published: 18 Apr 2014

LogRhythm, Inc.

A New Threat-Centric Security Model for Before, During, and After an Attack
sponsored by Sourcefire
WHITE PAPER: This guide explores a threat-centric security model designed to prevent, detect and remediate any potential cyber-attacks.
Posted: 16 Apr 2014 | Published: 16 Apr 2014

Sourcefire

Mobility Management Selection Guide
sponsored by Citrix
WHITE PAPER: This crucial white paper takes an in-depth look at the criteria you can use to choose the best enterprise mobility management system for your organization’s specific needs.
Posted: 24 Apr 2014 | Published: 24 Apr 2014

Citrix

Redefining Defense-in-Depth
sponsored by Lumension
WHITE PAPER: This exclusive report examines how traditional protection solutions are decreasing in effectiveness and discusses a new defense-in-depth approach that can keep you endpoints safe from even the most malicious attackers.
Posted: 21 Apr 2014 | Published: 21 Apr 2014

Lumension

ABAC to the Future: Deliver Smarter SiteMinder Policies with No Sweat
sponsored by Radiant Logic, Inc.
WEBCAST: This webcast features a next-generation authorization strategy that offers a finer-grained approach to user provisioning. Click now to explore key benefits.
Posted: 22 Apr 2014 | Premiered: Apr 22, 2014

Radiant Logic, Inc.

Simplify implementation of the HITRUST Common Security Framework
sponsored by Symantec Corporation
WHITE PAPER: Click through to explore the Health Information Trust Alliance (HITRUST) common security framework (CSF) which harmoniously combines compliance management controls for simplified, cost-effective HCO audit preparation.
Posted: 24 Apr 2014 | Published: 31 Mar 2013

Symantec Corporation

Predictions 2014: Identity and Access Management
sponsored by IBM
ANALYST REPORT: This Gartner report reveals predictions for identity and access management (IAM) tools needed for 2014.
Posted: 17 Apr 2014 | Published: 26 Nov 2013

IBM

Why BridgeHead? Unique Capabilities for Protecting Data in Enterprise Hospital Environments
sponsored by BridgeHead Software
WEBCAST: This white paper explains 8 ways this data management solution exceeds other vendors' protection capabilities.
Posted: 10 Apr 2014 | Premiered: Dec 31, 2013

BridgeHead Software

How to Consolidate Identities for Office 365 and Cloud Access
sponsored by Radiant Logic, Inc.
WEBCAST: This webcast offers top, simple recommendations on how to extend existing identity and access management strategies to the cloud.
Posted: 18 Apr 2014 | Premiered: Apr 18, 2014

Radiant Logic, Inc.

Fight Malware, Malfeasance, and Malingering
sponsored by F5 Networks
WHITE PAPER: This guide looks at top tools and strategies for fighting APTs and malware-based attacks.
Posted: 21 Apr 2014 | Published: 21 Apr 2014

F5 Networks
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement