Business of Information Technology  >   Business Management  >   Financial Management  >   Budgeting  >   IT Spending  >  

Computer Security Spending

RSS Feed    Add to Google    Add to My Yahoo!
Computer Security SpendingReports
 
2014 Gartner SIEM Market Report: Which Vendors Deliver?
sponsored by IBM
WHITE PAPER: In this Gartner report, get the facts on today's SIEM vendor landscape with in-depth evaluations and breakdowns of the top players and products in the industry.
Posted: 16 Sep 2014 | Published: 25 Jun 2014

IBM

Securing Identities and Data Across Mobile Apps
sponsored by CA Technologies.
WHITE PAPER: This white paper highlights the 3 major challenges in protecting user identities through mobile applications. Read on to discover a mobile gateway solution that offers secure access and user protection.
Posted: 05 Feb 2014 | Published: 31 Dec 2013

CA Technologies.

Carving a path through IaaS security with CloudPassage
sponsored by CloudPassage
WHITE PAPER: Access this white paper to find out about one comprehensive solution that employs threat intelligence within the cloud and uses behavioral analysis to detect anomalies. Don't leave your cloud infrastructure at risk.
Posted: 05 Sep 2014 | Published: 21 Apr 2014

CloudPassage

Comparing Security Information and Event Management (SIEM) Technologies
sponsored by IBM
WHITE PAPER: This highly informative white paper from Gartner objectively evaluates a variety of SIEM technologies on a number of critical dimensions, including market responsiveness, customer experience, and pricing.
Posted: 24 Jul 2014 | Published: 25 Jun 2014

IBM

Justifying a Computer Incident Response Plan
sponsored by Dell SecureWorks
WHITE PAPER: This essential resource explores the need for effective incident response in order to reduce the costs of data breaches and mitigate risk. It also outlines best practices for creating an effective Computer Incident Response Plan (CIRP) – read on to learn more now.
Posted: 07 Feb 2013 | Published: 07 Feb 2013

Dell SecureWorks

Combatting APTs with a Defense-in-Depth Security Approach
sponsored by CDW Corporation
WHITE PAPER: This informative white paper contains critical information on why a defense-in-depth security approach has proven effective in protecting organizations' sensitive data from APTs.
Posted: 22 Jul 2014 | Published: 05 Mar 2014

CDW Corporation

2014 Magic Quadrant for User Authentication
sponsored by SafeNet Asia Ltd
ANALYST REPORT: View this Magic Quadrant by Garner to uncover the leading vendor of authentication services, and what benefits it has to offer that will fit today and tomorrow's business needs.
Posted: 09 Jan 2014 | Published: 09 Jan 2014

SafeNet Asia Ltd

Hardware and Software Authentication: Choosing the Right Approach
sponsored by SafeNet Asia Ltd
WHITE PAPER: In this resource, uncover the top 5 considerations for choosing between hardware- or software-based authentication tools to ensure that assets remain protected even when remote users access corporate networks.
Posted: 09 Jan 2014 | Published: 09 Sep 2010

SafeNet Asia Ltd

Web Application Firewalls Are Worth the Investment for Enterprises
sponsored by Imperva
ANALYST REPORT: This resource explains how Web application firewalls help security leaders to better protect Web applications in their organizations.
Posted: 29 Apr 2014 | Published: 28 Feb 2014

Imperva

Taking Charge of Security in a Hyperconnected World
sponsored by RSA, The Security Division of EMC
WHITE PAPER: Access this resource to uncover the top mistakes IT managers are making in their security strategies, and why they need a more continuous approach to improving defense systems in today's ever changing threat landscape.
Posted: 06 Dec 2013 | Published: 31 Oct 2013

RSA, The Security Division of EMC
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement