IT Management  >   Systems Operations  >   Security  >  

Cyber Security Enhancement Act of 2002

RSS Feed    Add to Google    Add to My Yahoo!
Cyber Security Enhancement Act of 2002Reports
 
The Detrimental Cost of Cyber Crime
sponsored by Hewlett-Packard Limited
ANALYST REPORT: In this analyst report by Ponemon Institute, see how cybercrime has continued to bring heavy economic damage to U.K. companies, and what they should do to reduce such detrimental impact.
Posted: 25 Oct 2013 | Published: 25 Oct 2013

Hewlett-Packard Limited

EMA Report: The Benefits of a Unified Endpoint Management Approach
sponsored by IBM
WHITE PAPER: Read this resource to learn how a unified security and IT operations approach can better protect organizations' vast and growing amount of endpoints from sophisticated threats.
Posted: 05 Mar 2014 | Published: 24 Jan 2011

IBM

Accenture Technology Vision 2014
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: The Accenture Technology Vision 2014 identifies six technology trends that are enabling enterprises to push the boundaries of innovation.
Posted: 27 Jan 2014 | Published: 27 Jan 2014

ComputerWeekly.com

Critical Factors to Endpoint Security
sponsored by Dell, Inc.
WHITE PAPER: This white paper highlights the need for a new layered, defense-in-depth security approach – one that fortifies the endpoint itself through a handful of security controls and critical factors to keep users and endpoints safe.
Posted: 19 Mar 2014 | Published: 19 Mar 2014

Dell, Inc.

Migrating from Windows XP: Understanding the Challenges and How to Mitigate Them
sponsored by Dell and Microsoft
WHITE PAPER: This paper describes how effective Windows migration projects can be broken down into four manageable phases, and how industry best practices and products can reduce the time and disruptions caused by a migration from XP to Windows 7 or 8, as well as provide IT more time and resources to focus on more strategic initiatives.
Posted: 26 Mar 2014 | Published: 01 Oct 2013

Dell and Microsoft

Cisco 2014 Annual Security Report
sponsored by Cisco
WHITE PAPER: This information-packed resource acts as a guide for developing a robust security approach given today's issues with trust, threat intelligence, and varying industry trends. Click through to explore key findings, as well as recommendations for your next steps.
Posted: 31 Mar 2014 | Published: 31 Mar 2014

Cisco

KPN focuses on Information Security with HP
sponsored by Hewlett-Packard Limited
WEBCAST: View this brief webcast to gain insight on an information security solution one organization chose to defend against today's highly motivated hackers, and how they're benefiting.
Posted: 25 Nov 2013 | Premiered: Nov 25, 2013

Hewlett-Packard Limited

Provide Better Visibility and Manageability across Network Security Tools
sponsored by WatchGuard Technologies, Inc.
ANALYST REPORT: Access this analyst report to explore what IT security professionals need in security tools given the significant growth of sophisticated cyber-attacks in an increasingly complex IT environment.
Posted: 30 Oct 2013 | Published: 30 Sep 2013

WatchGuard Technologies, Inc.

IT Security. Fighting the Silent Threat
sponsored by Kaspersky Lab
WHITE PAPER: Kaspersky Lab experts are releasing new research designed to assist you in your cybersecurity business decisions. Download the report now to get quantifiable statistics about perceived versus real cyberattacks.
Posted: 09 Oct 2013 | Published: 09 Oct 2013

Kaspersky Lab

Website Security Threat Report, Part Two
sponsored by Symantec Corporation
WHITE PAPER: This website security threat report focuses on the threats that impact your website and online business. Access this resource to understand the threat landscape and understand how you can protect your company and your infrastructure.
Posted: 14 Oct 2013 | Published: 11 Oct 2013

Symantec Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement