IT Management  >   Systems Operations  >   Security  >  

Cyber Security

RSS Feed    Add to Google    Add to My Yahoo!
Cyber Security Reports
The Changing State of Cloud Security
sponsored by Alert Logic
WHITE PAPER: This report reveals just how often cloud environments are hacked and what methods are used when they are.
Posted: 26 Oct 2015 | Published: 26 Oct 2015

Alert Logic

Report Summary: Reliability Analysis of Juniper Networks SRX5000 Line of Services Gateways
sponsored by Juniper Networks, Inc.
ANALYST REPORT: This analysis report focuses on a networking and security service that provides application security, UTM, integrated IPS, and advanced integrated threat management. Read on to see how this scalable, resilient security solution can guard your enterprise's data center against cyber threats and malware.
Posted: 26 Oct 2015 | Published: 31 Jan 2015

Juniper Networks, Inc.

Practical Threat Management for Healthcare Organizations
sponsored by AlienVault
WHITE PAPER: This white paper can help you overcome some of the many hurdles that healthcare security faces. Read on to keep your compliance needs met and your patient data safe.
Posted: 23 Oct 2015 | Published: 31 May 2015


Outrunning the Bear: 5 Critical Ways To Take a More Collaborative Approach To IT Security
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This white paper examines the challenges inhibiting faster threat response and suggests five critical steps organizations can take to turn security intelligence into action.
Posted: 12 Nov 2015 | Published: 29 May 2015

Hewlett Packard Enterprise

Tracking Change & Malicious Activity in Critical Technologies
sponsored by Dell, Inc.
WHITE PAPER: This white paper can help you to make the most of your critical technologies' native auditing capabilities and to supplement those capabilities when they don't provide enough security.
Posted: 11 Nov 2015 | Published: 11 Nov 2015

Dell, Inc.

Seven Questions to Ask Before Buying SIEM Products
sponsored by LogRhythm, Inc.
EGUIDE: This expert guide explores the most essential criteria to consider before purchasing your SIEM solution.
Posted: 17 Nov 2015 | Published: 17 Nov 2015

LogRhythm, Inc.

Technology Offers Convenience, Privacy Pays the Price
sponsored by Global Knowledge
WHITE PAPER: Technology is a wonderful thing, but it comes with a price: your privacy. This white paper can help you learn more about what kind of personal data is collected by web sites and applications, and how to secure your information online.
Posted: 20 Oct 2015 | Published: 20 Oct 2015

Global Knowledge

Protect Your Intellectual Property and Customer Data From Theft and Abuse
sponsored by TITUS
WHITE PAPER: This Forrester report shows you how to take an effective and holistic approach to data security in today's challenging environment.
Posted: 13 Nov 2015 | Published: 10 Jul 2015


Best Practices for Maintaining a Secure Enterprise
sponsored by MASERGY
EGUIDE: Access this guide for essential information on security threats, compliance concerns, and the best practices you need to adopt to overcome them.
Posted: 24 Nov 2015 | Published: 24 Nov 2015


Smart Log Monitoring and Analysis: The Key to Security Success
sponsored by LogRhythm, Inc.
EGUIDE: This expert guide discusses how you can create a strategic log monitoring and analysis program that won't get in the way of your users' privacy.
Posted: 18 Nov 2015 | Published: 18 Nov 2015

LogRhythm, Inc.
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement