IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Device Security Policies

RSS Feed    Add to Google    Add to My Yahoo!
Device Security Policies Reports
Mobile Policies: How to Write Guidelines Employees Will Follow
sponsored by BlackBerry
WHITE PAPER: This white paper acts as a template to help you build a mobile computing policy that your employees will understand and follow as you implement a BYOD or COPE strategy.
Posted: 16 Apr 2015 | Published: 16 Apr 2015


Revolutionizing Advanced Threat Protection
sponsored by Blue Coat Systems
WHITE PAPER: This white paper suggests ways for you to create a comprehensive security system that works against today's complex threat landscape.
Posted: 06 Apr 2015 | Published: 31 Jul 2014

Blue Coat Systems

Security Audit Checklist
sponsored by Digital Guardian
RESOURCE: This checklist presents the 12 most common questions in a client data protection audit to get your organization ready to meet stringent partner or supplier data management requirements. Continue reading to assess your security strategy and prepare for an audit.
Posted: 09 Jun 2015 | Published: 29 Apr 2015

Digital Guardian

Security Essentials for CIO's: Secure the Extended Workplace
sponsored by IBM
WHITE PAPER: This white paper discusses the problems third party contractors pose to security and gives tips for ensuring your business partnerships are as safe as possible.
Posted: 28 Aug 2015 | Published: 30 Sep 2012


State of Security Operations: The 2015 Report on Cyber Defense Maturity
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This report brings you the latest information on the capabilities of today's security operations centers and how they need to improve.
Posted: 23 Nov 2015 | Published: 23 Nov 2015

Hewlett Packard Enterprise

Protect Your Intellectual Property and Customer Data From Theft and Abuse
sponsored by TITUS
WHITE PAPER: This Forrester report shows you how to take an effective and holistic approach to data security in today's challenging environment.
Posted: 13 Nov 2015 | Published: 10 Jul 2015


A Guide to a Multifaceted Security Strategy
sponsored by Dell SecureWorks
WHITE PAPER: This white paper can help you develop an innovative approach for catching even the most advanced malware.
Posted: 18 Mar 2015 | Published: 01 Jan 2015

Dell SecureWorks

Breaking Bad: The Risk of Insecure File Sharing
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper explores the risks and vulnerabilities of using file sync and share solutions and ungoverned practices. Read on to learn the 11 key steps to protecting data in the collaborative file-sharing environment.
Posted: 01 May 2015 | Published: 15 Oct 2014

IntraLinks, Inc

Secure the Mobile Enterprise
sponsored by IBM
WHITE PAPER: As enterprises explore the use of mobile applications, new processes have to be built to secure these applications against compromise. This white paper addresses the unique risks associated with mobile devices, and the capabilities you should consider when building your roadmap to safeguarding data and applications.
Posted: 30 Jul 2015 | Published: 30 Jul 2015


Companies Turn To Partners for Managed Network Security Services
sponsored by IBM
EGUIDE: This eGuide explains why many companies are turning to service providers to manage network security.
Posted: 23 Oct 2015 | Published: 23 Oct 2015

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement