IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Device Security Policies

RSS Feed    Add to Google    Add to My Yahoo!
Device Security Policies Reports
Encrypted Network Security Solutions - Infographic
sponsored by Unisys
RESOURCE: Learn about an innovative approach to securing your network in this infographic.
Posted: 18 Nov 2015 | Published: 04 Nov 2015


Protect Your Intellectual Property and Customer Data From Theft and Abuse
sponsored by TITUS
WHITE PAPER: This Forrester report shows you how to take an effective and holistic approach to data security in today's challenging environment.
Posted: 13 Nov 2015 | Published: 10 Jul 2015


How Partitioning Technology Delivers Consolidation Without Compromising Performance, Security, or Isolation
sponsored by Unisys
WHITE PAPER: In this white paper learn about a new partitioning technology that is architected, designed, and developed to deliver a predictable, secure, scalable, distributed environment. Read on to see a comparison of modern partitioning vs. virtualization options.
Posted: 04 Nov 2015 | Published: 31 Dec 2014


Mobile Security by Design: Reducing risk with an integrated approach
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: In this white paper, find tips and tricks for mobile security and mobile management planning.
Posted: 13 Apr 2015 | Published: 31 Dec 2014

Hewlett-Packard Enterprise

The Future of Threat Intelligence for the Service Provider
sponsored by Webroot
WHITE PAPER: This white paper examines the unique opportunities today's threat landscape to service providers and discusses how you can best provide threat intelligence to your clients.
Posted: 31 Aug 2015 | Published: 31 Aug 2015


Deliver Secure Enterprise Information on Android, Apple, and Microsoft Devices
sponsored by Citrix
WHITE PAPER: This white paper reviews an identity-based provisioning and control tool for all apps, data, and devices that will secure sensitive business information without hindering productivity. Learn how the security of mobile devices differs from the security of a legacy PC, and protect your information with any OS.
Posted: 27 Oct 2015 | Published: 30 Apr 2014


Study: The Impact of Business Continuity Management
sponsored by IBM
WHITE PAPER: This research report analyzes the impacts of business continuity management on the cost of a cyber-breach.
Posted: 20 Aug 2015 | Published: 30 Jun 2015


Cyber security: Balancing risks and controls for finance professionals
sponsored by
RESEARCH CONTENT: The finance community is becoming more aware of the impact of cyber security but there is scope for significant improvement, according to this report from Ernst & Young.
Posted: 21 Jul 2015 | Published: 21 Jul 2015

State of Security Operations: The 2015 Report on Cyber Defense Maturity
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This report brings you the latest information on the capabilities of today's security operations centers and how they need to improve.
Posted: 23 Nov 2015 | Published: 23 Nov 2015

Hewlett Packard Enterprise

Security Essentials for CIO's: Establishing a Department of Yes
sponsored by IBM
WHITE PAPER: This white paper presents a five-step process for enterprise security that allows you to encourage business innovation without putting your business at risk.
Posted: 26 Aug 2015 | Published: 31 Mar 2012

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement