Business of Information Technology  >   Business Management  >   Content Management  >  


RSS Feed    Add to Google    Add to My Yahoo!
Filtering Reports
The Power of Collaboration with an Expiration Date and Data-Centric Security
sponsored by BlackBerry
WHITE PAPER: In this white paper, you will learn the role of data-centric security in expiration collaboration. Access this paper now to see why the movement of consumers to apps like Snapchat clearly presages a similar move for enterprises to EFSS tools with real expiration built in.
Posted: 12 Oct 2015 | Published: 12 Oct 2015


Best Practices for Preventing Malware
sponsored by
EGUIDE: Preventing malware has been a constant issue for both consumers and businesses since the beginning. Malware can often present itself in all areas of an industry, including both new and old methods. Check out this E-Guide to discover the best practices for inhibiting malware from affecting both your business and your customers.
Posted: 21 Nov 2011 | Published: 21 Nov 2011

Meeting the Challenges of HIPAA Compliance, Phishing Attacks, and Mobile Security
sponsored by Proofpoint, Inc.
WHITE PAPER: This white paper examines three top healthcare security challenges—stricter regulations, inbound threats, and mobile IT. Read on to protect PHI and other confidential data from inbound security threats while embracing mobile computing technologies and security as a service (SaaS).
Posted: 05 Nov 2015 | Published: 31 Dec 2013

Proofpoint, Inc.

The Digital Revolution, Simplified: Reinventing Mobile App Development with the Cloud
sponsored by Oracle Corporation
WEBCAST: This webcast previews a platform for cloud-based, backend mobile services that makes app development quicker, secure and easier to deploy. View now to access a strategy that offers rich mobile analytics, enabling enterprises to make smart business decisions.
Posted: 19 Aug 2015 | Premiered: Aug 19, 2015

Oracle Corporation

Survey: Security Spending and Preparedness in the Financial Sector
sponsored by LogRhythm, Inc.
WHITE PAPER: In this report, you'll find the results of a survey that reveals how financial organizations are adapting to new security concerns and how they need to do better.
Posted: 04 Aug 2015 | Published: 04 Aug 2015

LogRhythm, Inc.

The 2015 Rise of the Mobile Workforce in Asia Pacific
sponsored by Dimension Data
WHITE PAPER: In this white paper, you will learn about the state of the mobile workforce in 2015. Discover how to embrace successful end-user computing, key into MDM's relationship with market maturity, and see why mobile IT management and enterprise mobile apps are set to dominate in 2016.
Posted: 29 Oct 2015 | Published: 29 Oct 2015

Dimension Data

The Top 10 Must-Haves for Secure Enterprise Mobility Management
sponsored by Citrix
WHITE PAPER: Security is the primary inhibitor to both enterprise mobility and BYOD programs. In this white paper, you will learn the 10 must-ask questions for EMM solution providers regarding their mobility security frameworks.
Posted: 27 Oct 2015 | Published: 31 May 2013


Software-Defined Data Center Meets Micro-Segmentation
sponsored by VMware
WHITE PAPER: This white paper explains how to deploy advanced security inside your data center with micro-segmentation, which will deliver the operational agility of network virtualization.
Posted: 26 Aug 2015 | Published: 13 Dec 2013


Closing the Data Privacy Gap: Protecting Sensitive Data in Non-Production Environments
sponsored by IBM
WHITE PAPER: This White Paper explains why protecting sensitive information and ensuring privacy have become high priorities.
Posted: 14 Mar 2008 | Published: 01 Aug 2007


Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway
sponsored by Websense, Inc.
WHITE PAPER: The best way to address Web 2.0 threats is to combine the best aspects of traditional security and control techniques with new technology designed to address the dynamic, real-time nature of Web 2.0. This paper describes how one such solution enables you to quickly implement a best practices approach to making Web 2.0 secure and effective.
Posted: 18 Aug 2009 | Published: 18 Jun 2009

Websense, Inc.
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement