IT Agents  >   IT Workforce  >   Information Technology Professionals  >  

IT Managers

RSS Feed    Add to Google    Add to My Yahoo!
IT ManagersReports
1 - 25 of 404 Matches Previous Page  | Next Page
An IT Auditor’s Guide to Security Controls & Risk Compliance
sponsored by Bit9, Inc.
WHITE PAPER: This resource details a simpler, more effective approach to compliance that aims to help your enterprise to meet Governance, Risk, and Compliance standards, while managing the systems, files, and user permissions that you need to meet the needs of your organization.
Posted: 17 Dec 2014 | Published: 17 Dec 2014

Bit9, Inc.

Healthcare Email Management: Balancing Security, Compliance, and Cost
sponsored by Mimecast
WHITE PAPER: This white paper discusses a number of email management challenges facing healthcare CIOs, including HITECH and HIPAA compliance, budget constraints, cloud-based email and collaboration technologies, and data security.
Posted: 17 Dec 2014 | Published: 17 Dec 2014

Mimecast

The Convergence of Security and Compliance
sponsored by Bit9, Inc.
WHITE PAPER: This eBook defines potential compliance and security gaps; identifies what effect these gaps can have on your organization; and reveals how a positive solution can close these gaps to ensure the security of servers and endpoints, and help to ensure compliance with industry regulations.
Posted: 16 Dec 2014 | Published: 31 Jul 2014

Bit9, Inc.

eGuide: HIPAA Security & Compliance
sponsored by Bit9, Inc.
EGUIDE: In this e-Guide, information security consultant Kevin Beaver explains a number of practical steps that you can take today to not only meet HIPAA's compliance requirements, but also to make tangible improvements to your information security program as a whole.
Posted: 16 Dec 2014 | Published: 06 Nov 2014

Bit9, Inc.

Web Application Firewall Buying Guide
sponsored by Imperva
EGUIDE: In this buyer's guide, experts explain how a WAF works, describe the features that different WAFs possess, and reveal how to weight these factors in selecting the right WAF to protect your enterprise's sensitive data.
Posted: 16 Dec 2014 | Published: 16 Dec 2014

Imperva

Hardware Security Module (HSM) Product Brief
sponsored by SafeNet, Inc.
PRODUCT OVERVIEW: This white paper introduces SafeNet's Luna SA, made for enterprises requiring strong cryptographic security for paper-to-digital initiatives, digital signatures, DNSSEC, hardware key storage, transactional acceleration, certificate signing, code or document signing, bulk key generation, data encryption, and more.
Posted: 15 Dec 2014 | Published: 09 Apr 2013

SafeNet, Inc.

Protect Your Sensitive Data Without Weighting Down Your Networks
sponsored by SafeNet, Inc.
PRODUCT OVERVIEW: This white paper introduces SafeNet's Network Encryption and Isolation solutions, which ensure data confidentiality and infrastructure isolation for your networks without impacting day-to-day operations, whether in traditional data centers or in the cloud.
Posted: 15 Dec 2014 | Published: 15 Dec 2014

SafeNet, Inc.

Top 5 Facts to Know About Data Protection from SafeNet
sponsored by SafeNet, Inc.
WHITE PAPER: This infographic showcases 5 facts about SafeNet, a leading provider of data protection solutions. View now to learn about the protection that SafeNet could bring to your organization's sensitive data.
Posted: 15 Dec 2014 | Published: 15 Dec 2014

SafeNet, Inc.

Sleeping Through the Alarm: What Breaches Should be Telling Us, and Why the Message is Missed
sponsored by SafeNet, Inc.
WHITE PAPER: This white paper reports the findings of an extensive SafeNet survey of security professionals around the world, offering insights into current market realities and their implications for security executives.
Posted: 12 Dec 2014 | Published: 11 Nov 2013

SafeNet, Inc.

SDN Security Strategies for Network Attack Prevention
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Dave Shackleford discusses the rise of software-defined monitoring; using SDN for security monitoring and packet analysis; how SDN security strategies tackle network attack prevention; and more.
Posted: 12 Dec 2014 | Published: 12 Dec 2014

Hewlett-Packard Company

Using Network Flow Analysis To Improve Network Security Visibility
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Michael Gregg explains how security professionals are turning to network flow analysis to gain improved network security visibility.
Posted: 12 Dec 2014 | Published: 12 Dec 2014

Hewlett-Packard Company

Unlock New Pathways to Network Security Architecture
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Dave Shackleford offers advice on how your organization can make the right network security architecture decisions when it comes to network isolation and segmentation to create a multi-layer attack surface.
Posted: 12 Dec 2014 | Published: 12 Dec 2014

Hewlett-Packard Company

Data Security is Stormy in the Cloud
sponsored by SafeNet, Inc.
WHITE PAPER: This infographic presents a variety of informative statistics on the widespread struggle to keep data safe in the cloud.
Posted: 11 Dec 2014 | Published: 11 Dec 2014

SafeNet, Inc.

How Organizations Are Responding to Mobile and Cloud Threats
sponsored by SafeNet, Inc.
WHITE PAPER: This white paper explores the results of a recent survey that sought to elucidate how organizations are adapting their approach to authentication to protect their sensitive assets as they adopt cloud-based services and BYOD.
Posted: 10 Dec 2014 | Published: 15 May 2014

SafeNet, Inc.

IT Professionals & Lifelong Learning: The Challenges and Opportunities Impacting Your Team
sponsored by Pluralsight
WHITE PAPER: View this white paper to discover an IT admin training solution that doesn't keep locked in a classroom away from where they matter. Don't let preconceived costs of education hold your admins back; for the same price as a traditional course, you could train your entire staff for a year. How? Read on to find out.
Posted: 08 Dec 2014 | Published: 06 Nov 2014

Pluralsight

How Would Self-Reset Password Solutions Impact Enterprises Around the World?
sponsored by Tools4ever
WHITE PAPER: This white paper explores the results of a survey on self-reset password solutions and the impact that they could have on IT helpdesks.
Posted: 08 Dec 2014 | Published: 08 Dec 2014


The Self-Service Password Reset Checklist
sponsored by Tools4ever
WHITE PAPER: This white paper will help your organization to determine whether investing in a self-service password reset solution is worth it, providing a checklist of issues that your company may encounter along the way and a number of solutions to save you time and money.
Posted: 08 Dec 2014 | Published: 08 Dec 2014


Using Anomalies in Crash Reports to Detect Unknown Threats
sponsored by Websense
WHITE PAPER: In an industry first, Websense® Security Labs™ researchers used Windows Error Reporting (WER) crash reports to detect zero-day exploits in the wild.
Posted: 03 Dec 2014 | Published: 18 Feb 2013

Websense

How Box is Securing Business Information in the Cloud
sponsored by Box
WHITE PAPER: This white paper explains why the centralization of sensitive documents in the cloud can make them easier to monitor and secure.
Posted: 02 Dec 2014 | Published: 17 Jun 2014

Box

Secure Business Information in the Cloud with Centralized Management
sponsored by Box
EBOOK: This white paper explores how a new generation of enterprise cloud services can mitigate the security challenges created by decentralized computing.
Posted: 02 Dec 2014 | Published: 17 Jun 2014

Box

Magic Quadrant for Mobile Data Protection
sponsored by Digital Guardian
WHITE PAPER: This informative resource from Gartner compares mobile data protection solutions from a number of reputable companies, which defend access to secure data on storage systems in notebooks, removable media, desktops, and servers.
Posted: 02 Dec 2014 | Published: 08 Sep 2014

Digital Guardian

The Benefits of Modernizing Your Data Center
sponsored by Genesys
WHITE PAPER: In this white paper, lean why experts encourage modernizing contact centers. As infrastructure ages, you will see end-of-life status and costly downtime. By modernizing your contact center, you lower costs by reducing hardware and the time spent maintaining outdated infrastructure while increasing revenue by improving customer touch points.
Posted: 01 Dec 2014 | Published: 05 Nov 2014

Genesys

Websense® Security Labs™: 8 Security Predictions for 2015
sponsored by Websense
WHITE PAPER: This must-read resource from Websense presents the top 8 security predictions for 2015.
Posted: 01 Dec 2014 | Published: 18 Nov 2014

Websense

Security Best Practices for a Cloud-Enabled World
sponsored by IBM
WHITE PAPER: This white paper presents a straightforward approach to cloud security that enables your enterprise to mitigate the risks associated with cloud deployment and usage; improve and standardize your security posture and practices across all environments; and more.
Posted: 01 Dec 2014 | Published: 31 Jul 2014

IBM

Mobile Cloud Security: What CXOs Need to Know
sponsored by Cisco Systems, Inc.
RESOURCE: This blog post discusses the need for end-to-end security in a mobile cloud environment.
Posted: 27 Nov 2014 | Published: 28 Nov 2014

Cisco Systems, Inc.
1 - 25 of 404 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement