IT Management  >   Systems Operations  >   Security  >  

IT Security Management

RSS Feed    Add to Google    Add to My Yahoo!
IT Security Management Reports
 
Strengthen Desktop Virtualization Security by Minimizing Endpoint Attack Surfaces
sponsored by Dell, Inc.
WHITE PAPER: Access this white paper to explore why IT professionals are increasingly adopting desktop virtualization paired with thin client solutions to significantly reduce risks and improve protection at endpoints. Examine thin client solutions to help you select one that can best support enhanced endpoint security for your organization.
Posted: 22 Jun 2016 | Published: 22 Jun 2016

Dell, Inc.

The Top Three Benefits of SIEM
sponsored by Intel
EGUIDE: SIEM offers support for automating compliance reporting, incident detection and incident handling activating, making it a necessity for every organization. Discover how these three benefits make SIEM so integral to the success of a modern security strategy.
Posted: 07 Jun 2016 | Published: 25 May 2016

Intel

3 Reasons to Move to a Managed Security Service Provider
sponsored by MASERGY
MICROSITE: The cyberthreat landscape is growing with every technological advance. Learn how managed security service providers (MSSPs) can help bring the manpower to your constrained IT department by bringing new innovative services and approaches.
Posted: 27 May 2016 | Published: 17 Jun 2015

MASERGY

How Tech-Savvy Workers are Affecting Enterprise Security
sponsored by Unisys
RESOURCE: Rising cybercrime attacks are costing the global economy a fortune. Learn more about what leading experts have to say about the impact that the digitally-enabled workers has on IT infrastructure and the enterprise at large.
Posted: 14 Jun 2016 | Published: 14 Jun 2016

Unisys

How to Decide on Next-Gen Firewalls
sponsored by Fortinet, Inc.
EGUIDE: Firewalls are must-have network security tools and a new generation of firewalls is emerging. This comprehensive guide examines next-generation firewalls, how to evaluate vendors and what to consider before making a purchase.
Posted: 07 Jun 2016 | Published: 06 Jun 2016

Fortinet, Inc.

The Impacts of Organizations Not Keeping Up with Cybercriminals
sponsored by Proofpoint, Inc.
EGUIDE: Organizations are struggling to keep up with rapid changes in security techniques by cybercriminals. In this expert guide, explore the 4 main threats that occurred in 2015, how social media is increasing as a source of brand and compliance risk, and receive a product overview of Proofpoint Enterprise Protection.
Posted: 14 Jun 2016 | Published: 07 Jun 2016

Proofpoint, Inc.

The Challenge Of Securing And Managing Today's Complex Network Environments
sponsored by Fortinet, Inc.
RESOURCE: This Forrester research report identifies the modern threats to enterprise IT and provides key recommendations for implementing firewalls and centralized management solutions, plus building protections into your network operations to thwart increasingly frequent and sophisticated attacks.
Posted: 13 Jun 2016 | Published: 29 Jan 2016

Fortinet, Inc.

DLP Tools Essential to Data Protection Strategy
sponsored by Intel Security
EGUIDE: Network-based data loss prevention (DLP) tools are designed to track, log and prevent unauthorized access to sensitive data. In this e-guide, learn more about DLP concepts, and products designed to support a robust sensitive data protection strategy.
Posted: 14 Jun 2016 | Published: 07 Jun 2016

Intel Security

Gain Capabilities to help you Protect, and Insight to Understand
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: As threats evolve, organizations must find ways to continuously detect, prevent, and respond quickly to attacks on the endpoint in order to limit damages. Discover a strategy that can help you protect endpoint devices against advanced and zero-day threats.
Posted: 10 Jun 2016 | Published: 10 Jun 2016

Check Point Software Technologies Ltd.

Data protection and security incident response when all information is a target
sponsored by Intel
EGUIDE: As cyberattacks continue become more sophisticated, companies have been forced to escalate cybersecurity risk management activities. This guide provides the benefits and steps to developing better methods for identifying imminent cyberattacks and preventing data breaches.
Posted: 09 Jun 2016 | Published: 26 May 2016

Intel
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement