IT Management  >   Systems Operations  >   Security  >  

IT Security Management

RSS Feed    Add to Google    Add to My Yahoo!
IT Security Management Reports
 
Trusted Identities: An Imperative for Digital Transformation
sponsored by Entrust, Inc.
WHITE PAPER: Learn how with a trusted identity, enterprises can be bold, but without it, they limit the business potential and the level of innovation through newly introduced risks.
Posted: 16 Mar 2017 | Published: 16 Mar 2017

Entrust, Inc.

Myth vs. Reality: What You Need to Know About Microsoft Office 365 Backup
sponsored by Unitrends
WHITE PAPER: Learn how data loss occurs in cloud applications, as well as how to restore email in seconds instead of hours, recover files even after Office 365 purges, safeguard all of your users' data, and more.
Posted: 13 Mar 2017 | Published: 13 Mar 2017

Unitrends

Protect Your Data from Malicious Ransomware Threats
sponsored by Veeam Software
WHITE PAPER: Ransomware attacks are on the rise, with almost 40% of businesses attacked. Even with strong countermeasures, networks are constantly penetrated. Access this white paper now to learn how to mitigate the risk of succumbing to a ransomware attack.
Posted: 24 Mar 2017 | Published: 24 Mar 2017

Veeam Software

Case Study: ABLE Distributors
sponsored by Nerdio
CASE STUDY: Download this case study to find out how Nerdio's private cloud storage solution with a phased in virtual desktop infrastructure helped Able Distributors properly manage rapid company growth and streamline communications between offices.
Posted: 21 Mar 2017 | Published: 21 Mar 2017

Nerdio

Your Guide to Trends in Mobile User Authentication
sponsored by HID
WHITE PAPER: Discover the ever-expanding role of mobile devices in corporate IT in broadening the network perimeter; how this shift is giving users unprecedented access to resources, but also introduces a host of new security considerations; and how the risk of unauthorized access to these devices adds new requirements for user authentication.
Posted: 28 Mar 2017 | Published: 24 Mar 2017

HID

Six Steps to a Better Security Strategy
sponsored by Armor
WHITE PAPER: In this Forrester report, discover 6 straightforward steps you can take immediately to start building a truly business-savvy security strategy.
Posted: 08 Mar 2017 | Published: 22 Jan 2016

Armor

Safeguard Data Stored and Managed in Cloud Environments
sponsored by Gemalto
WHITE PAPER: This white paper will serve as a measuring stick for your current encryption as well as a template to take it to the next level. To truly keep company data safe from unauthorized access you'll need an encryption strategy that considers every facet of the process: from the coding of the data to the creation and management of the encryption keys.
Posted: 15 Mar 2017 | Published: 15 Mar 2017

Gemalto

Encrypt Everything: How to Un-share and Secure Your Sensitive Data
sponsored by Gemalto
WHITE PAPER: Learn how to find a way to balance critical business needs and requirements, while protecting your data from malicious threats.
Posted: 15 Mar 2017 | Published: 15 Mar 2017

Gemalto

How To Limit Privileged Accounts And Boost Security
sponsored by Devolutions
EGUIDE: Too many privileged accounts can result in access abuse in enterprises.This expert e-guide details which account privileges should be limited to reduce security incidents, how pervasive the risk is, and the challenges associated with privileged accounts.
Posted: 20 Mar 2017 | Published: 15 Mar 2017

Devolutions

Top 5 Considerations: What to Look For in Mobile Banking Security
sponsored by HID
RESOURCE: Uncover 5 IAM considerations for choosing a mobile banking security tool. Also discover a concise market overview of mobile banking apps, including a look at opportunities for growth and major obstacles.
Posted: 22 Mar 2017 | Published: 22 Mar 2017

HID
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement