IT Management  >   Systems Operations  >   Security  >  

IT Security Management

RSS Feed    Add to Google    Add to My Yahoo!
IT Security Management Reports
Dow Corning Uses Classifications Labels to Help Protect Intellectual Property
sponsored by TITUS
WHITE PAPER: This short case study shows how one multinational company deployed an enterprise-wide classification management system which had the power to easily control document access.
Posted: 16 Nov 2015 | Published: 16 Nov 2015


Intellectual Property: Safeguarding Your Organization's Identity
sponsored by TITUS
WHITE PAPER: This infographic has some fast facts about the rate and the risks of IP theft. Take a look to learn how much danger your IP is in – and how you can better keep it safe.
Posted: 11 Nov 2015 | Published: 31 Dec 2013


State of Security Operations: The 2015 Report on Cyber Defense Maturity
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This report brings you the latest information on the capabilities of today's security operations centers and how they need to improve.
Posted: 23 Nov 2015 | Published: 23 Nov 2015

Hewlett Packard Enterprise

Cybersecurity Investment Pays More Than Monetary Dividends
sponsored by Unisys
EGUIDE: This e-guide discusses the mutual benefits of a strategic partnership between cybersecurity startups and investment firms. View now to learn how your business can earn more than just dividends and reap the benefits of working with new, problem-solving technology.
Posted: 20 Nov 2015 | Published: 20 Nov 2015


Threat Intelligence Networks: The Next Generation
sponsored by Symantec Corporation
WEBCAST: This video discusses how information security architecture has shifted the focus of threat intelligence from reactive protection for individual threats to proactive risk management. Learn how you can build security into your infrastructure by utilizing an ecosystem of products that work together to minimize the risks of a data breach.
Posted: 11 Nov 2015 | Premiered: Nov 11, 2015

Symantec Corporation

The ESG Cybersecurity Maturity Model
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Based on their research, Enterprise Strategy Group has developed a cyber security maturity model that classifies organizations as basic, progressing, or advanced.
Posted: 12 Nov 2015 | Published: 22 Oct 2014

Hewlett Packard Enterprise

Secure Cloud Application Usage: Protect the Business Against Cloud-Based Threats
sponsored by IBM
WHITE PAPER: This essential solution brief highlights a SaaS solution that integrates cloud discovery, threat intelligence and prevention, policy enforcement, identity as a service, and more into one solution. Access now to see how this solution can simplify and secure your cloud application use as well as help protect against user and cloud-based threats.
Posted: 10 Nov 2015 | Published: 30 Sep 2015


Special Report: Incident Response Capabilities Needed
sponsored by Hewlett Packard Enterprise
WHITE PAPER: The SANS 2015 survey of the incident response capabilities found both good news and bad news. Read on to discover what the survey found and what those results mean for your organization.
Posted: 24 Nov 2015 | Published: 31 Aug 2015

Hewlett Packard Enterprise

Report: 2015 Cybersecurity Intelligence Index
sponsored by IBM
WHITE PAPER: In this report, you'll uncover the major threats to businesses worldwide over recent years, and how companies can better detect and insulate themselves from future attacks in the face of new technology.
Posted: 30 Nov 2015 | Published: 31 Jul 2015


Defending against DDoS Attacks in the Financial Sector
sponsored by Akamai
WHITE PAPER: This white paper discusses how you can protect your financial organization against sophisticated DDoS attacks.
Posted: 17 Nov 2015 | Published: 05 Nov 2015

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement