IT Management  >   Systems Operations  >   Security  >  

IT Security Management

RSS Feed    Add to Google    Add to My Yahoo!
IT Security Management Reports
Computer Manufacturer Swaps Out Guardium to Save 70% in Operating Costs
sponsored by Imperva
WHITE PAPER: One of the largest computer technology companies in the world replaced their IBM Guardium deployment with Imperva SecureSphere, to audit and protect their database environment. This case study explains how this organization switched to SecureSphere and reduced operating costs by over 70%.
Posted: 05 Oct 2015 | Published: 31 Dec 2014


Evaluate and Evolve Your Network Security Program in 10 Steps
sponsored by FireEye
WHITE PAPER: This white paper serves as a comprehensive guide for IT professionals evaluating enterprise network security. Read this report now to access the 10-step process for proper security program evaluation, how to conduct a program assessment, and more.
Posted: 21 Sep 2015 | Published: 21 Sep 2015


Actionable Threat Intelligence to Manage Supply Chain Risk
sponsored by BrightPoint Security
WHITE PAPER: This white paper tackles the issue of cybersecurity within the supply chain, suggesting a method of shared security and threat intelligence to prevent third-party vendors from putting you at risk.
Posted: 08 Sep 2015 | Published: 27 Aug 2015

BrightPoint Security

DD4BC and the Rise of Extortion
sponsored by Akamai
WEBCAST: This webcast discusses the methods, capabilities, and risks cyber-extortion groups pose to your organization.
Posted: 18 Sep 2015 | Premiered: Sep 10, 2015


2015 Cyberthreat Defense Report
sponsored by Imperva
WHITE PAPER: What are the emerging cyberthreats that companies should be most concerned about? How do you overcome the organizational barriers that inhibit IT security? Read the "2015 Cyberthreat Defense Report" to learn what matters most to the over 800 North American and European IT security decision makers surveyed.
Posted: 05 Oct 2015 | Published: 05 Oct 2015


How to Turn Data into Actionable Threat Intelligence
sponsored by BrightPoint Security
VIDEO: This brief video presents a way to automate the analysis of threat intelligence, turning it into data you can use to enhance your security.
Posted: 08 Sep 2015 | Premiered: 27 Aug 2015

BrightPoint Security

Top 10 Reasons to Strengthen Information Security with App and Desktop Virtualization
sponsored by Citrix
WHITE PAPER: In this paper we explore ten reasons why desktop virtualization should be the foundation of your layered approach to information security.
Posted: 16 Sep 2015 | Published: 03 Dec 2013


Vulnerability Remediation: If you Ranked It, You Should Have Put a Patch on It
sponsored by WhiteHat Security
WEBCAST: Access this webcast now for an in-depth review of the various web security vulnerabilities you need to protect yourself from, and also discover a step-by-step guide for remediating these threats. View it now to uncover the truth about web security.
Posted: 01 Oct 2015 | Premiered: Apr 13, 2015

WhiteHat Security

Social Threat Intelligence: A New Approach to Security
sponsored by Threatstream
TRANSCRIPT: This resource discusses social threat intelligence (STI), a collaborative approach to threat intelligence that can help you keep up with new cyber-risks.
Posted: 23 Sep 2015 | Published: 23 Sep 2015


Bypassing Security Policies using Insufficient Authorization
sponsored by WhiteHat Security
WEBCAST: This recording of a live webcast discusses the details of how Insufficient Authorization attacks work.
Posted: 01 Oct 2015 | Premiered: Apr 14, 2015

WhiteHat Security
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement