IT Management  >   Systems Operations  >   Security  >  

IT Security Management

RSS Feed    Add to Google    Add to My Yahoo!
IT Security Management Reports
 
4 Countermeasures to Protect Against Ransomware
sponsored by TrendMicro
WHITE PAPER: Learn not only why ransomware is one of the favored tools of the cybercriminal, but also how enterprises fall prey to it, how it attacks their systems, and how to prevent it. Also learn common pitfalls when preparing to combat this threat, and four countermeasures to keep your data safe.
Posted: 12 Sep 2016 | Published: 12 Sep 2016

TrendMicro

The Benefits of Conducting a Network Security Overview
sponsored by Gigamon
EGUIDE: Learn the case for conducting security overviews of every enterprise initiative. By preventing rogue projects from proliferating, and adopting a holistic approach to security, you can begin to prove the value of the security team.
Posted: 20 Sep 2016 | Published: 15 Sep 2016

Gigamon

Public Key Infrastructure: Traditional Deployments vs. IoT PKI
sponsored by Certified Security Solutions (CSS)
WHITE PAPER: This white paper explores the differences between a typical enterprise Public Key Infrastructure (PKI) and an Internet of Things (IoT) PKI. Gain access to a current assessment of the state of IoT security risks and explore the unique design, deployment, and management considerations of an IoT PKI.
Posted: 20 Sep 2016 | Published: 20 Sep 2016

Certified Security Solutions (CSS)

Worried About Mobile Security? You Should be
sponsored by IBM
WHITE PAPER: Learn the importance, growth, and lethal significance of mobile security threats. Uncover why malware has exploded out of its infancy with a vengeance, how built-in security controls from vendors won't protect mobile devices, why fraudsters can effectively "fly under the radar", and more.
Posted: 01 Sep 2016 | Published: 31 Jul 2016

IBM

SHA-1 is Dead. Long live SHA-2!
sponsored by Certified Security Solutions (CSS)
WHITE PAPER: Discover how to quickly and effectively implement a SHA-1 depreciation plan to ensure that every certificate in your organization is based on the new SHA-2 algorithm. Learn why SHA-1 is out, the reasons behind deprecation timing, and best practices and resources for your SHA-2 migration.
Posted: 16 Sep 2016 | Published: 16 Sep 2016

Certified Security Solutions (CSS)

Windows 10, Enterprise Mobility Management, and the Future of PC Security and Management
sponsored by MobileIron
WHITE PAPER: This white paper examines how Windows 10, enterprise mobility management (EMM) platforms, and mobile devices are changing the way you can approach complicated security and management tasks. Uncover the top 5 PC management capabilities of EMM, key considerations in adopting an EMM platform, and more.
Posted: 13 Sep 2016 | Published: 13 Sep 2016

MobileIron

From DevOps to DevSecOps: Integrating Security
sponsored by BMC
EGUIDE: They key to launching successful DevSecOps initiatives is to help teams spread security activities throughout the development lifecycle, a skillset that experts suggest many developers lack. Discover ways to integrate security into DevOps practices, and how to encourage collaboration within these teams.
Posted: 14 Sep 2016 | Published: 07 Sep 2016

BMC

Six Key Capabilities For Securing Office 365 Email
sponsored by Proofpoint, Inc.
WEBCAST: Discover the 6 key capabilities enterprises should consider to secure their Office 365 email environment. Plus, learn common pitfalls to avoid in the planning stages.
Posted: 07 Sep 2016 | Premiered: Aug 1, 2016

Proofpoint, Inc.

Deriving Value from the Technical Security Test
sponsored by SecureWorks
WHITE PAPER: Uncover a guide for your questions as you get into the process of choosing the right provider to meet your specific security testing needs. Learn key considerations that must be implemented in the selection process for technical testing providers.
Posted: 21 Sep 2016 | Published: 31 Aug 2016

SecureWorks

Next-Generation Firewalls: An Investment Checklist
sponsored by Cisco Systems, Inc.
WHITE PAPER: What should you look for in a next-generation firewall? This paper includes a checklist against which you evaluate NGFWs; read on now to determine the benefits a truly effective NGFW can deliver, and find a NGFW that will provide actionable indications of compromise to identify malicious activity, and more.
Posted: 12 Sep 2016 | Published: 12 Sep 2016

Cisco Systems, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement