IT Management  >   Systems Operations  >   Security  >  

IT Security Management

RSS Feed    Add to Google    Add to My Yahoo!
IT Security Management Reports
 
The 5 Challenges of Data Security
sponsored by IBM
WHITE PAPER: In this white paper, learn the five challenges regarding data security today. Additionally, read on to uncover the five steps to strengthening your data security strategy.
Posted: 09 Mar 2015 | Published: 10 Sep 2014

IBM

3 Ways Anomaly Detection Improves IT Operations
sponsored by Prelert
WHITE PAPER: Read this white paper to discover the three ways anomaly detection can streamline and enhance your risk management strategy.
Posted: 26 Mar 2015 | Published: 31 Dec 2014

Prelert

South Washington Co. Schools: redefining the network
sponsored by Hewlett-Packard Limited
WHITE PAPER: As a result of the exponential growth in wireless devices, South Washington County Schools needed an easier way to maintain security and manage both wired and wireless networks. Read this case study to learn more about the structure the school implemented to improve security.
Posted: 16 Mar 2015 | Published: 16 Mar 2015

Hewlett-Packard Limited

SIEM Battleground Unfolds Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This classroom looks at next-generation security information and event management (SIEM), analytic tools and cloud-based systems designed to help CISOs make sense of security data.
Posted: 05 Mar 2015 | Premiered: 16 Mar 2015

SearchSecurity.com

Get a Closer Look at Security Alerts
sponsored by Prelert
WEBCAST: Watch this webinar to discover how anomaly detection can update your IT for today's security environment.
Posted: 24 Mar 2015 | Premiered: Mar 24, 2015

Prelert

The 3 Third Party Software Security Controls
sponsored by Veracode, Inc.
WHITE PAPER: In this informative white paper, you will uncover the three control types to improve information protection when using third party services and products. Read on to learn how these recommended approaches increase risk management practices effectiveness and enable remediation post-production avoidance.
Posted: 02 Mar 2015 | Published: 04 Dec 2014

Veracode, Inc.

Endpoint Security for OS X
sponsored by ESET
WHITE PAPER: This white paper introduces a comprehensive OS X security system that provides you with mixed environment endpoint security.
Posted: 11 Mar 2015 | Published: 11 Mar 2015

ESET

Why Every IT Security Team Needs Anomaly Detection Software
sponsored by Prelert
WHITE PAPER: This white paper gives you the ins and outs of anomaly detection, including how it works and what its benefits are.
Posted: 25 Mar 2015 | Published: 31 Dec 2014

Prelert

Future Security Fortification - The Road Ahead
sponsored by IBM
WHITE PAPER: In this white paper, learn the expected security challenges your company may face in the next 5 years. Read on to uncover tips and best practices for securing your organization against these threats.
Posted: 23 Mar 2015 | Published: 04 Dec 2014

IBM

How Hybrid DNS Can Save Your Security
sponsored by Efficientip
WHITE PAPER: This white paper suggests how you can protect your web site security with a hybrid DNS system.
Posted: 06 Mar 2015 | Published: 31 Dec 2014

Efficientip
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement