IT Management  >   Systems Operations  >   Security  >  

IT Security Management

RSS Feed    Add to Google    Add to My Yahoo!
IT Security ManagementReports
 
Managing IT Risk: Trends in Global Information Security
sponsored by Hewlett-Packard Limited
WEBCAST: Tune in to this informative webcast to hear industry veterans explore the top strategies for dealing with cyber threats, meeting compliance, and adapting to the newest developments in the security world, such as mobile device management. Click
Posted: 04 Sep 2014 | Premiered: Jun 30, 2014

Hewlett-Packard Limited

Online Brand Infringement: Where Do You Start?
sponsored by DomainTools
WHITE PAPER: In this informative white paper, discover a new brand monitoring solution that can quickly identify and notify you of any domain registration that possibly infringes on your brand.
Posted: 28 Aug 2014 | Published: 28 Aug 2014

DomainTools

Identity management compliance How IAM systems support compliance
sponsored by IBM
EGUIDE: In this expert e-guide, learn about the identity management and compliance relationship, including how to ensure IAM technology and processes effectively support enterprise compliance.
Posted: 11 Sep 2014 | Published: 11 Sep 2014

IBM

SearchHealthIT Sits Down with Joy Pritts to Discuss Privacy Risks of Mobile Health Apps
sponsored by Dell, Inc.
EGUIDE: Joy Pritts of ONC sits down with SearchHealthIT to discuss the key issues she sees playing out in health IT in the near and long-term future, as well as her thoughts on mobile data sharing.
Posted: 05 Sep 2014 | Published: 05 Sep 2014

Dell, Inc.

Be Ready for Cyber-Attacks with New Endpoint Security and Monitoring Solutions
sponsored by Bit9 + Carbon Black
WHITE PAPER: In this helpful white paper, uncover a new endpoint threat detection platform that can prepare your organization to fight back against inevitable cyber-attacks.
Posted: 25 Aug 2014 | Published: 25 Aug 2014

Bit9 + Carbon Black

How SIEM Helps IT Security, Compliance, Operations and Management
sponsored by CDW Corporation
WHITE PAPER: Security information and event management (SIEM) tools offer more than just security. In fact, many organizations overlook some of the most useful aspects of SIEM technology, including fraud prevention and operations management. In this expert resource, discover the value of SIEM tools for four different audiences.
Posted: 12 Sep 2014 | Published: 12 Sep 2014

CDW Corporation

Ready, Aim, HP Fortify!
sponsored by Hewlett-Packard Company
WHITE PAPER: In this case study, discover how the U.S. Army uses a particular software to help prevent attacks to the TAMIS system.
Posted: 10 Sep 2014 | Published: 01 Oct 2013

Hewlett-Packard Company

Truly Mobile File and Print Solution Provides Enterprise-Wide Coverage
sponsored by Novell, Inc.
WHITE PAPER: In this informative white paper, discover a new enterprise-class mobile file and print solution that provides file syncing, sharing, and printing to users wherever they are – all without compromising compliance or security standards.
Posted: 15 Sep 2014 | Published: 31 Dec 2012

Novell, Inc.

451 Research Report: AlienVault USM - A Security Operations Center for the SMB
sponsored by AlienVault
WHITE PAPER: This in-depth 451 Research analysis examines AlienVault, a security vendor tailored for small and midsize businesses.
Posted: 05 Sep 2014 | Published: 05 Sep 2014

AlienVault

Identity and access management (IAM) in the cloud Challenges galore
sponsored by IBM
EGUIDE: This expert e-guide points out challenges surrounding IAM in the cloud that Indian businesses are now dealing with.
Posted: 11 Sep 2014 | Published: 11 Sep 2014

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement