IT Management  >   Systems Operations  >   Security  >  

IT Security Management

RSS Feed    Add to Google    Add to My Yahoo!
IT Security Management Reports
 
Threat management: Essential guide
sponsored by ComputerWeekly.com
EGUIDE: Security is about reducing risk, while assessing risk is all about understanding the cyber threats facing the enterprise, which in turn is about recognising that not all threats are external and that threat intelligence is a key element of threat management.
Posted: 25 Nov 2016 | Published: 25 Nov 2016

ComputerWeekly.com

Mitigating The Impact of Critical IT Events
sponsored by Splunk
RESOURCE: In this infographic, learn more about the damage caused by CIEs and how you can mitigate the costs associated with downtime, boost productivity, and improve visibility into operations.
Posted: 15 Nov 2016 | Published: 15 Nov 2016

Splunk

Security Overview: SSL/TLS Traffic
sponsored by Blue Coat Systems
WHITE PAPER: Uncover an overview of Secure Socket Layer (SSL)/ Transport Layer Security (TLS) technology and find examples of how you can manage the increasing SSL traffic within your enterprise network and protect it from hidden threats.
Posted: 17 Nov 2016 | Published: 31 Oct 2016

Blue Coat Systems

Market Analysis for 18 Featured Endpoint Protection Platforms
sponsored by Trend Micro
WHITE PAPER: Endpoint protection platforms (EPPs) provide a collection of security capabilities to protect PCs, smartphones and tablets. Learn from analysts about 18 featured EPPs with capabilities such as anti-malware, personal firewall, and more.
Posted: 22 Nov 2016 | Published: 01 Feb 2016

Trend Micro

5 Questions To Answer Before You Buy Into Or Renew Your Maintenance With Veritas
sponsored by Commvault
WHITE PAPER: Learn five reasons why you should rethink your data protection and information management vendor. Discover how factors like the scale of your organization, business attitude, innovation, and, most importantly, value should affect your next vendor decision.
Posted: 01 Dec 2016 | Published: 30 Nov 2016

Commvault

The business of Ransomware: What every CXO should know
sponsored by Code42
WHITE PAPER: Learn the hard numbers of how bad ransomware has gotten in recent years, why criminals are launching these attacks in ever-increasing numbers, and how to develop an effective strategy to combat this threat.
Posted: 16 Nov 2016 | Published: 16 Nov 2016

Code42

The Top Cybersecurity Risks – And How Enterprises Are Responding
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Download this report, based on a 2016 Strategic Cybersecurity Survey of 300 IT and security professionals, to discover key strategies to promote smooth sailing when navigating your organization through the shifting threat management landscape, including also a risk assessment of cloud providers.
Posted: 23 Nov 2016 | Published: 31 Oct 2016

Arctic Wolf Networks, Inc.

Dynamic Security Management for a Productive Mobile Workforce
sponsored by RES Software
WHITE PAPER: This white paper explores how to protect your business from advanced threats with a new approach to managing mobile security, identity and access management, and governance. Uncover key benefits that will increase IT's control and boost productivity, like app-level security against ransomware, secure onboarding, simplified compliance, and more.
Posted: 17 Nov 2016 | Published: 24 May 2016

RES Software

Trends in Mobile User Authentication
sponsored by HID
WHITE PAPER: Learn the effects of growing mobility within companies, emerging crucial challenges for mobile security, strategies for mobile security success, and more.
Posted: 01 Dec 2016 | Published: 01 Dec 2016

HID

The Threat Lifecycle Management Framework
sponsored by LogRhythm, Inc.
WHITE PAPER: You can lessen your organization's risk of experiencing a damaging cyber incident or data breach by understanding six key phases of threat lifecycle management (TLM.) Discover how integrated TLM capabilities can optimally reduce mean time to detect (MTTD) and mean time to respond (MTTR.)
Posted: 30 Nov 2016 | Published: 30 Nov 2016

LogRhythm, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement