IT Management  >   Systems Operations  >   Security  >  

IT Security Management

RSS Feed    Add to Google    Add to My Yahoo!
IT Security Management Reports
Intellectual Property: Safeguarding Your Organization's Identity
sponsored by TITUS
WHITE PAPER: This infographic has some fast facts about the rate and the risks of IP theft. Take a look to learn how much danger your IP is in – and how you can better keep it safe.
Posted: 11 Nov 2015 | Published: 31 Dec 2013


Staying One Step Ahead with Zero-Day Protection
sponsored by Check Point Software Technologies Ltd.
WEBCAST: This webcast examines how you can stop today's advanced hackers. Watch and learn how sandboxing, CPU-level detection and more can keep your organization secure from even the most sophisticated threats.
Posted: 16 Nov 2015 | Premiered: Sep 22, 2015

Check Point Software Technologies Ltd.

Make Your SIEM the Best It Can be
sponsored by
EBOOK: This resource will help you use your SIEM system to your utmost advantage.
Posted: 09 Nov 2015 | Published: 09 Nov 2015

State of Security Operations: The 2015 Report on Cyber Defense Maturity
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This report brings you the latest information on the capabilities of today's security operations centers and how they need to improve.
Posted: 23 Nov 2015 | Published: 23 Nov 2015

Hewlett Packard Enterprise

Practical Threat Management and Incident Response for the Small-to-Medium-Sized Enterprise
sponsored by AlienVault
WHITE PAPER: In this white paper, examine several security controls and how they can change the outcome of an attack. Continue reading for industry advice for evaluating today's security control options.
Posted: 17 Nov 2015 | Published: 18 Jun 2014


A Report on the Critical Capabilities Required for High-Security Mobility Management
sponsored by Good Technology
ANALYST REPORT: In this exclusive analyst report, you will learn how to achieve increased protection in mobile markets using a hybrid mix of enterprise mobility management (EMM), platform and security vendors. Read on to ensure your EMM vendor will support business processes without disruptions.
Posted: 23 Nov 2015 | Published: 29 Jul 2015

Good Technology

A Closer Look at Database Security and Steps For Purchasing
sponsored by Oracle Corporation
WHITE PAPER: This expert guide discusses how you can improve your security by including database protection in your defenses.
Posted: 05 Nov 2015 | Published: 05 Nov 2015

Oracle Corporation

Identification and Credentialing: Secure and Verify Identity with Biometrics
sponsored by Unisys
WHITE PAPER: This white paper highlights an identity and access management solution that utilizes biometrics. Learn how to implement a security architecture that grants access based on workflow, biometric types, and hardware and software vendors.
Posted: 06 Nov 2015 | Published: 30 Jun 2015


Reduce Attack Surface and Compliance Risks with Unified Threat Protection
sponsored by Proofpoint, Inc.
WEBCAST: In this webcast, Joe Diamond, Director of Product Marketing for Information Protection at Proofpoint, explains how to protect your sensitive information from malicious attacks, system glitch, and human error with ongoing security solutions. View now to reduce your attack surface with automated classification.
Posted: 05 Nov 2015 | Premiered: Nov 5, 2015

Proofpoint, Inc.

Cybersecurity Investment Pays More Than Monetary Dividends
sponsored by Unisys
EGUIDE: This e-guide discusses the mutual benefits of a strategic partnership between cybersecurity startups and investment firms. View now to learn how your business can earn more than just dividends and reap the benefits of working with new, problem-solving technology.
Posted: 20 Nov 2015 | Published: 20 Nov 2015

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement