IT Management  >   Systems Operations  >   Security  >  

IT Security Management

RSS Feed    Add to Google    Add to My Yahoo!
IT Security ManagementReports
 
The Next Generation of Data-Driven Security
sponsored by MapR Technologies
WHITE PAPER: In this in-depth white paper, get the facts on how new adaptive algorithms like Machine Learning and Big Data can identify security risks that other outdated techniques simply couldn't.
Posted: 02 Sep 2014 | Published: 30 Jun 2014

MapR Technologies

Have Control Over Remote Access—It's Time to Deploy New Laptops
sponsored by Dell, Inc. and Windows 8 Pro
WHITE PAPER: This white paper reveals several helpful tips surrounding the secure deployment of new laptops.
Posted: 08 Sep 2014 | Published: 08 Sep 2014

Dell, Inc. and Windows 8 Pro

Managing IT Risk: Trends in Global Information Security
sponsored by Hewlett-Packard Limited
WEBCAST: Tune in to this informative webcast to hear industry veterans explore the top strategies for dealing with cyber threats, meeting compliance, and adapting to the newest developments in the security world, such as mobile device management. Click
Posted: 04 Sep 2014 | Premiered: Jun 30, 2014

Hewlett-Packard Limited

Bloomberg Research - Business/IT view of App Security
sponsored by Hewlett-Packard Company
WHITE PAPER: In this Bloomberg research report, learn about the security issues surrounding mobile applications. Discover what business leaders and IT decision-makers agree and disagree on in regard to mobile apps, and why both groups are reluctant to express total satisfaction with their current ability to take advantage of the mobility trend.
Posted: 05 Sep 2014 | Published: 05 Sep 2014

Hewlett-Packard Company

Combatting Digital Fraud: A CIO Report
sponsored by RSA, The Security Division of EMC
WHITE PAPER: In this informative white paper, explore a web threat detection solution that leverages big data to enable security teams to better combat digital fraud.
Posted: 29 Aug 2014 | Published: 30 Jun 2014

RSA, The Security Division of EMC

Virtualization Security: Choosing the Right Strategy for Your Organization
sponsored by Kaspersky Lab
WHITE PAPER: In this helpful resource, discover new virtualization security solutions that could be the key to keeping your virtual assets protected while preserving performance.
Posted: 25 Aug 2014 | Published: 25 Aug 2014

Kaspersky Lab

App Security: Decompiling Android APK Files
sponsored by CDW Corporation
EGUIDE: In this informative e-guide, expert Andrew Hogg takes you through the steps of reverse-engineering Android applications for the purpose of scoping out security weaknesses.
Posted: 29 Aug 2014 | Published: 29 Aug 2014

CDW Corporation

In the Age of BYOD, How Do You Secure the Workforce?
sponsored by Imation Corp.
WHITE PAPER: In this white paper, explore the impact of the BYOD trend by implementing this strategy within your own business.
Posted: 12 Sep 2014 | Published: 31 Dec 2013

Imation Corp.

Identity management compliance How IAM systems support compliance
sponsored by IBM
EGUIDE: In this expert e-guide, learn about the identity management and compliance relationship, including how to ensure IAM technology and processes effectively support enterprise compliance.
Posted: 11 Sep 2014 | Published: 11 Sep 2014

IBM

Analyst Report: How 9 Managed Security Service Providers Stack Up
sponsored by IBM
ANALYST REPORT: This Forrester Research, Inc. report identifies 9 managed security services providers (MSSPs) – AT&T, CSC, IBM, and more – that were researched, analyzed, and compared against one another. Explore how each provider stacks up against three categories: current offering, strategy, and market presence.
Posted: 26 Aug 2014 | Published: 26 Mar 2012

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement