IT Management  >   Systems Operations  >   Security  >  

IT Security Management

RSS Feed    Add to Google    Add to My Yahoo!
IT Security Management Reports
 
Website Security for Dummies
sponsored by Symantec
WHITE PAPER: In this free e-book, find clear, straightforward guidelines for ensuring airtight website security.
Posted: 22 Apr 2015 | Published: 22 Apr 2015

Symantec

How to Enable Mobile Productivity with Limited IT Resources
sponsored by BlackBerry
WEBCAST: Access this webcast now to learn how you can enjoy affordable mobile device management capable of providing easy app deployment, shared network storage, and security you can trust.
Posted: 22 Apr 2015 | Premiered: Apr 22, 2015

BlackBerry

The hidden costs of self-signed SSL certificates
sponsored by Symantec
WHITE PAPER: Read this white paper to discover a detailed breakdown of the real total cost of ownership of a self-sign SSL certificate.
Posted: 27 Apr 2015 | Published: 31 Dec 2012

Symantec

Turning Compliance into an Opportunity
sponsored by Hewlett-Packard Limited
VIDEO: Take a look at this video to discover how you can make compliance more efficient and turn regulations into helps instead of hindrances.
Posted: 09 Apr 2015 | Premiered: 09 Apr 2015

Hewlett-Packard Limited

Security Vs. Innovation: Do CIOs have to choose?
sponsored by Red Hat
WHITE PAPER: This article shows how you can balance your need for business innovation and security by introducing a secure datacenter that allows for secure BYOD, cloud computing and more.
Posted: 03 Apr 2015 | Published: 31 Dec 2014

Red Hat

Bypassing Security Policies using Insufficient Authorization
sponsored by White Hat Security
WEBCAST: This recording of a live webcast discusses the details of how Insufficient Authorization attacks work.
Posted: 14 Apr 2015 | Premiered: Apr 14, 2015

White Hat Security

Don’t let crime rule your network – building an efficient cyber crime strategy
sponsored by Hewlett-Packard Limited
WHITE PAPER: Featuring input from expert analysts with years of experience, this white paper presents a series of guidelines for creating security that can survive the modern threat landscape.
Posted: 13 Apr 2015 | Published: 13 Apr 2015

Hewlett-Packard Limited

SLA Management Checklist and Data Restoration Tips After a Breach
sponsored by Carbonite
EGUIDE: In this e-guide you will find a checklist of major items that should be addressed in service-level agreement before signing the dotted line, including security and privacy.
Posted: 22 Apr 2015 | Published: 22 Apr 2015

Carbonite

Case Study: Global Media Company Gains Stronger App Security
sponsored by Veracode, Inc.
WHITE PAPER: This white paper explains how one cloud-based service helped a global media and technology company regain full visibility and control of its mobile app perimeter, allowing the enterprise to more effectively assess the risk of its mobile apps and maintain control of its mobile footprint.
Posted: 03 Apr 2015 | Published: 03 Apr 2015

Veracode, Inc.

What's Your Next Security Move?
sponsored by FireEye
WHITE PAPER: This quick self-assessment will help you navigate to your next big security decision and create better protection against advanced attackers.
Posted: 06 Apr 2015 | Published: 31 Dec 2014

FireEye
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement