IT Agents  >   IT Workforce  >   Information Technology Professionals  >   IT Managers  >  

IT Security Managers

RSS Feed    Add to Google    Add to My Yahoo!
IT Security ManagersReports
 
Mitigating Risks of Cloud Computing with SSL Certificates
sponsored by Symantec Corporation
WHITE PAPER: This white paper examines an overview of cloud computing, highlighting its advantages as well as its concerns.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

Symantec Corporation

Top 5 Malware Trends for 2014 and How to Combat Them
sponsored by Webroot
WHITE PAPER: This white paper describes the top five malware trends that are expected to grow throughout this year and the ways that your enterprise can protect its sensitive data.
Posted: 18 Jul 2014 | Published: 18 Jul 2014

Webroot

Combatting APTs with a Defense-in-Depth Security Approach
sponsored by CDW Corporation
WHITE PAPER: This informative white paper contains critical information on why a defense-in-depth security approach has proven effective in protecting organizations' sensitive data from APTs.
Posted: 22 Jul 2014 | Published: 05 Mar 2014

CDW Corporation

Avoid Disastrous Data Breaches with New Security Solutions
sponsored by CDW Corporation
WHITE PAPER: This white paper discusses one company's approaches to mobile security, cloud security, and malware protection and detection, and also provides a number of recommendations for improving your business's productivity, security, and peace of mind.
Posted: 18 Jul 2014 | Published: 18 Jul 2014

CDW Corporation

Buyer's Guide: SIEM Appliances for 2014-2015
sponsored by LogRhythm, Inc.
WHITE PAPER: Many smaller organizations still face an uphill battle in understanding and sorting through the SIEM vendor options available to them and then choosing the right product for them. This Buyer's Guide lets IT organizations immediately understand what features and functions are available so they can move more quickly to making a buying decision.
Posted: 29 Jul 2014 | Published: 29 Jul 2014

LogRhythm, Inc.

Device Fingerprinting – Low-Friction, BYOD Authentication
sponsored by SecureAuth
WHITE PAPER: This white paper introduces SecureAuth's Device Fingerprinting, which features the flexibility, security, and convenience required to increase layers of authentication without creating high friction for users.
Posted: 20 Oct 2014 | Published: 20 Oct 2014

SecureAuth

Enhancing the Customer Experience and Securing Endpoints with Biometrics
sponsored by NEC Corporation of America
TRANSCRIPT: This resource introduces NEC Corporation's NeoFace suite, a set of highly accurate facial recognition tools that use advanced facial processing and matching algorithms, and describes the business applications of biometrics.
Posted: 14 Oct 2014 | Published: 14 Oct 2014

NEC Corporation of America

Privacy, Security and Compliance - What You Don’t Know May Just Hurt You
sponsored by NTT Communications ICT Solutions and Hitachi Data Systems
WHITE PAPER: In this document, explore the changing nature and increasing value of data and how organizations are responding to changes in regulation.
Posted: 19 Aug 2014 | Published: 19 Aug 2014

NTT Communications ICT Solutions and Hitachi Data Systems

Webcast: Security Threat Intelligence
sponsored by CDW Corporation
WEBCAST: This web seminar provides an overview of the current malware landscape, including a discussion of the impact that data breaches have on businesses today.
Posted: 18 Jul 2014 | Premiered: Apr 30, 2014

CDW Corporation

3 Big data security analytics techniques you can apply now to catch advanced persistent threats
sponsored by Hewlett-Packard Company
WHITE PAPER: In this informative white paper, unveil 3 ways that big data security analytics can help you gain actionable intelligence to thwart advanced persistent threats (APTs) and achieve visibility into IT infrastructures for top defense.
Posted: 15 Aug 2014 | Published: 19 Nov 2013

Hewlett-Packard Company
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement