IT Agents  >   IT Workforce  >   Information Technology Professionals  >   IT Managers  >  

IT Security Managers

RSS Feed    Add to Google    Add to My Yahoo!
IT Security ManagersReports
 
Extending Security Intelligence with Big Data
sponsored by IBM
WHITE PAPER: This white paper introduces a security solution that applies big data capabilities to help organizations to keep pace with today's advanced threats and prevent attacks before they happen.
Posted: 28 Jul 2014 | Published: 31 Jan 2013

IBM

New Software Solution provides Real-Time Threat Detection and Visibility from Day 1
sponsored by AlienVault
SOFTWARE DOWNLOAD: This resource contains a free 30-day trial of an innovative new Unified Security Management platform, designed and priced to aid mid-market organizations in obtaining complete security visibility and advanced threat intelligence.
Posted: 24 Jul 2014 | Premiered: 24 Jul 2014

AlienVault

Get Tactical on Mobility: Managed Cloud-Based Options Balance Control with Flexibility and Scale
sponsored by Hewlett-Packard Limited
WHITE PAPER: Access this informative white paper to discover suggestions for a number of initiatives related to enterprise mobility, including mobility management and application access.
Posted: 25 Aug 2014 | Published: 30 May 2014

Hewlett-Packard Limited

An Inside Track on Insider Threats
sponsored by Imperva
WHITE PAPER: Read this informative report for details on the impact of insider threats, as well as recommended strategies for businesses to apply in preventing and remediating these critical issues.
Posted: 11 Jul 2014 | Published: 31 Dec 2012

Imperva

Data Security Checklist: Tips for Managing the Mobile Enterprise
sponsored by Accellion, Inc.
WHITE PAPER: This document presents a checklist of data security features to consider when establishing an enterprise mobility management strategy.
Posted: 01 Jul 2014 | Published: 30 Nov 2013

Accellion, Inc.

The New Mobile Security Agenda
sponsored by Accellion, Inc.
WHITE PAPER: This resource offers key recommendations for enhancing mobile security strategies to avoid business risk and disaster.
Posted: 01 Jul 2014 | Published: 31 Dec 2013

Accellion, Inc.

Security Intelligence for a Faster World
sponsored by Hewlett-Packard Company
WHITE PAPER: This resource explores how a new security information and event management (SIEM) system provides the unparalleled protection your organization needs to face the risks of big data.
Posted: 19 Aug 2014 | Published: 31 May 2012

Hewlett-Packard Company

Buyer's Guide: SIEM Appliances for 2014-2015
sponsored by LogRhythm, Inc.
WHITE PAPER: Many smaller organizations still face an uphill battle in understanding and sorting through the SIEM vendor options available to them and then choosing the right product for them. This Buyer's Guide lets IT organizations immediately understand what features and functions are available so they can move more quickly to making a buying decision.
Posted: 29 Jul 2014 | Published: 29 Jul 2014

LogRhythm, Inc.

Why Strong Authentication is a Must for All Users
sponsored by CA Technologies.
WHITE PAPER: This informative whitepaper provides valuable insight into why strong authentication is essential for all users.
Posted: 25 Jun 2014 | Published: 25 Jun 2014

CA Technologies.

Comparing Security Information and Event Management (SIEM) Technologies
sponsored by IBM
WHITE PAPER: This highly informative white paper from Gartner objectively evaluates a variety of SIEM technologies on a number of critical dimensions, including market responsiveness, customer experience, and pricing.
Posted: 24 Jul 2014 | Published: 25 Jun 2014

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement