IT Agents  >   IT Workforce  >   Information Technology Professionals  >   IT Managers  >  

IT Security Managers

RSS Feed    Add to Google    Add to My Yahoo!
IT Security Managers Reports
 
Viewpoints and Vendor Comparisons: Access Management and ID Federation
sponsored by IBM
WHITE PAPER: In this market report, learn how web access management and identity federation enable organizations to manage access both from and to external systems, including cloud services, in a consistent way. Also gain rare insight into product ratings, vendor coverage, leaders in the field, and more.
Posted: 24 Feb 2017 | Published: 24 Feb 2017

IBM

Mobile Identity Authentication: Today's Take on Trusted Identity
sponsored by HID
WEBCAST: Organizations that rely on their mobile workforces need to rest easy knowing that the trusted identities their people are using are secure and accessible. Watch this webcast to gain insight into how mobile identity is evolving in the face of today's threat landscape.
Posted: 27 Mar 2017 | Premiered: Mar 27, 2017

HID

Building a Trusted Foundation for the Internet of Things
sponsored by Gemalto
WHITE PAPER: In this white paper find how to set up your enterprise for future Internet of Things success, how to handle common problems, and what the future looks like for IoT.
Posted: 13 Mar 2017 | Published: 13 Mar 2017

Gemalto

Incident Response Tools Can Help Automate Your Security
sponsored by Cisco and Dimension Data
EGUIDE: In this era of nonstop security threats, incident response tools that help automate detection and reaction are now essential. In this expert e-guide, learn how to update your IR process.
Posted: 29 Mar 2017 | Published: 22 Mar 2017

Cisco and Dimension Data

How to Keep Your Data Secure Without a Big Security Team
sponsored by Armor
WHITE PAPER: Uncover how your organization can not only centralize your security management processes, but also increasingly support your business objectives and protect your sensitive data inside and out.
Posted: 13 Mar 2017 | Published: 13 Mar 2017

Armor

Threat Intelligence Reveals Secrets: From the Surface to the Dark Web
sponsored by Recorded Future
WHITE PAPER: Learn how the deep web, and by extension the dark web, are closer to the surface web that you most likely enjoy every day. Discover what we can learn from the connections between the three and what it means for your organization's security policy.
Posted: 02 Mar 2017 | Published: 02 Mar 2017

Recorded Future

Cost Savings, Risks, and Benefits: Armor Complete And Armor Anywhere
sponsored by Armor
WHITE PAPER: In this Forrester report, discover the security benefits, cost savings, associated risks and ROI of the Armor Complete and Armor Anywhere cloud data protection tools. Gain insight into what makes it and what doesn't in the face of today's threat landscape.
Posted: 08 Mar 2017 | Published: 31 Jan 2017

Armor

The 2016 Global Cloud Data Security Study
sponsored by Gemalto
WHITE PAPER: In this in-depth report conducted by the Ponemon Institute, uncover trends that are arising in cloud governance and security practices, how they can affect your organization, and recommendations on improving cloud governance.
Posted: 13 Mar 2017 | Published: 13 Mar 2017

Gemalto

Application Development Security Requires Forethought
sponsored by tCell
EGUIDE: Learn how to define security requirements at the beginning, and what can be learned from the RASP approach in closing the gap left by application security testing.
Posted: 28 Mar 2017 | Published: 28 Mar 2017

tCell

Case Study: Streamlining Security Without Creating Vulnerabilities
sponsored by Cisco and Dimension Data
CASE STUDY: Cuts to security in the name of "streamlining" can leave an organization vulnerable. Learn how a large pharmaceutical company made an important change in its security strategy when it started considering cost effectiveness.
Posted: 24 Mar 2017 | Published: 24 Mar 2017

Cisco and Dimension Data
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement