IT Agents  >   IT Workforce  >   Information Technology Professionals  >   IT Managers  >  

IT Security Managers

RSS Feed    Add to Google    Add to My Yahoo!
IT Security Managers Reports
 
Maximizing Mobile Security and Productivity
sponsored by BlackBerry
WHITE PAPER: Learn how to make your organization more mobile-secure in 5 steps.
Posted: 01 May 2017 | Published: 01 May 2017

BlackBerry

SPLUNKĀ® SOFTWARE AS A SIEM
sponsored by Splunk
WHITE PAPER: Learn a new approach to SIEM that will give your organization the ability to combat the modern threat landscape and secure its data, all from a single pane of glass.
Posted: 04 May 2017 | Published: 04 May 2017

Splunk

10 Things You Need to Know About Ransomware
sponsored by Cylance
WHITE PAPER: As threatening as ransomware sounds, damage can be avoided with increased user awareness coupled with the right security practices. In this resource uncover the 10 facts your organization should know about ransomware.
Posted: 03 May 2017 | Published: 03 May 2017

Cylance

Security Use Case Detecting Unknown Malware
sponsored by Splunk
WHITE PAPER: Learn how to gain significant power over understanding detailed activities on endpoint as well as the ability to detect advanced and unknown malware activities.
Posted: 03 May 2017 | Published: 03 May 2017

Splunk

Identifying the Timeline Activities of a Cyber Breach
sponsored by Farsight Security
CASE STUDY: In this case study discover how the use of DNSDB in mapping malicious and benign infrastructure revealed the timeline and activity of a breach of the Anthem Healthcare System.
Posted: 05 May 2017 | Published: 05 May 2017

Farsight Security

Comparing Top Shelf Email Encryption Software Products
sponsored by Hewlett Packard Enterprise
EGUIDE: Access this expert e-guide to learn how the top of the line email encryption software measures up to one another. Find out what to look for when it comes to strength of cryptography, file security, mobile device support, and more.
Posted: 04 May 2017 | Published: 28 Apr 2017

Hewlett Packard Enterprise

Case Study: How the Diamond Model of Intrusion Analysis Unveiled Key Details About Malicious Activity
sponsored by ThreatConnect
WHITE PAPER: In the following case study, discover ways to gain a holistic view of threat intelligence and incident response so you can unite your entire security operations around a common defense, make informed business decisions, and more.
Posted: 01 May 2017 | Published: 01 May 2017

ThreatConnect

Accelerate DevOps by Automating Security
sponsored by evident.io
WHITE PAPER: Discover how to use a modern cloud-native approach to security and compliance, leveraging automation and the API-centric architecture of the cloud, so DevOps teams can enjoy accelerated development cycles while reducing the risk of breaches or delays and more.
Posted: 25 May 2017 | Published: 25 May 2017

evident.io

How to Secure Office 365 from Advanced Attacks
sponsored by Microsoft
EGUIDE: This e-guide details how to protect Office 365 from phishing attempts, defend end users from malicious sites, and more.
Posted: 12 May 2017 | Published: 12 May 2017

Microsoft

ESG Labs Weigh-in on Advanced Threat Protection
sponsored by Proofpoint, Inc.
WHITE PAPER: In this ESG lab report discover how to deploy fast and easy identification and prioritization of email-based cybersecurity threats, giving your organization at-a-glance summary information about each threat.
Posted: 01 May 2017 | Published: 31 Jan 2017

Proofpoint, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement