IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Information Security Policies

RSS Feed    Add to Google    Add to My Yahoo!
Information Security Policies Reports
 
The Enterprise Security Checklist
sponsored by MASERGY
RESOURCE: This resource presents a seven-step checklist for building rigorous and effective cybersecurity that can combat today's advanced threats.
Posted: 14 Sep 2015 | Published: 15 Jul 2015

MASERGY

Vendor Comparisons for Fifteen SIEM Products
sponsored by IBM
WHITE PAPER: This Gartner report can help you navigate the multitude of SIEM options available in today's marketplace and select the one that's right for you. Take a look to learn the strengths, weaknesses, and capabilities of fifteen leading SIEM products.
Posted: 17 Feb 2016 | Published: 20 Jul 2015

IBM

Sensible one-page thoughts on performance: People at work
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Ludo Houdenaert, an independent management consultant, offers his thoughts on the dangers of destructive tendencies at work, which he calls 'job viruses'.
Posted: 07 Dec 2015 | Published: 07 Dec 2015

ComputerWeekly.com

Security without Limits: Extending Enterprise-Grade Security from your Data Center to the Cloud
sponsored by Unisys
WHITE PAPER: Need the ability to quickly and securely shift workloads back forth between the data center and the cloud? Access this white paper and discover ways cryptographic micro-segmentation can seamlessly protect data center workloads against unauthorized access.
Posted: 16 May 2016 | Published: 16 May 2016

Unisys

How to Raise your Organization's Security Maturity Level
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper takes a look at the stages involved in the security maturity journey and defines five stages you can expect to encounter. Access now and learn ways to move from being security-blind to reaching a true level of resilience.
Posted: 01 Apr 2016 | Published: 01 Apr 2016

LogRhythm, Inc.

Norton Cyber Security Insights Report ‚Äď UK Insights
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: More than 12 million British people have experienced cybercrime in the past year, this UK summary of the Norton Cyber Security Insights Report reveals.
Posted: 17 Feb 2016 | Published: 17 Feb 2016

ComputerWeekly.com

Do Your Employees Have the Freedom to Roam? CW Mobility E-Zine: January 2016
sponsored by ComputerWeekly.com
EZINE: In this issue of CW Europe, you will take an in-depth look at the major mobile roaming charge concern that is set to impact people across 28 European Union member states. Read on to see if the end of roaming charges will lead to more enterprises adopting video conferencing services.
Posted: 21 Jan 2016 | Published: 21 Jan 2016

ComputerWeekly.com

Healthcare Data Access Compliance
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Concurrent logins, manual logoffs, password sharing and the lack of unique logins are putting patient records at risk, according to this research paper by IS Decisions.
Posted: 23 Nov 2015 | Published: 23 Nov 2015

ComputerWeekly.com

15-Step Checklist for Reducing Mobile Security Risks
sponsored by Lenovo
WHITE PAPER: This checklist is designed to help you identify key steps in minimizing the risks associated with mobile devices. Uncover 15 ways to assess your current mobile security plans and identify aspects that may need more attention.
Posted: 23 Feb 2016 | Published: 30 Jun 2015

Lenovo

Evaluating the Expanding Cloud Access Security Broker Market
sponsored by Blue Coat Systems
EGUIDE: In this expert e-guide, learn how the CASB market is evolving and what to look for in a CASB. Also inside, discover a helpful evaluation guide and review one platform in particular to find out how it measures up.
Posted: 01 Mar 2016 | Published: 10 Feb 2016

Blue Coat Systems
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement