IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Information Security Policies

RSS Feed    Add to Google    Add to My Yahoo!
Information Security Policies Reports
 
Keeping Your Office 365 Implementation Secure and Effective
sponsored by Box
WEBCAST: In this webinar, learn how to handle security concerns in your Office 365 deployment. Also learn how to best address your content management needs before, during, and after Office 365 transition, and what you can do to help your employees make the most of the suite's features.
Posted: 22 Mar 2017 | Premiered: Mar 3, 2017

Box

Top IT Trends in 2017: Cybersecurity
sponsored by Cisco and Dimension Data
WHITE PAPER: With so many enterprises making the transition to digital business, the entire landscape of cybersecurity has shifted and morphed dramatically over the past year. This list will delve into 5 top IT trends that will shape 2017 and beyond as it pertains to cybersecurity, the digital transformation, identity, and more.
Posted: 22 Mar 2017 | Published: 22 Mar 2017

Cisco and Dimension Data

A Look at How Data Privacy Laws Impact Cloud Adoption in Russia
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Learn how to satisfy Russian data residency, privacy, and regulation requirements when it comes to the cloud. Discover how to avoid business disruptions by complying with the law.
Posted: 28 Feb 2017 | Published: 31 Dec 2016

Symantec & Blue Coat Systems

Intelligent Security Operations: A How-To Guide
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: Find your roadmap for implementing an intelligent, analytics-driven security operations center in this white paper. Discover how to gain visibility into your organization to detect and respond to existing and new threats.
Posted: 02 Mar 2017 | Published: 02 Mar 2017

Hewlett-Packard Enterprise

Safeguard Data Stored and Managed in Cloud Environments
sponsored by Gemalto
WHITE PAPER: This white paper will serve as a measuring stick for your current encryption as well as a template to take it to the next level. To truly keep company data safe from unauthorized access you'll need an encryption strategy that considers every facet of the process: from the coding of the data to the creation and management of the encryption keys.
Posted: 15 Mar 2017 | Published: 15 Mar 2017

Gemalto

Myth vs. Reality: What You Need to Know About Microsoft Office 365 Backup
sponsored by Unitrends
WHITE PAPER: Learn how data loss occurs in cloud applications, as well as how to restore email in seconds instead of hours, recover files even after Office 365 purges, safeguard all of your users' data, and more.
Posted: 13 Mar 2017 | Published: 13 Mar 2017

Unitrends

Your Guide to Managed Security for Amazon Web Services
sponsored by Armor
WHITE PAPER: Uncover the tools you need to regain control and visibility, reduce costs, and ensure security down to the core of your AWS usage.
Posted: 10 Mar 2017 | Published: 10 Mar 2017

Armor

Reduce the Number of Ransomware Infections Across Your Organization
sponsored by Cisco and Dimension Data
WHITE PAPER: Ransomware is becoming a bigger threat every quarter. Learn what ransomware truly is and how it works, as well as what can be done to mitigate its threat to your organization.
Posted: 24 Mar 2017 | Published: 24 Mar 2017

Cisco and Dimension Data

Ensure the Right Solution for your RSA Data Protection Manager Migration
sponsored by Gemalto
WHITE PAPER: When looking to migrate your data protection manager (DPM), don't settle for re-packaged solutions that are not purpose built for your specific use case. This white paper details how to migrate your RSA DPM manager smoothly.
Posted: 15 Mar 2017 | Published: 15 Mar 2017

Gemalto

Six Steps to a Better Security Strategy
sponsored by Armor
WHITE PAPER: In this Forrester report, discover 6 straightforward steps you can take immediately to start building a truly business-savvy security strategy.
Posted: 08 Mar 2017 | Published: 22 Jan 2016

Armor
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement