IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Information Security Policies

RSS Feed    Add to Google    Add to My Yahoo!
Information Security PoliciesReports
 
Unified Communications Security
sponsored by NextPlane
WHITE PAPER: This crucial paper examines several kinds of attacks designed specifically to disrupt UC platforms and discusses how your organization can defend against these increasingly frequent threats.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

NextPlane

20 Practical Tips on Single Sign-On and Strong Authentication from Healthcare IT Professionals
sponsored by Imprivata
WHITE PAPER: This resource features a collection of 20 tips from your healthcare peers on how to successfully implement single sign-on (SSO) and strong authentication solutions.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

Imprivata

Integrated IT Security for Midsize Businesses
sponsored by IBM
WHITE PAPER: This guide explores security management strategies and how to combat the growth of sophisticated threats.
Posted: 26 Feb 2014 | Published: 31 Oct 2013

IBM

Secure Network Access for Personal Mobile Devices
sponsored by Cisco
WHITE PAPER: This resource offers a solution to the challenges of mobility in the workplace, helping organizations realize the full benefits of BYOD without sacrificing strong security.
Posted: 31 Mar 2014 | Published: 30 Sep 2012

Cisco

5 Steps to Network Situational Awareness
sponsored by Lumeta Corporation
WHITE PAPER: This exclusive paper examines a five step program to achieve Network Situational Awareness and gain a thorough understanding of your network infrastructure so you can more closely manage any changes and catch problems before they impact your business.
Posted: 07 Feb 2014 | Published: 07 Feb 2014

Lumeta Corporation

Separating Work and Personal at the Platform Level, How BlackBerry Balance Works
sponsored by BlackBerry
WHITE PAPER: This informative resource examines a mobile management solution that partitions work data from personal data using two completely separate file systems, ensuring the security of your sensitive business information.
Posted: 17 Mar 2014 | Published: 17 Mar 2014

BlackBerry

IAM for the Real World – Privileged Account Management
sponsored by Dell Software
WHITE PAPER: Read this e-book for essential information on common security issues with privileged account management – and how you can minimize or eliminate them.
Posted: 27 Feb 2014 | Published: 31 Dec 2012

Dell Software

Verity Credit Union Streamlines Application Access, Reduces Helpdesk Costs and Improves Customer Service
sponsored by Imprivata
WHITE PAPER: This case study shares one credit union's experience with an authentication solution that helped it efficiently manage user access across all applications without hindering productivity or adding costs.
Posted: 11 Apr 2014 | Published: 28 Feb 2010

Imprivata

Managing Complexity in Identity and Access Management
sponsored by RSA, The Security Division of EMC
ANALYST REPORT: This Ponemon Institute report sheds light on your organization's level of complexity and how to best reduce it for an effective, yet easy-to-manage identity and access management (IAM) program.
Posted: 17 Apr 2014 | Published: 31 Aug 2013

RSA, The Security Division of EMC

The Payment Island Deconstructed
sponsored by FireHost Inc.
WEBCAST: This webcast covers a solution that will help payment IT protect customer data while meeting compliance and performance demands.
Posted: 19 Feb 2014 | Premiered: Feb 19, 2014

FireHost Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement