IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Information Security Policies

RSS Feed    Add to Google    Add to My Yahoo!
Information Security PoliciesReports
 
A Universal Log Management Solution
sponsored by Hewlett-Packard Company
WHITE PAPER: In this white paper, explore a universal log management solution that consolidates log data from security, compliance audit, IT operations, and application development teams to provide clear visibility to improve troubleshooting abilities.
Posted: 19 Aug 2014 | Published: 31 May 2012

Hewlett-Packard Company

Security Monitoring Lessons Learned from Target, Neiman Marcus, Sony, and Other Recent Security Breaches
sponsored by LogRhythm, Inc.
VIDEO: In this webinar, Randy Franklin Smith, Windows Security Subject Matter Expert, and Erik Ingleby, Product Manager at LogRhythm, discuss the lessons learned from Target, Neiman Marcus, Sony and other security breaches from the perspective of detection.
Posted: 31 Jul 2014 | Premiered: 20 Jun 2014

LogRhythm, Inc.

Automating Information Governance - assuring compliance
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from AIIM takes an in-depth look at information governance policies, privacy and records management issues, policy enforcement, and how well technology can set or correct metadata, detect security risks, and enforce deletion policies.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

ComputerWeekly.com

Acceptable Use: How to Write a Mobility Policy Document Employees Will Actually Follow
sponsored by BlackBerry
WHITE PAPER: A mobile computing policy document tells employees what's expected of them when it comes to using these devices for work. It marks out the responsibilities of the company as well.Read this white paper to find out how to write a mobile policy document that employees will understand and follow
Posted: 18 Aug 2014 | Published: 22 Jul 2014

BlackBerry

Advanced Persistent Threats: Expert Strategies for IT Security
sponsored by IBM
WHITE PAPER: This expert E-Guide outlines the best practices for organizations to defend themselves against these malicious attacks and to prevent them before they happen.
Posted: 18 Aug 2014 | Published: 18 Aug 2014

IBM

Get the Low Down on Transferring Files With Desktop Transfer Client
sponsored by GlobalScape
WHITE PAPER: In this white paper, explore a desktop file transfer solution that only requires Internet connection and offers increased flexibility in file sharing without added costs.
Posted: 23 May 2014 | Published: 23 May 2014

GlobalScape

Top 10 Reasons MDM is just a Fad
sponsored by IBM
WHITE PAPER: This white paper reveals the top 10 reasons you don't need a mobile device management (MDM) solution ... or do you?
Posted: 02 Sep 2014 | Published: 16 May 2014

IBM

Evolve SiteMinder With RadiantOne
sponsored by Radiant Logic, Inc.
WHITE PAPER: This white paper features a federated identity service that unifies identity policies for simplified management, helping reduce costs for growing user environments.
Posted: 04 Jun 2014 | Published: 31 Dec 2013

Radiant Logic, Inc.

Enterprise Information Security in Transition
sponsored by IBM
WHITE PAPER: This white paper boils the reasons behind current issues in the information security field down into four major causes, and also lays out a list of specific, detailed changes that need to be made to the enterprise security model for these core issues to be resolved.
Posted: 28 Jul 2014 | Published: 31 Oct 2012

IBM

6 Ways to Enhance Security in AWS
sponsored by SafeNet, Inc.
WHITE PAPER: In this white paper, learn why Amazon Web Services (AWS) is a leading cloud service, with a strong partnership with a security provider that provides 6 additional security enhancements to better protect data.
Posted: 05 Jun 2014 | Published: 28 Feb 2014

SafeNet, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement