Standards  >  

Information Security Standards

RSS Feed    Add to Google    Add to My Yahoo!
Information Security Standards Reports
 
Cool Vendors in Cloud Security Services
sponsored by OpenDNS
ANALYST REPORT: In this resource discover key findings of cloud security, in-depth analysis into cloud security providers, and unbiased recommendations to CISOs who are evaluating technology trends and planning future needs.
Posted: 27 Jul 2016 | Published: 24 Apr 2015

OpenDNS

How to Harden Your Servers In Elastic Infrastructures
sponsored by CloudPassage
WEBCAST: Learn about security in the context of changing infrastructure from traditional data centers into environments like AWS. Find out how you can deploy systems through automation and at scale, baking in security and compliance controls while keeping these measures from putting the brakes on DevOps.
Posted: 19 Jul 2016 | Premiered: Jun 21, 2016

CloudPassage

Threat intelligence sharing and the government's role
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This survey for Alien Vault paints a picture of how threat intelligence is obtained, utilised and shared, and seeks out views as to the role the government and law enforcement has to play to help better protect enterprises from threats.
Posted: 12 Aug 2015 | Published: 12 Aug 2015

ComputerWeekly.com

Busting Myths About Encrypted Communications
sponsored by Blue Coat Systems
RESOURCE: We debunk several pervasive myths about encrypted communications to help you gain a solid understanding of its growing importance. How? With an enlightening (and quick) 10-question quiz that just might expose some hidden vulnerabilities in your current network security initiatives and encrypted traffic blind spots.
Posted: 21 Jul 2016 | Published: 21 Jul 2016

Blue Coat Systems

Cyber Security 2016 and beyond
sponsored by ComputerWeekly.com
EGUIDE: Cyber risks to businesses increasingly feature in the news as a growing number of companies are targeted by attacks aimed at stealing personal and intellectual property data, but despite this coverage, studies show many companies are still ill-equipped to deal with these attacks.
Posted: 18 Apr 2016 | Published: 18 Apr 2016

ComputerWeekly.com

The State of Dynamic Data Center and Cloud Security in the Modern Enterprise
sponsored by Illumio
WHITE PAPER: In this report, witness key findings drawn from the SANS Dynamic Data Center Survey about modern security concerns with the transition to a hybrid data center environment, dynamically developing security changes, strategies to protect data in a hybrid environment, and more.
Posted: 14 Jun 2016 | Published: 31 Oct 2015

Illumio

Secure Enterprise Email on Mobile Devices
sponsored by IBM
WHITE PAPER: Discover the key to securing and controlling enterprise emails on mobile devices in a BYOD environment. Uncover the value of separating personal and corporate data on phones and tablets, using a single sign-on for authentication, and more.
Posted: 17 Jun 2016 | Published: 17 Jun 2016

IBM

Cloud Security Designed for Amazon Web Services (AWS)
sponsored by Trend Micro
WHITE PAPER: This white paper offers a brief overview of an Amazon Web Services security solution that relies on security pros to customize its offered features to efficiently and effectively defend your assets in the cloud.
Posted: 19 May 2014 | Published: 19 May 2014

Trend Micro

How to Align your Security Needs with Business Objectives
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: This whitepaper covers the emphasis on security that is growing in IT and offers a solution that can provide data protection that is in line with your business goals.
Posted: 12 Feb 2014 | Published: 10 Apr 2013

Hewlett-Packard Enterprise

Cost of Data Breach Study: Global Analysis
sponsored by IBM
WHITE PAPER: This white paper presents IBM and Ponemon Institute's 2015 Cost of Data Breach Study, and explains the 3 major reasons contributing to a higher cost of data breach in 2015. Read on here to access the key findings from the report.
Posted: 04 Sep 2015 | Published: 04 Sep 2015

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement