Standards  >  

Information Security Standards

RSS Feed    Add to Google    Add to My Yahoo!
Information Security Standards Reports
Staying Secure in the Cloud Is a Shared Responsibility
sponsored by
ANALYST REPORT: The increasing popularity of public clouds requires CISOs to develop effective security strategies to ensure proper levels of security for enterprise operations within the public cloud. This Gartner report provides clear guidelines for defining and allocating responsibility for security planning and operations in IaaS, PaaS and SaaS environments.
Posted: 03 Oct 2016 | Published: 07 Apr 2016

How One SIEM Strategy Stacks Up
sponsored by LogRhythm, Inc.
WHITE PAPER: This resource takes a look at one SIEM strategy and rates its features, performance, documentation, support, and value. Access now to determine if it's time for your organization to consider a different approach to SIEM technology.
Posted: 07 Sep 2016 | Published: 07 Sep 2016

LogRhythm, Inc.

The Art and Science of Value Realization in the Cloud
sponsored by Infor
WHITE PAPER: Discover how to optimize your enterprise's cloud expense and see just how much business value it creates. See such value added as physical records saving, workforce hours, and streamlined workloads.
Posted: 25 Jul 2016 | Published: 25 Jul 2016


Worried About Mobile Security? You Should be
sponsored by IBM
WHITE PAPER: Learn the importance, growth, and lethal significance of mobile security threats. Uncover why malware has exploded out of its infancy with a vengeance, how built-in security controls from vendors won't protect mobile devices, why fraudsters can effectively "fly under the radar", and more.
Posted: 01 Sep 2016 | Published: 31 Jul 2016


Guide to Making The Cloud Secure
sponsored by BT
WHITE PAPER: Discover the threats every cloud user potentially faces, introductions to advanced security measures to counteract them, and the policies and procedures to help you safeguard your valuable information. You'll also find tips to facilitate the responsibility you must necessarily take for the protection of your own data.
Posted: 27 Jul 2016 | Published: 27 Jul 2016


Understanding the Session Data Framework
sponsored by Exabeam
WHITE PAPER: Discover how to provide a new layer for your enterprise's security analytics and stop data leaks due to advanced persistent threats. Learn the fundamentals of these malicious attacks, how they are changing, and how you can change to combat them.
Posted: 27 Jul 2016 | Published: 27 Jul 2016


Why So Many Enterprises Lack Proper Authentication Methods
sponsored by RSA Softcat
EGUIDE: Single-factor authentication, while allowing for simplicity and ease, leaves companies unnecessarily vulnerable to intrusion. Learn the benefits of multi-factor authentication and what you can do today to improve your organization's authentication and authorization polices.
Posted: 05 Oct 2016 | Published: 30 Sep 2016

RSA Softcat

IoT: What it Takes to Run a Wireless, Secure, Mobile Strategy
sponsored by Aruba Networks
EGUIDE: The Internet of Things is here and the knowledge of how to run it effectively is vital. Without a plan and without a vision, the IoT can fall apart catastrophically. In this e-guide, learn what it takes to run an IoT wireless network, how BYOD and IoT device onboarding can improve security, and what your mobile security strategy should look like.
Posted: 09 Sep 2016 | Published: 07 Sep 2016

Aruba Networks

Your MSSP Decision Guide
sponsored by Trustwave
WHITE PAPER: Discover key questions and considerations to help you select a Managed Security Services Provider (MSSP) and evaluate their solutions to better secure your business. Access now to find how much global reach your MSSP should have, what it means to have security expertise, and more.
Posted: 30 Sep 2016 | Published: 30 Sep 2016


Guide to Common Cloud Computing Questions
sponsored by Hewlett Packard Enterprise
EGUIDE: This eGuide helps you address your organization's security needs and bust the most common cloud computing myths wide open by gaining an understanding of what cloud computing actually is and what it can deliver for your organization.
Posted: 09 Aug 2016 | Published: 08 Aug 2016

Hewlett Packard Enterprise
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement