Security Big Data: Preparing for a Big Data Collection Implementation
sponsored by TechTarget Security
EBOOK:
This expert e-guide from SearchSecurity.com offers realistic advice to help your enterprise information security team understand what technology and processes must be in place in order to properly and securely take advantage of big data.
Posted: 13 Jun 2013 | Published: 13 Jun 2013
|
|
|
The Improvement and Evolution of SIEM
sponsored by TechTarget Security
EGUIDE:
Get an in-depth look at the past, present and future of security information and event management (SIEM) technology in this informative E-Guide from SearchSecurity.com.
Posted: 25 Apr 2013 | Published: 25 Apr 2013
|
|
|
PCI Council issues mobile application rules for software developers
sponsored by TechTarget Security
EGUIDE:
The Payment Card Industry (PCI) Security Standards Council has demanded the development of mobile applications that include comprehensive security controls. This expert resource will help you understand what the new guidelines call for in terms of security controls, the history behind these standards, and further developments.
Posted: 25 Apr 2013 | Published: 25 Apr 2013
|
|
|
Improving Enterprise Email Security: Systems and Tips
sponsored by TechTarget Security
EGUIDE:
This expert resource provides valuable information regarding e-mail security today, including the tools and techniques you can use to stay secure. Read on to learn more about e-mail reputation management, e-mail filtering, policy-based encryption, and more.
Posted: 23 Apr 2013 | Published: 23 Apr 2013
|
|
|
Infosec 2012: How to Help Your Organisation Deal with Next-Generation Cyber-Attacks
sponsored by TechTarget Security
EGUIDE:
This E-Guide offers expert insight on how to address next-generation cyber-attacks. View now to learn how network visibility can help you mitigate advanced threats, and much more!
Posted: 22 Apr 2013 | Published: 22 Apr 2013
|
|
|
Six Email Security Best Practices for Email SaaS
sponsored by TechTarget Security
EGUIDE:
This expert guide will teach you six e-mail security best practices for e-mail Security as a Service (SaaS). Read on to learn more about guarding access to data, evaluating physical controls, entering service contracts, and more.
Posted: 22 Apr 2013 | Published: 22 Apr 2013
|
|
|
Discover the Risks and Rewards Behind a Mobile Workforce
sponsored by TechTarget Security
EGUIDE:
Read this expert guide to learn more about how mobile devices are affecting productivity in the workplace, the top security issues concerning mobile devices, and how to balance risk with productivity effectively.
Posted: 22 Apr 2013 | Published: 22 Apr 2013
|
|
|
SIEM IT Decision Center- Checklist #1
sponsored by TechTarget Security
EGUIDE:
If you are looking into deploying your own SIEM system, read this E-Guide to better understand features and functions, how to evaluate deployment and management costs, and the latest trends regarding SIEM platforms.
Posted: 08 Feb 2013 | Published: 01 Jan 2013
|
|
|
Security University: Data Loss Prevention
sponsored by TechTarget Security
VIRTUAL ENVIRONMENT:
The difference between suite and point product approaches; assessing what you'll focus on within your own organization, and pitfalls in DLP implementation. In this security school we'll examine real-world tactics to ensure a successful DLP deployment.
Posted: 14 Jun 2013 | Premiered: 17 Jun 2013
|
|
|
Bring Your Own Security to the Cloud
sponsored by CenterBeam
VIDEO:
Watch this video to learn how the bring-your-own-security (BYOS) model allows you to have authorization and authentication for cloud-hosted services against your own active directory, not the hosts.
Posted: 12 Jun 2013 | Premiered: 12 Jun 2013
|
|
|
Where BCDR and GRC Come Together: A CIO's Guide
sponsored by Essextec
EZINE:
In this e-guide, our experts from SearchSecurity.com will help you establish better security with this IT disaster preparation and recovery guide for enterprise CIOs.
Posted: 11 Jun 2013 | Published: 11 Jun 2013
|
|
|
Network Security Visibility and Analysis Technical Guide
sponsored by TechTarget Security
EZINE:
This TechGuide explores how to improve network security visibility with network flow analysis tools, cloud security monitoring solutions and anomaly-based monitoring technology. Read on now to secure the data traveling across your network with these monitoring strategies.
Posted: 11 Jun 2013 | Published: 10 Jun 2013
|
|
|
Computer Weekly – 11 June 2013: Do you know who is on your network?
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, our latest buyer's guide looks at how identity and access management can improve your information security. We go behind the scenes at Microsoft HQ to find out how the software giant deals with product security. And the CIO from Domino's Pizza tells us why the retailer is moving to the cloud. Read the issue now.
Posted: 10 Jun 2013 | Published: 11 Jun 2013
|
|
|
Enterprise Mobility Management Options to Keep Corporate Data Safe
sponsored by MobileIron
EGUIDE:
This guide from out experts at SearchConsumerization.com will teach you the essential differences between MDM, MAM, and MIM you need to know in order to deploy each effectively, and how to best approach each in order to keep mobile devices and users as secure as possible. Read on to learn more.
Posted: 15 May 2013 | Published: 15 May 2013
|
|
|
Build a Business Case: Embrace Change. Maintain Control. CYOD Lets You Do Both.
sponsored by Insight
WHITE PAPER:
Read on to learn more about CYOD and why so many organizations are seeing this as a viable option to adopt mobility in the enterprise without the security hassles of BYOD. Explore the business case for CYOD, how CYOD works, and more.
Posted: 13 May 2013 | Published: 13 May 2013
|
|
|
Achieving a BYOD (Bring-Your-Own-Device) Strategy That Works for You
sponsored by Insight
WHITE PAPER:
Read this white paper to learn five key steps that will help you create a successful BYOD management strategy. Read on and learn the best ways to address device policies, security threats, employee awareness, and more.
Posted: 06 May 2013 | Published: 06 May 2013
|
|
|
A special issue covering the information security market
sponsored by MicroScope
EZINE:
A special issue covering the opportunities for resellers selling big data hinfrastructure, accessories and management tools.
Posted: 03 May 2013 | Published: 07 May 2013
|
|
|
Information Lifecycle Governance Leader Reference Guide
sponsored by IBM
WHITE PAPER:
Storing data that no longer has any value to the organization is a crippling process that forward-thinking CIOs must begin to shy away from. This white paper provides key insight surrounding the defensible disposal of unnecessary data.
Posted: 30 Apr 2013 | Published: 30 Apr 2013
|
|
|
CIO Handbook: The Risk Management Approach to Information Governance
sponsored by TechTarget Security
EBOOK:
This handbook provides information governance-related risk management advice for organizations faced with managing and securing corporate data.
Posted: 19 Apr 2013 | Published: 20 Mar 2013
|
|
|
Security in the Age of Mobility
sponsored by Trend Micro
WHITE PAPER:
This resource will give you a comprehensive look at the threats that mobile users and mobile organizations face today. Learn more about data breaches, social media threats, and more.
Posted: 15 Apr 2013 | Published: 31 Dec 2012
|
|
|
Go Daddy Sets a New Standard for SecureOnline Experiences
sponsored by Trend Micro
WHITE PAPER:
As a top web hosting company, Go Daddy has a big responsibility to its more than 9 million customers to provide comprehensive data security from today's threats. Read on to find out how Go Daddy was able to improve protection and ensure fast, flexible response to ever-changing threats with low total cost of ownership.
Posted: 11 Apr 2013 | Published: 31 Dec 2011
|
|
|
Application Visibility and Control
sponsored by Aerohive Networks
WHITE PAPER:
Read on to discover a way you can visualize, monitor and manage your edge network infrastructure, and learn how to keep track of when and where users are attempting to access your network and how it is being used.
Posted: 08 Apr 2013 | Published: 08 Apr 2013
|
|
|
Information Security Magazine - April 2013
sponsored by TechTarget Security
EZINE:
This month's issue takes a comprehensive look at existing identity and access management (IAM) solutions and explores how establishing a centralized IAM system not only combats the challenges SaaS and mobile devices, but provides better overall operational consistency across your entire infrastructure.
Posted: 03 Apr 2013 | Published: 03 Apr 2013
|
|
|
Network Security Technologies Technical Guide
sponsored by TechTarget Security
WHITE PAPER:
Read this expert guide to learn about the latest trends and risks that threaten today's networks. Learn more about modern threat detection, device security, security assessments and more.
Posted: 03 Apr 2013 | Published: 31 Dec 2012
|
|
|
Presentation Transcript: The Top 5 Pitfalls of Log Management and SIEM Deployments and How to Avoid Them
sponsored by eIQnetworks
PRESENTATION TRANSCRIPT:
This valuable resource counts down the top 5 pitfalls of log management and security information and event management (SIEM) deployments and offers essential advice for avoiding these challenges and achieving SIEM success.
Posted: 15 Feb 2013 | Published: 04 Feb 2013
|
|