IT Management  >   Systems Operations  >   Security  >  

Infosecurity

RSS Feed    Add to Google    Add to My Yahoo!
Infosecurity Reports
 
2020 Information Management: A View into Technology's Future
sponsored by OpenText
WHITE PAPER: Access this insightful resource to look into the future of technology and how to take advantage of the new currency: information. Read on now to learn how to leverage "enterprise information management" (EIM) to unlock innovation potential without compromising productivity or security.
Posted: 17 Dec 2014 | Published: 23 Oct 2014

OpenText

Top 3 Myths about Big Data Security
sponsored by IBM
WHITE PAPER: This valuable resource debunks the top three myths around big data security and offers key recommendations to help you implement an effective security strategy.
Posted: 27 Feb 2014 | Published: 31 Oct 2012

IBM

Why Fighting Cybercrime Requires Thinking Like the Bad Guys
sponsored by Hewlett-Packard Company
WHITE PAPER: In this infographic, you'll find out how to safeguard your business by changing the way you invest in and think about security – from the perspective of the cyberthreats targeting you.
Posted: 02 Feb 2015 | Published: 02 Feb 2015

Hewlett-Packard Company

Tips on Managing the Deluge of Information Security Threat Reports
sponsored by SearchSecurity.com
EGUIDE: Don't get overwhelmed by today's cyber-attacks: Access this expert e-guide to take advantage of threat report data and use it as actionable intelligence. Read on to discover the real impact of insider security threats.
Posted: 02 Dec 2013 | Published: 02 Dec 2013

SearchSecurity.com

Lower Risk and Cost with Proactive Information Governance
sponsored by Hewlett-Packard Company
WHITE PAPER: Learn how to ensure that your data assets are available, protected and managed through their entire lifecycle.
Posted: 20 Sep 2014 | Published: 12 Feb 2014

Hewlett-Packard Company

KPN focuses on Information Security with HP
sponsored by Hewlett-Packard Limited
WEBCAST: View this brief webcast to gain insight on an information security solution one organization chose to defend against today's highly motivated hackers, and how they're benefiting.
Posted: 25 Nov 2013 | Premiered: Nov 25, 2013

Hewlett-Packard Limited

Enterprises Have Room for Improvement in Secure IT Asset Disposition
sponsored by Iron Mountain
WHITE PAPER: Access this resource to learn why secure IT disposition is a must in order to prevent data loss and compliance violations.
Posted: 12 Dec 2013 | Published: 12 Dec 2013

Iron Mountain

Insider Edition: Antimalware Technologies and Techniques to the Rescue
sponsored by SearchSecurity.com
EZINE: In this special edition of Information Security, our experts examine the recent advances in anti-malware detection and prevention, and which ones can tip the scale in your favor in the fight against malware.
Posted: 03 Mar 2014 | Published: 05 Mar 2014

SearchSecurity.com

A new look at Vulnerability Management
sponsored by TechTarget
RESOURCE: Does your list of security vulnerabilities seem overwhelming? Visualisation in VM can be an essential tool in making critical issues apparent. Security Visualisation serves as a guideline of how to generate a visual representation of a dataset. Download this guide to get expert advice on how to generate a security visualization plan.
Posted: 24 Oct 2014 | Published: 18 Mar 2014

TechTarget

Mobile Security Insider's Edition
sponsored by SearchSecurity.com
EZINE: This Insider Edition explores some of the most useful tools and strategies for reducing threats to your network and protecting your critical data in the era of BYOD.
Posted: 18 Nov 2013 | Published: 18 Nov 2013

SearchSecurity.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement