IT Management  >   Systems Operations  >   Security  >  

Infosecurity

RSS Feed    Add to Google    Add to My Yahoo!
Infosecurity Reports
 
Minimizing Cyber Risk with Better Threat Detection and Incident Response
sponsored by SearchSecurity.com
EZINE: The security incident response process must cope with an increasingly constant onslaught of attacks. Learn how to automate and better collaborate your company incident response.
Posted: 16 Nov 2016 | Published: 11 Nov 2016

SearchSecurity.com

Reconfigure Your Antimalware Strategy to Boost Endpoint Security For Advanced Threat Protection
sponsored by Webroot
EGUIDE: This expert e-guide explains why reconfiguration of your current antimalware strategy is all it takes to mitigate new trends in cyber-attacks.
Posted: 17 Sep 2013 | Published: 17 Sep 2013

Webroot

Top 10 Reasons to Strengthen Information Security with App and Desktop Virtualization
sponsored by Citrix
WHITE PAPER: In this paper we explore ten reasons why desktop virtualization should be the foundation of your layered approach to information security.
Posted: 16 Sep 2015 | Published: 03 Dec 2013

Citrix

Protecting Your Critical Data with Integrated Security Intelligence
sponsored by IBM
WHITE PAPER: Access this white paper to gain actionable insights that can help you reduce security risks and boost compliance.
Posted: 08 Oct 2014 | Published: 30 Apr 2013

IBM

MicroScope April 2014: A special issue covering the information security market
sponsored by MicroScope
EZINE: A special issue covering the opportunities for resellers selling security, and advice on the use of social media.
Posted: 11 Apr 2014 | Published: 14 Apr 2014

MicroScope

Optimize Patient Documentation with Enterprise Content Management
sponsored by Actiance
EGUIDE: In this e-guide, healthcare industry expert Reda Chouffani discusses how to enhance patient documentation with an enterprise content management platform. Discover a platform that offers features like: customization, advanced workflow functions, security and HIPAA compliance, and more.
Posted: 04 Apr 2016 | Published: 01 Apr 2016

Actiance

Webcast: IBM Information Management in the New Era of Computing
sponsored by IBM
WEBCAST: Depending on the approach that your organization takes, big data can be either a golden opportunity or a significant business obstacle. This webcast explores information management in the new era of computing, and outlines a strategy that will enable you to reduce costs, improve decision-making, and more.
Posted: 09 Sep 2013 | Premiered: Aug 23, 2013

IBM

KPN focuses on Information Security with HP
sponsored by Hewlett-Packard Enterprise
WEBCAST: View this brief webcast to gain insight on an information security solution one organization chose to defend against today's highly motivated hackers, and how they're benefiting.
Posted: 25 Nov 2013 | Premiered: Nov 25, 2013

Hewlett-Packard Enterprise

Mobile Security Insider's Edition
sponsored by SearchSecurity.com
EZINE: This Insider Edition explores some of the most useful tools and strategies for reducing threats to your network and protecting your critical data in the era of BYOD.
Posted: 18 Nov 2013 | Published: 18 Nov 2013

SearchSecurity.com

What you didn’t know about Certificate-Based Authentication
sponsored by OpenTrust
WHITE PAPER: You may want to consider a next-generation Public Key Infrastructure (PKI) solution to improve IT security cost-effectively. Read this whitepaper to learn what you should know about next-gen PKI.
Posted: 29 Jun 2013 | Published: 29 Jun 2013

OpenTrust
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement