IT Management  >   Systems Operations  >   Security  >  


RSS Feed    Add to Google    Add to My Yahoo!
Infosecurity Reports
Taking Control of Cloud Data: A Realistic Approach to Data Encryption
sponsored by Vaultive
WHITE PAPER: This paper outlines the new set of technical approaches for extending ownership and control for the computing model based on encryption in use, as well as distinguishes between evaluating the security and resiliency of the cloud service provider's environment.
Posted: 23 Sep 2015 | Published: 23 Sep 2015


Podcast: The challenges of managing mobile devices across a corporate IT environment
sponsored by BlackBerry
PODCAST: This informative podcast discusses the common mobile device management challenges that IT faces and what your organization can do to alleviate them.
Posted: 31 Oct 2013 | Premiered: Oct 31, 2013


Supporting the Zero Trust Model of Information Security
sponsored by IBM
WHITE PAPER: This Forrester Research, Inc. report introduces a zero trust model to reduce risk of insider and outsider threats. Click through to learn how the intrusion prevention system (IPS) can be used to fulfill this model.
Posted: 20 Feb 2014 | Published: 30 Sep 2013


December Information Security Magazine
sponsored by
EZINE: Everyone in the information security filend knows how hard it is to stay ahead of the rapidly evolving threat landscape. In this month's edition of Information Security, learn about a variety of sercurity issues.
Posted: 05 Dec 2013 | Published: 05 Dec 2013

Understanding Web-Based Crime-Fighting Techniques To Protect Your Critical Data
sponsored by Imperva
EGUIDE: In this e-guide, brought to you by, you will gain an understanding of the risks to your data and strategies to protect your systems within the limits of your resources.
Posted: 17 Jun 2013 | Published: 17 Jun 2013


Pay-as-you-Grow Data Protection
sponsored by IBM
WHITE PAPER: This resource examines the data protection requirements of small to midsize businesses (SMBs), and introduces a strategy that enables your organization meet the challenges of explosive data growth.
Posted: 07 Nov 2013 | Published: 28 Feb 2013


Securing Enterprise Networks with a Sharp Eye and a Clear Plan
sponsored by
EBOOK: Enterprise networks are increasing in size and complexity, creating a larger attack surface for hackers. This TechGuide walks you through gaining visibility into your network and devising an effective security strategy.
Posted: 14 Aug 2014 | Published: 11 Aug 2014

Intelligent Business Strategies whitepaper: Enterprise Information Protection - The Impact of Big Data (March 2013)
sponsored by IBM
WHITE PAPER: This informative white paper examines what the effects of big data on information security and privacy are, discussing the requirements that organizations need to meet before introducing big data and identifying its impact on said requirements.
Posted: 16 Oct 2013 | Published: 16 Oct 2013


Computer Weekly – 30 July 2013: The threat within – balancing security and employee privacy
sponsored by
EZINE: In this week's Computer Weekly, as more data breaches come from inside an organisation, we examine how to balance information security and employee privacy. Tech City CEO Joanna Shields talks about the opportunity for CIOs from working with startups. And we look at how mobile technology can help improve patient care in the NHS. Read the issue now.
Posted: 29 Jul 2013 | Published: 30 Jul 2013

How SIEM Helps IT Security, Compliance, Operations and Management
sponsored by CDW Corporation
WHITE PAPER: Security information and event management (SIEM) tools offer more than just security. In fact, many organizations overlook some of the most useful aspects of SIEM technology, including fraud prevention and operations management. In this expert resource, discover the value of SIEM tools for four different audiences.
Posted: 12 Sep 2014 | Published: 12 Sep 2014

CDW Corporation
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement