Business of Information Technology  >   Business Management  >   Financial Management  >   Budgeting  >   IT Spending  >  

Internet Security Spending

RSS Feed    Add to Google    Add to My Yahoo!
Internet Security SpendingReports
 
Vendor Report Card: Security Information & Event Management
sponsored by LogRhythm, Inc.
ANALYST REPORT: This in-depth white paper expertly breaks down the current SIEM marketplace, and will help you differentiate between the many vendors in order to ultimately decide on a solution that aligns with your organization's needs.
Posted: 04 Sep 2013 | Published: 04 Sep 2013

LogRhythm, Inc.

Security considerations for UK enterprises
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This Research Snapshot from Vanson Bourne looks at IT security spending trends, awareness of cyber-threats, and the factors perceived as the biggest security risks for organisations.
Posted: 10 Dec 2013 | Published: 10 Dec 2013

ComputerWeekly.com

SOA Appliances: A Simple & Secure Approach to Integration across SOA, API & Cloud
sponsored by CA Technologies.
WHITE PAPER: In this resource, explore an alternative to ESBs -- a SOA integration appliance that offers simplified integration across SOA, APIs, and the cloud, along with native security functions. Read now to see how built-in security functions reduce complexities and costs.
Posted: 04 Feb 2014 | Published: 31 Dec 2011

CA Technologies.

Combatting APTs with a Defense-in-Depth Security Approach
sponsored by CDW Corporation
WHITE PAPER: This informative white paper contains critical information on why a defense-in-depth security approach has proven effective in protecting organizations' sensitive data from APTs.
Posted: 22 Jul 2014 | Published: 05 Mar 2014

CDW Corporation

Web Application Firewalls Are Worth the Investment for Enterprises
sponsored by Imperva
ANALYST REPORT: This resource explains how Web application firewalls help security leaders to better protect Web applications in their organizations.
Posted: 29 Apr 2014 | Published: 28 Feb 2014

Imperva

NSS Labs Network Intrusion Prevention System Product Analysis- IBM GX7800
sponsored by IBM
WHITE PAPER: This resource reveals the best-value features to look when making a network intrusion prevention system (IPS) by providing performance analysis of a top IPS solution.
Posted: 20 Feb 2014 | Published: 31 Dec 2013

IBM

Next-Generation Authentication: Keys to Balancing Security and Convenience
sponsored by SafeNet Asia Ltd
WHITE PAPER: This white paper highlights the top characteristics and requirements for next-generation authentication that's built to endure a constantly evolving and risk-filled IT landscape.
Posted: 09 Jan 2014 | Published: 28 Oct 2013

SafeNet Asia Ltd

Identity Management: Implementation And System Support
sponsored by OpenIAM
EGUIDE: In this e-guide, IT experts Randall Gamby and Nilesh Shirke discuss how identity and access management (IAM) and compliance influence each other to help organizations meet business initiatives. Click now for implementation best practices and IAM benefits that go beyond security.
Posted: 10 Jan 2014 | Published: 10 Jan 2014

OpenIAM

Expect More From Your SIEM
sponsored by AlienVault
WEBCAST: Unlike security cameras, going from installation to insight with a traditional SIEM is far from straightforward. During this session, we'll cover a few common problems with SIEM technologies, and how you can avoid them. You'll walk away with a new perspective on an old problem – reducing the cost of security visibility.
Posted: 16 Jul 2013 | Premiered: Jul 16, 2013

AlienVault

Behavioral Analytics Applied to Security
sponsored by FileTrek
WHITE PAPER: This white paper details a new approach to threat detection that leverages big data and behavioral analytics technology to improve data protection and risk prevention.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

FileTrek
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement