Business of Information Technology  >   Business Management  >  

Loss Management

RSS Feed    Add to Google    Add to My Yahoo!
Loss Management Reports
 
Four Steps to Readily Achievable Web Accessibility
sponsored by Cryptzone
WHITE PAPER: This white paper outlines how to easily implement a strategy for complying with Web Accessibility. Read on to learn about the advantages of this strategy.
Posted: 02 Feb 2016 | Published: 02 Feb 2016

Cryptzone

End Point Lightboard
sponsored by Palo Alto Networks
WHITE PAPER: In this white paper, you will read about the battle security pros fight every day and what new tools they are using to stop hackers.
Posted: 11 Feb 2016 | Published: 31 Aug 2015

Palo Alto Networks

Information Governance Audit: 5 Steps You Should Take
sponsored by Veritas
RESOURCE CENTER: Access this article to learn how to better perform security audits and keep your IT environment safe and secure.
Posted: 29 Jan 2016 | Published: 30 Dec 2015

Veritas

State-sponsored Hacking troubles US Government
sponsored by LogicNow
EGUIDE: This white paper explains what cyber threats the United States faces on a daily basis and what tools they have to combat them.
Posted: 01 Feb 2016 | Published: 25 Jan 2016

LogicNow

Gartner: Magic Quadrant for Mobile Data Protection
sponsored by Digital Guardian
WHITE PAPER: Continue reading this white paper to discover treat data encryption protection as a standard for all workstations.
Posted: 01 Feb 2016 | Published: 19 Oct 2015

Digital Guardian

IDC: Securing Data in a Borderless Enterprise
sponsored by Vera
WHITE PAPER: Access this white paper and learn how you can set security and sharing policies for your data wherever it goes, set and change data-access rights in real time, control what people can and can't do with data, and more.
Posted: 25 Jan 2016 | Published: 08 Jul 2015

Vera

Zero Trust on the Endpoint
sponsored by Palo Alto Networks
WHITE PAPER: This white paper teaches you a "never trust, always verify" security policy that remedies the deficiencies with perimeter-centric strategies and ensures there's no default trust for any entity or user.
Posted: 11 Feb 2016 | Published: 31 Mar 2015

Palo Alto Networks

Virtualization: Superior, Flexible and Efficient Protection
sponsored by TechData Corporation
WHITE PAPER: Access this white paper and learn how to protect for your virtual servers and desktop environments. Find out how your organization can achieve outstanding protection, better performance and greater efficiency.
Posted: 26 Jan 2016 | Published: 31 Dec 2014

TechData Corporation

The Rise of Known and Unknown Malware and Best Approaches to Zero-Day Attacks
sponsored by Kingpin Communications
WHITE PAPER: In this paper, you will examine several best practice strategies for malware threat defense and protection against zero-day attacks. Read on to introduce evasion resistant CPU-level detection alongside OS-level sandboxing and key into the rise of known and unknown malware.
Posted: 11 Feb 2016 | Published: 25 Oct 2015

Kingpin Communications

Security Operations in the Cloud
sponsored by TrendMicro
WHITE PAPER: This white paper discusses some best practices to adopt in securing workloads in Amazon Web Services.
Posted: 05 Feb 2016 | Published: 31 Jan 2016

 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement