IT Management  >   Systems Operations  >   Security  >  

Management of Security Information

RSS Feed    Add to Google    Add to My Yahoo!
Management of Security Information Reports
 
Don't Be the Next Cyber Victim
sponsored by eSentire
WEBCAST: The best way to manage the complexities of cybersecurity is to simplify it. Micro-incident response has the capability to protect your network 24/7, 365 days per year. Access now to stop small breaches from turning into business-ending catastrophes.
Posted: 19 Apr 2016 | Premiered: Mar 1, 2016

eSentire

10 Characteristics of a HIPAA-Compliant ePHI Application
sponsored by Coalfire
WHITE PAPER: The root cause of HIPAA-compliance gaps often lies in application software that is not HIPAA-compliant – the software simply lacks the required or implied security functionality. Uncover the 10 security requirements of a HIPAA-compliant ePHI app.
Posted: 19 May 2016 | Published: 19 May 2016

Coalfire

Top 10 Security Priorities For US Healthcare Organizations
sponsored by Absolute
WHITE PAPER: This report by Gartner reveals the main security challenges the healthcare industry faces. Unveil the top 10 security priorities for US healthcare organizations so that you can address the industry's most difficult challenges.
Posted: 24 May 2016 | Published: 22 Oct 2015

Absolute

The What, the Why, and the How of Hybrid Cloud
sponsored by Intel Security
WHITE PAPER: Many of us have come to think of The Cloud as referring to public or private clouds. However, hybrid cloud means not having to choose. Access this comprehensive white paper to learn about what hybrid clouds really are, the top five business benefits of the hybrid cloud, and 14 reasons why you should re-think going the public cloud route altogether.
Posted: 06 May 2016 | Published: 27 Apr 2016

Intel Security

Stop the Bad Guys Cold: Securing Your Mobile Data
sponsored by Commvault
WHITE PAPER: This white paper teaches you about the growing popularity of mobile endpoint solutions. They contain a spectrum of capabilities ranging from a simple solution set to a mobile protection platform. Access now to see critical security features that your solution set must have.
Posted: 22 Apr 2016 | Published: 31 Dec 2015

Commvault

Why IT Leaders Are Buying into Mobile Security
sponsored by Lookout
WHITE PAPER: As mobile devices continue to play a major role in productivity, the likelihood for targeted cyber-attacks will continue to intensify. Discover how CIOs prioritize their mobile security investments today, and ensure mobility doesn't become a liability to your organization—even with the risk of data breach.
Posted: 17 May 2016 | Published: 17 May 2016

Lookout

Read this before attempting network microsegmentation
sponsored by VMware
EGUIDE: Microsegmentation is emerging as an essential networking, data center and security tool, but it's a difficult tool to master. This expert guide reveals the technology's benefits and disadvantages, considerations to take into account during the adoption process and what kind of services vendors are offering.
Posted: 17 May 2016 | Published: 04 May 2016

VMware

eSentire Partner Program
sponsored by eSentire
WHITE PAPER: This white paper gives you a brief overview of the eSentire partner program and how becoming a partner will allow you to reach new customers, increase revenues, expand your portfolio and grow market share. Access now and learn about their program benefits, requirements and if it is the right fit for you.
Posted: 19 Apr 2016 | Published: 01 Mar 2016

eSentire

Anatomy of a Cyber-Attack
sponsored by Dell Software
WHITE PAPER: You need to understand the enemy -- and their malware -- before you can defeat them. Discover a comprehensive strategy to counter every stage of cyber-attacks and eliminate every type of malware from disrupting your network.
Posted: 20 May 2016 | Published: 20 May 2016

Dell Software

IDC-Analyst-Connection-ISFW
sponsored by Fortinet, Inc.
ANALYST REPORT: This report documents security questions and answers from Chris Christiansen, program vice president for IDC's Security Products and Services group. Access now to learn the latest on perimeter defense and how Christiansen believe organizations can better protect their increasing databases.
Posted: 28 Apr 2016 | Published: 01 Jul 2015

Fortinet, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement