IT Management  >   Systems Operations  >   Security  >  

Management of Security Information

RSS Feed    Add to Google    Add to My Yahoo!
Management of Security Information Reports
 
Cloud Security Concerns and the Perceived Effectiveness of Traditional Security Solutions in a Cloud Environment
sponsored by CloudPassage
WHITE PAPER: The report presents research from a survey of high-level security professionals at major North American organizations on their attitudes toward cloud security, key adoption drivers, and the effectiveness of traditional security solutions in cloud environments.
Posted: 13 Jul 2015 | Published: 30 Jun 2015

CloudPassage

Authentication for Today's Threat Landscape
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses the capabilities of an authentication system that would be effective in today's threat landscape.
Posted: 17 Jul 2015 | Published: 31 Dec 2011

Symantec Corporation

Defend Web Properties from Modern Threats with Citrix NetScaler
sponsored by Citrix
WHITE PAPER: Access this white paper to learn about the challenges of defending modern web app properties from modern threats, and discover how you can benefit from deploying an application delivery controller (ADC).
Posted: 27 Jul 2015 | Published: 30 Jan 2015

Citrix

The True Cost of Cloud Security
sponsored by FireHost Inc.
WHITE PAPER: This white paper explores how higher security in the cloud is the ultimate cost savings measure, even if it appears costly up front.
Posted: 26 Jun 2015 | Published: 26 Jun 2015

FireHost Inc.

The Day after Tomorrow: Cyber-Crisis Management at the Speed of Twitter
sponsored by Hewlett-Packard Limited
WEBCAST: In this video, security expert Andrzej Kawalec explores how to create an efficient cybercrime response plan for fast threat mitigation and for protection of your company's reputation.
Posted: 01 Jul 2015 | Premiered: Jun 4, 2015

Hewlett-Packard Limited

Considerations For Developing Big Data Security Analytics
sponsored by BAE Systems Applied Intelligence (formerly SilverSky)
WHITE PAPER: This guide can teach you how to design, plan and implement a big data solution that will give you the most security benefits.
Posted: 06 Jul 2015 | Published: 31 Dec 2014

BAE Systems Applied Intelligence (formerly SilverSky)

Securing your Enterprise in the Cloud
sponsored by Symantec Corporation
WHITE PAPER: This white paper addresses the issue of cloud security and discusses how you can invest in the cloud without putting your business at risk.
Posted: 20 Jul 2015 | Published: 20 Jul 2015

Symantec Corporation

Keep Corporate Data Secure in a BYOD World
sponsored by Dell, Inc. and IntelĀ®
EGUIDE: Access this expert eGuide to learn the secrets of securing your data from the three common threat vectors by ensuring you have the right VPN features.
Posted: 26 Jun 2015 | Published: 26 Jun 2015

Dell, Inc. and IntelĀ®

Web Security Threat Report 2015
sponsored by Symantec
WHITE PAPER: By using data from the most comprehensive global intelligence network in the world, this resource provides a breakdown of each type of cyber-attack and how you can prevent it.
Posted: 28 Jul 2015 | Published: 28 Jul 2015

Symantec

Insider Threat Patterns and Ways of Prevention
sponsored by Varonis
EGUIDE: This expert guide addresses the danger of accidental insider threats, giving you insight into how to prevent these threats from happening and how you can analyze network activity to stop unusual actions.
Posted: 02 Jul 2015 | Published: 02 Jul 2015

Varonis
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement