IT Management  >   Systems Operations  >   Security  >  

Management of Security Information

RSS Feed    Add to Google    Add to My Yahoo!
Management of Security Information Reports
Data Protection and Business Continuity in a Mobile World: A Guide for SMBs
sponsored by Hewlett-Packard Company
WHITE PAPER: This report discusses the specific security challenges that face SMBs and gives advice for how they can keep their data secure with the resources they have.
Posted: 30 Sep 2015 | Published: 30 Jun 2015

Hewlett-Packard Company

Website Security for Dummies
sponsored by WhiteHat Security
EBOOK: Read this eBook to discover the best practices for secure site development, configuration, setup, and maintenance.
Posted: 01 Oct 2015 | Published: 31 Dec 2014

WhiteHat Security

Advanced Threat Detection and Remediation: Why it's Needed
sponsored by Hewlett-Packard Company
WHITE PAPER: An effective security program must not only attempt to detect and block incoming threats; it must detect and neutralize successful attacks before the damage is done, too. This white paper explains why advanced threat detection is now a necessary part of any cyber security program.
Posted: 09 Sep 2015 | Published: 09 Sep 2015

Hewlett-Packard Company

An Executive's Guide to Budgeting for SIEM Systems
sponsored by Trustwave
WHITE PAPER: This white paper calculates how much in-house SIEMs and managed SIEM services cost an enterprise, helping you determine which option is most cost-effective for your business.
Posted: 30 Sep 2015 | Published: 30 Sep 2015


Case Study: Oxford University Hospitals Cuts Waste with Single Sign-On
sponsored by Imprivata
WHITE PAPER: Access this case study to discover how Oxford University Hospitals sped up the process of secure EPR access, cutting out waste and freeing up more time for patient care.
Posted: 25 Sep 2015 | Published: 31 Dec 2014


Close the Door on Cryptographic Key and Certificate Threats
sponsored by Venafi
WHITE PAPER: This white paper explores how exploits use cryptographic keys and certificates to compromise organizations, and how businesses can reduce their attack surface by securing them.
Posted: 10 Sep 2015 | Published: 31 Dec 2013


Actionable Threat Intelligence to Manage Supply Chain Risk
sponsored by BrightPoint Security
WHITE PAPER: This white paper tackles the issue of cybersecurity within the supply chain, suggesting a method of shared security and threat intelligence to prevent third-party vendors from putting you at risk.
Posted: 08 Sep 2015 | Published: 27 Aug 2015

BrightPoint Security

Beyond Mobile Device Security: Comprehensive Endpoint Security for SMBs
sponsored by Earthlink.
WHITE PAPER: This white paper addresses the unique challenges of mobile security in an SMB environment and gives suggestions for tackling those challenges.
Posted: 16 Sep 2015 | Published: 16 Sep 2015


Border Security Solutions
sponsored by Unisys
WHITE PAPER: This resource introduces a border protection solution that embraces human interaction, while using advanced biometric technology to fortify and streamline the crossing process, all while delivering more reliable results.
Posted: 02 Oct 2015 | Published: 02 Oct 2015


Top 10 Reasons to Strengthen Information Security with App and Desktop Virtualization
sponsored by Citrix
WHITE PAPER: In this paper we explore ten reasons why desktop virtualization should be the foundation of your layered approach to information security.
Posted: 16 Sep 2015 | Published: 03 Dec 2013

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement