IT Management  >   Systems Operations  >   Security  >  

Management of Security Information

RSS Feed    Add to Google    Add to My Yahoo!
Management of Security Information Reports
Cybersecurity Spending Strategies to Help your Enterprise
sponsored by Unisys
EGUIDE: This expert guide offers tips on how to strategize your cybersecurity spending to get the most bang for your buck.
Posted: 13 Nov 2015 | Published: 13 Nov 2015


How Sandboxing puts a Stop to Today's Advanced Attacks
sponsored by Check Point Software Technologies Ltd.
VIDEO: This video introduces a modern approach to sandboxing that catches even the most evasive attack. Take a look to learn how you can upgrade your sandboxing capabilities to match today's advanced and zero-day attacks.
Posted: 16 Nov 2015 | Premiered: 20 Oct 2015

Check Point Software Technologies Ltd.

Case Study: Major Financial Institution Defends against High Volume SQL Injection
sponsored by Akamai
WHITE PAPER: Access this resource to learn how a global financial firm kept valuable data safe from an SQL injection attack.
Posted: 09 Nov 2015 | Published: 09 Nov 2015


The ESG Cybersecurity Maturity Model
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Based on their research, Enterprise Strategy Group has developed a cyber security maturity model that classifies organizations as basic, progressing, or advanced.
Posted: 12 Nov 2015 | Published: 22 Oct 2014

Hewlett Packard Enterprise

Outrunning the Bear: 5 Critical Ways To Take a More Collaborative Approach To IT Security
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This white paper examines the challenges inhibiting faster threat response and suggests five critical steps organizations can take to turn security intelligence into action.
Posted: 12 Nov 2015 | Published: 29 May 2015

Hewlett Packard Enterprise

Best Practices for Strong Cyber Security
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Discover how enterprise security best practices can help you avoid suffering financial losses, damage to your brand, and damage to customer relationships caused by undetected or detected too late cyber attacks.
Posted: 20 Nov 2015 | Published: 30 Sep 2015

Hewlett Packard Enterprise

Protect Your Data: Meet the Heroes of a Dynamic Threat Protection System
sponsored by IBM
VIDEO: Organizations take an average of 225 days to detect an advanced persistent threat. Since you can't afford to wait that long, tune into this video and discover a methodology for preventing, detecting and responding to advanced attacks.
Posted: 04 Nov 2015 | Premiered: 09 Feb 2015


Dow Corning Uses Classifications Labels to Help Protect Intellectual Property
sponsored by TITUS
WHITE PAPER: This short case study shows how one multinational company deployed an enterprise-wide classification management system which had the power to easily control document access.
Posted: 16 Nov 2015 | Published: 16 Nov 2015


Security Intelligence: Solving the Puzzle for Actionable Insight
sponsored by LogRhythm, Inc.
WHITE PAPER: This paper discusses why security intelligence is key to developing a modern approach to cybersecurity and explains how you can implement security intelligence in your environment.
Posted: 04 Nov 2015 | Published: 04 Nov 2015

LogRhythm, Inc.

How Partitioning Technology Delivers Consolidation Without Compromising Performance, Security, or Isolation
sponsored by Unisys
WHITE PAPER: In this white paper learn about a new partitioning technology that is architected, designed, and developed to deliver a predictable, secure, scalable, distributed environment. Read on to see a comparison of modern partitioning vs. virtualization options.
Posted: 04 Nov 2015 | Published: 31 Dec 2014

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement