IT Management  >   Systems Operations  >   Security  >  

Management of Security

RSS Feed    Add to Google    Add to My Yahoo!
Management of SecurityReports
 
Streamline Windows 7 Migration with this Endpoint Manager
sponsored by IBM
WHITE PAPER: Check out this valuable whitepaper now to learn about an endpoint management solution that can consolidate your systems management infrastructure, automate your processes, clear out inefficiencies, and much more.
Posted: 11 Nov 2014 | Published: 11 Jul 2014

IBM

SIEM missteps? Tips to Help you move Forward
sponsored by LogRhythm, Inc.
WEBCAST: Download this expert webcast now to learn about implementing the necessary practices for effective security information and event management use.
Posted: 24 Nov 2014 | Premiered: Nov 13, 2014

LogRhythm, Inc.

How to Use Threat Intelligence with SIEM Products
sponsored by LogRhythm, Inc.
EGUIDE: This expert e-guide will teach you how to use security information and event management to protect your organization from evolving threats.
Posted: 24 Nov 2014 | Published: 24 Nov 2014

LogRhythm, Inc.

Ponemon Cost of Cyber Crime Study: Global Report
sponsored by Hewlett-Packard Company
WHITE PAPER: Ponemon Institute's 2014 Cost of Cyber Crime Study taps into the collective experience of 257 organizations in seven countries, describing the most common and most costly types of attacks; the greatest internal and external costs; and the security technologies most effective in reducing losses.
Posted: 19 Nov 2014 | Published: 19 Nov 2014

Hewlett-Packard Company

Minimize Check Fraud and Counterfeited Print
sponsored by Hewlett-Packard Limited
WHITE PAPER: This white paper introduces a solution developed by HP and TROY to control check printing operations and help prevent fraud on finished checks, adding security to a variety of applications.
Posted: 10 Nov 2014 | Published: 31 Mar 2014

Hewlett-Packard Limited

Protecting Your Business with a More Mature IT Security Strategy
sponsored by Hewlett-Packard Company
WHITE PAPER: HP Security Intelligence and Operations Consulting has performed maturity assessments evaluating people, processes and technology in 69 SOCs. This report presents their findings on the measured maturity level of SOCs by industry.
Posted: 20 Nov 2014 | Published: 20 Nov 2014

Hewlett-Packard Company

Protect Your Business from DDoS and Web Application Attacks
sponsored by Akamai Technologies
VIDEO: A solution more and more companies are turning to is cloud based service approach. You can scale the service to deal with ever increasing threats in a cost effective manner. Download and view this video to get an inside look at Forrester Research's findings regarding DDoS and application attacks.
Posted: 07 Nov 2014 | Premiered: 30 Oct 2014

Akamai Technologies

How to Manage Privileged Access in the Enterprise
sponsored by Gemalto
WHITE PAPER: This exclusive whitepaper covers five key tips for managing privileged access in the enterprise.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

Gemalto

The Internet of Things: A CISO and Network Security Perspective
sponsored by Cisco
WHITE PAPER: This exclusive whitepaper dives head first into the realities of the Internet of Things, including the security considerations that go along with it.
Posted: 24 Nov 2014 | Published: 14 Oct 2014

Cisco

Redefining your Security Vision
sponsored by ComputerWeekly.com
RESOURCE: Despite its undisputed dominance of the security market recently, Symantec's revenues have remained static. Will the expansion of its enterprise data security, cloud and mobile portfolio return it to growth? Take our brief survey and you'll gain immediate access to a ComputerWeekly eguide, Building momentum: Symantec's new approach to security.
Posted: 10 Nov 2014 | Published: 10 Nov 2014

ComputerWeekly.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement