IT Management  >   Systems Operations  >   Security  >  

Management of Security

RSS Feed    Add to Google    Add to My Yahoo!
Management of Security Reports
 
Strategies to Ensure Software Security
sponsored by Veracode, Inc.
WEBCAST: In this webcast, you will learn the strategies to ensuring software security and reliability and how to choose a platform that won't fail down the line. Watch now to gain insider tips and guidance.
Posted: 27 Feb 2015 | Premiered: Nov 7, 2014

Veracode, Inc.

Mitigating the Biggest Security Threat of all – Your Users
sponsored by Viewfinity
WHITE PAPER: This white paper describes one method of giving users the admin rights they need while still mitigating the risks they pose.
Posted: 09 Feb 2015 | Published: 01 Feb 2012

Viewfinity

Securing the Perimeter Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This Security School lesson examines how current and future IT trends have affected enterprises' network perimeter strategy and the technology and policy to support it.
Posted: 04 Feb 2015 | Premiered: 09 Feb 2015

SearchSecurity.com

Top 5 Web and Mobile App Security Challenges
sponsored by Veracode, Inc.
RESOURCE: Access this brief infographic to learn the top five challenges to securing web and mobile applications today. View now to explore an alternative strategy to reduce app-layer risk.
Posted: 26 Feb 2015 | Published: 27 Jan 2015

Veracode, Inc.

Why Every CIO Should Consider Vulnerability Assessment a Necessity
sponsored by IBM
WHITE PAPER: In this resource, CIOs will learn why vulnerability assessment is so essential to enterprise security, and can discover a leading vulnerability assessment platform that scans targeted systems on a scheduled basis in order to increase your understanding of your organization's overall security posture.
Posted: 03 Feb 2015 | Published: 30 Apr 2014

IBM

Case Study: Securing 1000+ Apps from a Centralized Dashboard
sponsored by Veracode, Inc.
CASE STUDY: Access this case study to learn how one banking firm centralized their strategy and automated testing to ensure consistency and reduce costs with a cloud-based security platform.
Posted: 26 Feb 2015 | Published: 04 Dec 2014

Veracode, Inc.

Breaking Down Silos and Securing Directory Access
sponsored by IBM
WHITE PAPER: Access this white paper to learn strategies to breaking down directory siloes and how to manage and protect heterogeneous data sources.
Posted: 20 Feb 2015 | Published: 08 Oct 2014

IBM

Recognizing Five Sources of High-Profile Data Security Breaches
sponsored by Mimecast
WHITE PAPER: This white paper discusses the 5 major categories of vulnerabilities that IT and security professionals need to account for in their solutions planning.
Posted: 06 Feb 2015 | Published: 06 Feb 2015

Mimecast

Increase Security and Reduce Costs By Managing Administrator Rights
sponsored by Viewfinity
WHITE PAPER: Access this resource for an exclusive interview with a user that deployed various internet security technologies into their company.
Posted: 04 Feb 2015 | Published: 04 Feb 2015

Viewfinity

Redefining Your Data Protection Strategy: Focus on Recovery
sponsored by Dell Software
WHITE PAPER: In this white paper, you will learn how purpose-built backup appliances (PBBAs) are becoming more popular and how they can help you protect data despite growing demands.
Posted: 20 Feb 2015 | Published: 04 Dec 2014

Dell Software
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement