IT Management  >   Systems Operations  >   Security  >  

Management of Security

RSS Feed    Add to Google    Add to My Yahoo!
Management of Security Reports
 
IDC MarketScape: Worldwide Email Security 2016 Vendor Assessment
sponsored by Forcepoint
WHITE PAPER: In this report excerpt learn about the email security market, how it is experiencing an influx of new features to deal with adapting threats, and how Forcepoint has been named a leader in the market.
Posted: 17 Feb 2017 | Published: 17 Feb 2017

Forcepoint

An Essential Checklist for Your Security Response Solution
sponsored by ServiceNow
WHITE PAPER: Learn what the required capabilities of your security response are and how to put your organization on the path to tailoring your response to fit your needs with 7 keys to succeed in today's high-risk environment.
Posted: 30 Jan 2017 | Published: 30 Jan 2017

ServiceNow

How to Strengthen Your Identity Infrastructure
sponsored by ExtraHop
WHITE PAPER: Few things are as essential to organizational health as identity infrastructure, which has greatly increased in importance because of new service models. Learn how to cut complexity and regain control of IT services, including identity systems, by unlocking the hidden value in data flowing through your network.
Posted: 02 Feb 2017 | Published: 02 Feb 2017

ExtraHop

Modernize Cybersecurity with Hadoop Data Management and Analytics
sponsored by Cloudera
WHITE PAPER: Explore how to modernize your cybersecurity architecture, detect advanced threats faster, and accelerate threat mitigation with a data-driven strategy. Prepare your organization by leveraging big data, machine learning, and advanced analytics.
Posted: 07 Feb 2017 | Published: 31 Dec 2016

Cloudera

Deploying a Multiā€Gigabit Web Filtering Architecture
sponsored by ContentKeeper
WHITE PAPER: This white paper explores how to redouble web filtering efforts in the face of growing bandwidth and processing requirements. Discover multiple approaches to cultivating a well-managed multi-gigabit architecture, exploring the pros and cons of each, plus uncover tips on how to keep up with one-to-one computing and SSL encrypted sites.
Posted: 08 Feb 2017 | Published: 31 Dec 2016

ContentKeeper

Securely Bridge Traditional and Cloud Application Environments
sponsored by A10 Networks
WEBCAST: Access this webinar to uncover how to securely manage your ADCs, deliver secure application services across multiple environments and learn how to detect and mitigate DDoS attacks against your applications and business.
Posted: 13 Feb 2017 | Premiered: Feb 13, 2017

A10 Networks

Web Filtering and Security: Capital Area Intermediate Unit Case Study
sponsored by ContentKeeper
CASE STUDY: This case study explores how to implement a web filtering and security system that can inspect SSL encrypted web page requests and enable more granular control over website access. Discover how to unlock better insight into and control over the use of Web 2.0 tools and SSL encrypted sites.
Posted: 03 Feb 2017 | Published: 31 Dec 2016

ContentKeeper

10 Tips for Protecting Data in the Cloud
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Discover 10 tips on how to keep your data safe in the cloud. Learn how to limit the harm the cloud poses to your business, mitigate privacy concerns, and retain full control of your information in-transit and in-use.
Posted: 22 Feb 2017 | Published: 22 Feb 2017

Symantec & Blue Coat Systems

Use a web app firewall to halt app attacks
sponsored by SearchSecurity.com
EBOOK: Web application firewalls are more essential than ever when it comes to halting app attacks. Learn what features and functions you should look for when choosing a new WAF.
Posted: 07 Feb 2017 | Published: 05 Feb 2017

SearchSecurity.com

Threat Intelligence: Your Secret Weapon
sponsored by AlienVault
WHITE PAPER: Within 24 months of a major data loss, 72% of businesses are forced to shut their doors. Learn how SMBs can gain the threat data, intelligence, experience, wisdom, expertise, and focused attention needed to identify and control attacks.
Posted: 03 Feb 2017 | Published: 21 Sep 2016

AlienVault
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement