IT Management  >   Systems Operations  >   Security  >  

Management of Security

RSS Feed    Add to Google    Add to My Yahoo!
Management of Security Reports
 
Protect Privileged Credentials Across Traditional and Virtual Data Centers, and all Cloud Environments
sponsored by CA Technologies.
WHITE PAPER: This white paper highlights a solution for privileged credential management that drives IT risk reduction and operational efficiency by supporting traditional, virtualized, and hybrid-cloud infrastructures. Read on to discover how this platform can allow your enterprise to protect and manage all your credentials.
Posted: 04 Feb 2016 | Published: 04 Feb 2016

CA Technologies.

SIEM Solution Report: How Did Yours Score?
sponsored by IBM
WHITE PAPER: This report looks at 13 SIEM tools and identifies each one's strengths and cautions. Access now to determine if your ideal SIEM strategy is a niche player, a visionary, a challenger, or a leader.
Posted: 25 Jan 2016 | Published: 20 Jul 2015

IBM

Client Study: Security Intelligence
sponsored by IBM
WHITE PAPER: This report features quantitative statistics documenting the required time, skills and the typical workflow IT security teams utilize to investigate suspected network attacks, security breaches and recognized data loss scenarios. Uncover findings from 196 US IT and IT security practitioners.
Posted: 25 Jan 2016 | Published: 31 Jul 2015

IBM

Securing the Enterprise with an ADC
sponsored by A10 Networks
WHITE PAPER: To protect web applications, organizations need to deploy the right firewalls. Access this infographic to learn more ways to strengthen security in the enterprise when you secure your data center assets, protect sensitive data with SSL offloading, and more.
Posted: 25 Jan 2016 | Published: 25 Jan 2016

A10 Networks

PCI DSS Practical Guidelines for Compliance
sponsored by Tenable Network Security
RESOURCE: This resource looks at how retail enterprises can do better at thinking about and actualizing their security.
Posted: 23 Dec 2015 | Published: 23 Dec 2015

Tenable Network Security

Peer-to-Peer Peril: How Peer-to-Peer File Sharing Impacts Vendor Risk and Security Benchmarking
sponsored by BitSight
WHITE PAPER: BitSight recently observed the networks of 30,700 companies across all industries and found 23% of organizations were using the BitTorrent protocol for peer-¬to-¬peer file sharing. In this report you will learn which industries excel in mitigating the risks of file sharing, how P2P file sharing activity impacts security ratings and more.
Posted: 05 Feb 2016 | Published: 05 Feb 2016

BitSight

Making Risk Management More Effective with Security Ratings
sponsored by BitSight
WHITE PAPER: This white paper talks about some of the security risk management approaches organizations have taken as well as new approaches to othe growing problems.
Posted: 04 Feb 2016 | Published: 30 Apr 2014

BitSight

Comparing Security Features of Old and New Operating System Rollouts
sponsored by Microsoft
WHITE PAPER: This quick guide offers a side-by-side comparison of what to expect between legacy and emerging operating systems. Discover details on how important security features have evolved.
Posted: 05 Feb 2016 | Published: 05 Feb 2016

Microsoft

The Global Risks Report 2016
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from the World Economic Forum identifies the most pressing global risks countries and organisations will face in 2016, including sections on technology and cyber crime.
Posted: 20 Jan 2016 | Published: 20 Jan 2016

ComputerWeekly.com

Combating the Next Generation of Advanced Malware
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This white paper invites you to take a look beyond traditional network security measures. Read on and discover how a cloud-based sandbox with full system emulation can detect and block advanced malware and zero day attacks.
Posted: 18 Jan 2016 | Published: 18 Jan 2016

WatchGuard Technologies, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement