IT Management  >   Systems Operations  >   Security  >  

Management of Security

RSS Feed    Add to Google    Add to My Yahoo!
Management of Security Reports
 
Vulnerability Management for the Mid-Size: How to Run a World Class Program Even if You're Not IBM
sponsored by Risk IO
WHITE PAPER: In this white paper, discover how you can design a high-quality vulnerability management program on a midsized budget and with a small security team.
Posted: 20 May 2015 | Published: 20 May 2015

Risk IO

How to Sync, Share & Control Data Securely
sponsored by Commvault
WHITE PAPER: Access this resource to learn about a solution to data security in the world of cloud file sharing.
Posted: 03 Jun 2015 | Published: 03 Jun 2015

Commvault

Moving Toward Endpoint Antivirus Alternatives And Three Ways to Prioritize Endpoint Security
sponsored by Malwarebytes Corporation
EGUIDE: Access this exclusive e-guide to discover three tips that will help you prioritize the weakest point in network security – the endpoint – over perimeter defenses. Also, learn how to move toward endpoint antivirus alternatives after antimalware.
Posted: 16 Jun 2015 | Published: 16 Jun 2015


Managing App Sideloading Threats on iOS 2015
sponsored by Lookout
WHITE PAPER: Download and discover how hackers are using app sideloading to take advantage of your enterprise provisioning, and learn how you can manage the emerging security threats.
Posted: 26 Jun 2015 | Published: 26 Jun 2015

Lookout

Putting the “Secure” in Secure Remote Access
sponsored by Citrix
WHITE PAPER: In this white paper, you'll learn about the core strengths of Citrix NetScaler paired with Unified Gateway for secure remote access consolidation.
Posted: 05 Jun 2015 | Published: 29 May 2015

Citrix

Is Your Content Really Secure?
sponsored by Limelight Networks, Inc.
WHITE PAPER: Access this brief white paper to learn how you can simplify the content security process.
Posted: 15 May 2015 | Published: 15 May 2015

Limelight Networks, Inc.

2015 Mobile Threat Report
sponsored by Pulse Secure
WHITE PAPER: Access this white paper to discover in-depth research about the current state of mobile security and learn what you need to do to keep your enterprise protected.
Posted: 10 Jun 2015 | Published: 10 Jun 2015

Pulse Secure

The Quick Guide to Data Protection Managed Security Services
sponsored by NexGen Storage
WHITE PAPER: This white paper explores the 3 reasons cybercriminals target organizations with limited IT staffs and why data protection needs to be the number one priority.
Posted: 27 May 2015 | Published: 29 Apr 2015

NexGen Storage

Protect Your Web Applications from the OWASP Top 10
sponsored by IBM
WHITE PAPER: Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
Posted: 22 Jun 2015 | Published: 31 Aug 2012

IBM

Keep Yourself Secure from Growing Cyber-Threats
sponsored by Hewlett-Packard Limited
WHITE PAPER: In this infographic, discover what you can do to stay safe in an increasingly dangerous cyber landscape, including increasing proactivity in your security strategy and partnering with security services.
Posted: 21 May 2015 | Published: 21 May 2015

Hewlett-Packard Limited
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement