IT Management  >   Systems Operations  >   Security  >  

Management of Security

RSS Feed    Add to Google    Add to My Yahoo!
Management of Security Reports
 
Cybersecurity and Data Theft Prevention
sponsored by Forcepoint
WHITE PAPER: This white paper provides a non-technical overview on cybersecurity and provides topics that every CEO should consider. Learn how to identify the critical data at the heart of your organization and conduct an in-depth assessment of your current security posture.
Posted: 28 Apr 2016 | Published: 01 Mar 2016

Forcepoint

Enterprise Security Innovation on the AWS Cloud
sponsored by Unisys
WHITE PAPER: One security leader optimized its offerings to give AWS customers a fast and convenient way to protect their data and applications against evolving threats. Discover ways to easily integrate additional protection, comply with regulations, and micro-segment off your virtual machines from neighbors when working on the cloud.
Posted: 17 May 2016 | Published: 19 Jan 2016

Unisys

ESG Lab Validation Report: McAfee Next Generation SIEM
sponsored by Intel Security
WHITE PAPER: Access this ESG lab validation report to discover unbiased answers and expertise as to how a holistic security approach, which can leverage multiple interconnected security solutions as a unified ecosystem, might be the answer to today's frustrating IT security dilemmas.
Posted: 06 May 2016 | Published: 30 Apr 2015

Intel Security

The Workstation Monitoring Imperative
sponsored by Intersect Alliance
WHITE PAPER: This white paper shows you how to better monitor your corporate data as it travels along your workstations – see who is accessing this data and where it's being stored and accessed. Access now to not only better secure your data, but also adhere to current compliance standards like PCI DSS, HIPPA and SOX and FISMA.
Posted: 02 May 2016 | Published: 01 Apr 2016

Intersect Alliance

ELIMINATING CYBERSECURITY BLIND SPOTS WITH APPLICATION AWARENESS
sponsored by Ipoque
WEBCAST: This webinar will review the hidden cyber security threats that Service Provides and Enterprises need to combat.
Posted: 04 May 2016 | Premiered: Apr 26, 2016

Ipoque

Data Privacy and Protection: 5 Insights from the Experts
sponsored by Iron Mountain
EBOOK: With major data breaches in the news nearly every day, the privacy of business information is on the minds of companies across the globe. Discover exclusive insight from experts on data privacy and protection—and learn how new data privacy laws affect records management, 5 steps to redefining your retention policies, and more.
Posted: 17 May 2016 | Published: 17 May 2016

Iron Mountain

Understanding Cyberthreat Motivations to Improve Defense
sponsored by Intel Security
WHITE PAPER: Find out why you must add cyber-criminal motivation to your threat taxonomy in order to understand what causes a threat agent to commit harmful acts. Read on to discover in detail the elements of this new parameter and how this crucial understating of the hacker's mind can help protect your entire infrastructure.
Posted: 06 May 2016 | Published: 06 May 2016

Intel Security

Secur ing Productivity in the Border less Enterprise
sponsored by Microsoft
WHITE PAPER: The combination of cloud and mobility can allow for great employee productivity and greater customer responsiveness. However, these new business opportunities mean nothing if you can't protect against the new security challenges they bring.
Posted: 13 May 2016 | Published: 01 Apr 2016

Microsoft

AirWatch EMM Gets Windows 10 Support, Security
sponsored by VMware
EGUIDE: This e-guide provides an update on AirWatch's new privacy initiative, and teaches you the benefits of integrating the EMM tool into your business. Access now and also learn how AirWatch added Windows 10 support, and partnered with a number of security software providers to bolster its EMM tool.
Posted: 21 Apr 2016 | Published: 20 Apr 2016

VMware

Identity-Driven Micro-Segmentation Everywhere you Work
sponsored by Unisys
RESOURCE: Discover how micro-segmentation can defend your data in public and private clouds, so you can securely expand your business. Access now and you'll also learn how cryptography can cloak your data and servers from dangerous cyber-attacks.
Posted: 23 May 2016 | Published: 23 May 2016

Unisys
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement