IT Agents  >   IT Workforce  >   Information Technology Professionals  >  

Managers

RSS Feed    Add to Google    Add to My Yahoo!
Managers Reports
 
Protecting Your Organization from DNS Security Threats
sponsored by Cloudmark
WEBCAST: This webinar provides a detailed look at common threats to DNS infrastructure, and how your enterprise can mitigate these threats.
Posted: 26 Jan 2015 | Premiered: Nov 13, 2014

Cloudmark

The Zero Trust Model Of Information Security
sponsored by Zscaler
WHITE PAPER: This white paper introduces the Zero Trust Model of information security, which eliminates the idea of trusted and untrusted networks in favor of viewing all network traffic as untrusted.
Posted: 27 Jan 2015 | Published: 22 Oct 2014

Zscaler

Can Your Organization Brave The New World of Advanced Cyber Attacks?
sponsored by Websense
WHITE PAPER: This white paper discusses three key factors that your enterprise needs to watch in order to fend off cyberattackers: Rapidly evolving attacks, enterprise mobility, and a shortage of security personnel.
Posted: 02 Feb 2015 | Published: 08 Jan 2015

Websense

Point of Sale (POS) Systems and Security
sponsored by Bit9 + Carbon Black
WHITE PAPER: This white paper explains why organizations need more than the PCI DSS compliance stamp in order to truly secure their POS systems; describes how to secure your POS systems against common attacks; and discusses the Council on CyberSecurity's top 20 suggestions for protecting payment card information.
Posted: 16 Jan 2015 | Published: 31 Oct 2014

Bit9 + Carbon Black

Recognizing Five Sources of High-Profile Data Security Breaches
sponsored by Mimecast
WHITE PAPER: This white paper discusses the 5 major categories of vulnerabilities that IT and security professionals need to account for in their solutions planning.
Posted: 06 Feb 2015 | Published: 06 Feb 2015

Mimecast

Cloud Security: Enterprise Point of View
sponsored by Dimension Data
VIRTUAL SEMINAR: Access this webcast today to listen as Darren O'Loughlin, CSO for Dimension Data's global business enabling IT as a Service, shares strategic objectives for securing applications and workloads on an enterprise-class cloud.
Posted: 29 Jan 2015 | Premiered: 26 Nov 2014

Dimension Data

APTs: Why the Best Defense is a Full Spectrum Offense
sponsored by Zscaler
WHITE PAPER: This white paper provides answers to all of your questions about advanced persistent threats, from the APT lifecycle to the best ways to evaluate potential APT defense solutions.
Posted: 23 Jan 2015 | Published: 23 Jan 2015

Zscaler

Next-Generation Firewalls and IPS: Why You Need Both
sponsored by Hewlett-Packard Company
WHITE PAPER: This HP white paper shows how next-generation firewalls and next-generation intrusion prevention systems are complementary security solutions that work together to secure your network.
Posted: 01 Feb 2015 | Published: 11 Dec 2014

Hewlett-Packard Company

The Big Shift to Cloud-Based Security for Small Businesses
sponsored by Qualys
WHITE PAPER: This white paper explains why SMBs are just as vulnerable to cyberattacks as larger corporations, and how cloud-based security can provide them with a stronger network security posture without breaking the bank.
Posted: 28 Jan 2015 | Published: 29 Aug 2014

Qualys

Why IT Leaders Should Take Strategic Action in Mobile and Endpoint Computing in 2015
sponsored by Absolute Software
WHITE PAPER: This white paper explains why enterprises should develop a broader-based, long-term endpoint strategy that connects to business goals, processes, and practices.
Posted: 19 Jan 2015 | Published: 25 Apr 2014

Absolute Software
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement