Business of Information Technology  >   Business Management  >  

Managing Risk

RSS Feed    Add to Google    Add to My Yahoo!
Managing Risk Reports
 
Protect Company Data with Encryption & Remote Management
sponsored by Intel Security
WHITE PAPER: Simplify enterprise security management with broad, centralized control and stronger, more efficient options for protecting endpoints. View now to stay ahead of emerging threats with proven TCO-friendly solutions that lock down endpoints and keep data secure without dragging down user or mobile-workforce productivity.
Posted: 19 May 2016 | Published: 01 Apr 2016

Intel Security

Hulu Solves Their Security Analytics Problems with Exabeam
sponsored by Exabeam
VIDEO: Hulu security decided to utilize user behavior analytics (UBA) to help with this process. They're now able to focus their small team on specific areas of concern rather than watch a whole gamut of areas.
Posted: 20 May 2016 | Premiered: 23 Sep 2015

Exabeam

Protecting Threats in a Small Business Environment
sponsored by CDW
WHITE PAPER: Access this white paper for insights on how small businesses can more efficiently handle their security infrastructure. Even without an extensive IT staff, small businesses can deploy a robust, easy-to-manage security platform protecting your data and your reputation.
Posted: 13 May 2016 | Published: 01 Apr 2016

CDW

Security and availability in extremely adverse environments
sponsored by Barracuda Networks
RESOURCE: Exalo Drilling chose a next-generation firewall to protect their growing infrastructure. The centralized management, application awareness and overall efficiency exceeded their expectations. Learn more about how their experience could benefit your organization's IT infrastructure.
Posted: 16 May 2016 | Published: 01 Apr 2016

Barracuda Networks

Gartner Magic Quadrant for Mobile Data Protection Solutions
sponsored by Intel Security
ANALYST REPORT: Access now to learn the pros and cons of mobile security vendors as Gartner's Magic Quadrant for Mobile Data Protection Solutions dissects the current MDP vendor landscape so you can best understand which company can most effectively help you out if you're looking to bolster your mobile data protection initiatives.
Posted: 12 May 2016 | Published: 01 Oct 2015

Intel Security

Why a Modern Security Architecture Matters
sponsored by Palo Alto Networks
WHITE PAPER: Discover the benefits of an integrated, unified security architecture over the sequential, additive approaches that have evolved the industry. Understand the ability of security architectures to address modern threats while supporting the use of new applications.
Posted: 13 May 2016 | Published: 01 Apr 2016

Palo Alto Networks

Defending Your Office 365 Data: A Complete Guide
sponsored by Datto, Inc.
WHITE PAPER: Discover the pertinent security risks inherent in Office 365, and learn where its built-in security falls short and how you can shore up your defenses to compensate. Gain the knowledge you need to stay secure while taking advantage of the benefits of Office 365 by learning about the 5 most prevalent threats to this platform.
Posted: 16 May 2016 | Published: 16 May 2016

Datto, Inc.

When Business is the App, The App is the Business - Vol 1
sponsored by IBM MaaS360
WHITE PAPER: Businesses need to be much more mindful about safe productivity. Learn how to safely distribute and manage mobile apps, on both BYOD and COPE devices, that are critical to employee productivity and smooth business operations.
Posted: 20 May 2016 | Published: 01 Apr 2016

IBM MaaS360

The Productivity Transformation
sponsored by IBM MaaS360
WHITE PAPER: Your enterprise can't be left behind in this new era of productivity. Enable your employees by creating secure systems that can protect your data while living on less than enterprise secure devices.
Posted: 19 May 2016 | Published: 01 Mar 2016

IBM MaaS360

Evaluating Hybrid Cloud Security Options to Control Network Security
sponsored by MASERGY
EGUIDE: This e-guide helps you evaluate your hybrid cloud security options to best secure your data as it moves to the cloud. Learn what different organizations are implementing to help their situation, including host-based security tools, encryption and other security services.
Posted: 25 May 2016 | Published: 12 May 2016

MASERGY
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement