Business of Information Technology  >   Business Management  >  

Managing Risk

RSS Feed    Add to Google    Add to My Yahoo!
Managing Risk Reports
 
ESG Brief: Threat Intel as part of Cyber Situational Awareness
sponsored by Digital Shadows
WHITE PAPER: This white paper shows you a new threat intelligence provider that offers a SaaS-based portal and team of intelligence operations analysts that can tailor threat intelligence to your needs.
Posted: 08 Feb 2016 | Published: 31 Dec 2015

Digital Shadows

Security for Virtual Machines
sponsored by TechData Corporation
WHITE PAPER: In this white paper you will discover how you can achieve outstanding, multi-layered, granular protection for your VDI and virtual server environments with little impact on responsiveness on virtualized workloads.
Posted: 28 Jan 2016 | Published: 14 Dec 2015

TechData Corporation

Physical vs. Virtual Desktop Security: It's Just Not The Same
sponsored by Dell
EGUIDE: This e-guide shows you the difference in security methods for virtual and physical desktops. Learn about different techniques and audiences each platform is catered to.
Posted: 10 Feb 2016 | Published: 03 Feb 2016

Dell

Gartner Competitive Landscape: Endpoint Detection & Response (EDR)
sponsored by Digital Guardian
WHITE PAPER: In this white paper, you will examine critical EDR customer buying behaviors, solution use cases and technologies that product managers and marketing professionals must consider.
Posted: 29 Jan 2016 | Published: 26 Nov 2014

Digital Guardian

Data-Aware Storage: Introducing a New Era of Data Management
sponsored by DataGravity
RESOURCE CENTER: This white paper shows you a new way to store data: data-aware storage. This storage architecture combines state-of-the-art primary storage with integrated data services to create an entirely new method of storage.
Posted: 09 Feb 2016 | Published: 31 Dec 2015

DataGravity

Lightboard WildFire vs Standalone Sandboxing
sponsored by Palo Alto Networks
VIDEO: This white paper gives you insight on how to protect against zero-day threats by using both static and dynamic analysis techniques.
Posted: 12 Feb 2016 | Premiered: 17 Oct 2014

Palo Alto Networks

SANS- A Proactive Response to Incident Response
sponsored by Blue Coat Systems
WHITE PAPER: In this white paper, you will discover the keys to lowering IR costs and maximizing ROI, View now and learn how to increase your organization's security level by developing an IR process utilizing manual and basic forensics.
Posted: 29 Jan 2016 | Published: 31 Dec 2015

Blue Coat Systems

SANS_A Proactive Approach to Incident Response
sponsored by Blue Coat Systems
WEBCAST: Discover how to move to a proactive incident response model to stop cyber-attacks before they can steal data or harm your reputation.
Posted: 04 Feb 2016 | Premiered: Dec 31, 2015

Blue Coat Systems

The Top 4 Most Pressing Android Mobile Cybersecurity Threats
sponsored by Kingpin Communications
WHITE PAPER: In this paper, you will break down the most common types of attacks that impact Android mobile devices. Read on to enact comprehensive protection against threats to Android, and prepare your mobile endpoints against mRATS, zero-day attacks, and more.
Posted: 11 Feb 2016 | Published: 30 Mar 2015

Kingpin Communications

Checkpoint: Demystifying Mobile Security Attacks
sponsored by Kingpin Communications
WHITE PAPER: In the following white paper, you will examine some of the most common mobile attacks, and moreover demystify how the attacks work and the damage they can cause.
Posted: 11 Feb 2016 | Published: 30 Mar 2015

Kingpin Communications
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement