IT Management  >   Systems Operations  >   Security  >  

Managing Security

RSS Feed    Add to Google    Add to My Yahoo!
Managing Security Reports
 
Understanding Identity Governance
sponsored by SailPoint Technologies
EBOOK: Identity governance is one of the more undervalued aspects of enterprise security. Read this white paper to learn why every organization needs identity governance, the four steps to building the case for it, and how you stand to benefit.
Posted: 16 Nov 2017 | Published: 16 Nov 2017

SailPoint Technologies

7 Requirements for an Effective EFSS Platform
sponsored by Citrix
WHITE PAPER: Discover how to make sure you enterprise file sync and sharing (EFSS) offers the flexibility that users need without sacrificing security. Learn how to mitigate the risks associated with personal file-sharing services and uncover 7 key requirements for a sound EFSS platform.
Posted: 23 Oct 2017 | Published: 23 Oct 2017

Citrix

A CISO's Guide to Mobile Threat Defense
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Security systems need an upgrade to be able to protect mobile devices and apps in the workplace. Read this white paper to learn the 5 major threats to mobile security, then find out what steps you can take to mitigate these vulnerabilities.
Posted: 12 Oct 2017 | Published: 12 Oct 2017

Check Point Software Technologies Ltd.

Cisco Stealthwatch Cloud Free Trial
sponsored by AWS-Cisco
SOFTWARE DEMO: If you want to compete in modern business, you need to adopt the cloud. You also need a way to secure your public cloud, private network, and/or hybrid environment. Access this free trial of Cisco's Stealthwatch Cloud, a software-as-a-service cloud security tool for visibility and threat detection.
Posted: 07 Nov 2017 | Premiered: 07 Nov 2017

AWS-Cisco

Protecting the Financial Services Organization
sponsored by Juniper Networks, Inc.
WHITE PAPER: Click inside to learn how cyberattacks have grown and changed over the past several years. Discover best practices already in place in financial service firms that you can bring back to your organization.
Posted: 17 Nov 2017 | Published: 30 Jun 2017

Juniper Networks, Inc.

The Australian Privacy Amendment Explored
sponsored by Rapid7
DATA SHEET: Australia's new privacy amendment, which was set into place in 2016, requires many companies to report any data breach to the government. This resource outlines a proactive approach that can help you get on top of this, and any other data privacy laws.
Posted: 28 Nov 2017 | Published: 28 Nov 2017

Rapid7

The Stakes Have Changed: No End in Sight for DDoS Attack Size Growth
sponsored by Arbor Networks
RESOURCE: In this resource, gain a better understanding of how IoT devices become vulnerable to the spread of IoT botnets, so your organization can move towards a more secure and reliable IoT future.
Posted: 24 Oct 2017 | Published: 24 Oct 2017

Arbor Networks

All Together Now: Securing the Internet of Things
sponsored by Juniper Networks, Inc.
WHITE PAPER: In this white paper, learn how deeper visibility into network utilization and behavior from IOT devices can help improve both network management and network security. Then, uncover the tools and techniques IT pros can implement for stronger IoT security.
Posted: 20 Nov 2017 | Published: 20 Nov 2017

Juniper Networks, Inc.

Design and deliver cloud-based apps and data for flexible, on-demand IT
sponsored by Citrix
WHITE PAPER: Download this white paper to discover how a cloud-based management platform can enable IT to deliver the right set of workspace services for each user—desktops, apps, data sharing and mobility management—into a secure mobile workspace that is accessible on any network from any device.
Posted: 17 Nov 2017 | Published: 17 Nov 2017

Citrix

CW ANZ – November 2017: On cyber alert
sponsored by ComputerWeekly.com
EZINE: In this month's CW ANZ, read about the state of cyber security in Australia, Telstra's efforts to help enterprises improve their cyber security posture, and how Australian organisations can keep up with the demands of cyber security.
Posted: 10 Nov 2017 | Published: 10 Nov 2017

ComputerWeekly.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement