IT Management  >   Systems Operations  >   Security  >  

Managing Security

RSS Feed    Add to Google    Add to My Yahoo!
Managing Security Reports
State of Security Operations: The 2015 Report on Cyber Defense Maturity
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This report brings you the latest information on the capabilities of today's security operations centers and how they need to improve.
Posted: 23 Nov 2015 | Published: 23 Nov 2015

Hewlett Packard Enterprise

Intellectual Property: Safeguarding Your Organization's Identity
sponsored by TITUS
WHITE PAPER: This infographic has some fast facts about the rate and the risks of IP theft. Take a look to learn how much danger your IP is in – and how you can better keep it safe.
Posted: 11 Nov 2015 | Published: 31 Dec 2013


Advanced, Efficient, and Trusted Security Practices
sponsored by Unisys
DATA SHEET: In this solution brief, you'll discover ways to address threats with new approaches that give you the security, affordability, and management control you need today. Access now and find answers to your most pertinent security questions.
Posted: 05 Nov 2015 | Published: 30 Sep 2015


Case Study: Major Financial Institution Defends against High Volume SQL Injection
sponsored by Akamai
WHITE PAPER: Access this resource to learn how a global financial firm kept valuable data safe from an SQL injection attack.
Posted: 09 Nov 2015 | Published: 09 Nov 2015


Build an End-to-End Frame for Your Enterprise Mobility Security
sponsored by Good Technology
WHITE PAPER: In this report, you will learn how to deliver holistic mobile security architecture to your organization that will preserve end user privacy, and extend this protection to new devices and OS's.
Posted: 20 Nov 2015 | Published: 20 Nov 2015

Good Technology

Combat the Rise of Malware
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This resource discusses the growing malware threat and gives suggestions for combatting zero-day attacks, non-executable attacks, and more.
Posted: 13 Nov 2015 | Published: 26 Oct 2015

Check Point Software Technologies Ltd.

Mobile Healthcare Workspaces Infographic
sponsored by Citrix
RESOURCE: View this infographic to learn about top initiatives impacting healthcare organizations and how to meet these challenges with flexible IT solutions that improve operational efficiency and provide clinicians greater mobility with secure access to healthcare applications and patient data.
Posted: 11 Nov 2015 | Published: 11 Nov 2015


Introduction to the Top Database Security Tools
sponsored by Oracle Corporation
EGUIDE: This expert guide provides detailed information on the most important database security tools and top vendors that you should know about.
Posted: 05 Nov 2015 | Published: 05 Nov 2015

Oracle Corporation

Cybersecurity Investment Pays More Than Monetary Dividends
sponsored by Unisys
EGUIDE: This e-guide discusses the mutual benefits of a strategic partnership between cybersecurity startups and investment firms. View now to learn how your business can earn more than just dividends and reap the benefits of working with new, problem-solving technology.
Posted: 20 Nov 2015 | Published: 20 Nov 2015


Maintain Web Security in an Insecure World
sponsored by Akamai
WHITE PAPER: To be successful in today's hyperconnected world, enterprises need to expand their web offerings without constantly watching the door for intruders. This white paper explains how you can do so.
Posted: 23 Nov 2015 | Published: 23 Nov 2015

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement