IT Management  >   Systems Operations  >   Security  >  

Managing Security

RSS Feed    Add to Google    Add to My Yahoo!
Managing Security Reports
 
US Office of Personnel Management Breach
sponsored by OpenDNS
PODCAST: In this podcast, you'll look into how the breach at the Office of Personnel Management happened and what could, or should, have been done to prevent such a catastrophe. Hear from former government employees who have had their personal data stolen as a result.
Posted: 16 Aug 2016 | Premiered: Jul 1, 2016

OpenDNS

10 Reasons to Archive Your Email in the Cloud
sponsored by LogicNow
WHITE PAPER: Discover 10 reasons why archiving your email in the cloud can give your enterprise an edge, including: hit the ground running with a low barrier to entry, more certainty when estimating costs versus in-house, lower management costs, and more.
Posted: 25 Aug 2016 | Published: 25 Aug 2016

LogicNow

Ransomware: Attack Trends, Prevention, and Response
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Deepen your understanding of the threat of ransomware. Access this white paper and explore ways to better protect your business assets with best practices for attack prevention.
Posted: 11 Aug 2016 | Published: 11 Aug 2016

Check Point Software Technologies Ltd.

Don't Let The Cloud Cast A Shadow On Security
sponsored by Cisco Systems, Inc.
RESOURCE: Discover how cloud adoption is exploding, how risks to enterprise data on the cloud are equally exploding, and how to protect your organization's livelihood after it migrates. Most importantly, learn how to turn your network into a sensor for enhanced security across your entire cloud infrastructure.
Posted: 17 Aug 2016 | Published: 17 Aug 2016

Cisco Systems, Inc.

BYOD Security and Four Challenges to Consider Before Diving In
sponsored by IBM
EGUIDE: You've decided to allow BYOD, but you're concerned with data and device security. What should you do next? Access this expert guide that details the necessary steps to a trusted BYOD security policy and discover 4 BYOD challenges to consider before implementation.
Posted: 29 Jul 2016 | Published: 27 Jul 2016

IBM

Identity Crisis?
sponsored by SearchSecurity.com
EBOOK: IAM security policies must take into account the latest technology developments, especially cloud and the internet of things.
Posted: 19 Aug 2016 | Published: 19 Aug 2016

SearchSecurity.com

Addressing the Security Dangers of "Appification"
sponsored by IBM
WHITE PAPER: Identify the key security dangers of mobile apps in the enterprise and find out how to eliminate them. Learn not only what an enterprise can do for data at rest, data in motion, methods of deployment, and more.
Posted: 10 Aug 2016 | Published: 10 Aug 2016

IBM

Use Secure Cloud and Scalability to Revolutionize B2B Payments Market
sponsored by Armor
WHITE PAPER: Learn how to speed up the collection of not only payments, but also account data, and apply it to unique business rules and processes in an automated fashion. Uncover how to not only secure back-end payment systems, but also protect information the moment it enters the payment stream.
Posted: 12 Aug 2016 | Published: 12 Aug 2016

Armor

Industry Assessment: Key Findings on Effective Threat Protection
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This report shows the results of an engineering analysis for threat detection, techniques, and management strategies. Discover how one threat protection platform was tested using five key criteria.
Posted: 12 Aug 2016 | Published: 17 Mar 2016

Check Point Software Technologies Ltd.

Testing the Cloud: Ensuring Enterprise Data is Secure
sponsored by TrendMicro
EGUIDE: In this e-guide, discover how to minimize threats through public cloud security testing. Plus, learn how penetration testing requirements differ for AWS, Google and Azure.
Posted: 17 Aug 2016 | Published: 11 Aug 2016

TrendMicro
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement