IT Management  >   Systems Operations  >   Security  >  

Managing Security

RSS Feed    Add to Google    Add to My Yahoo!
Managing SecurityReports
 
6 Ways Hackers Try to Break Secure Sockets Layer-Encrypted Data
sponsored by Blue Coat Systems
EGUIDE: How do hackers break through secure sockets layer-encrypted data exactly? This expert e-guide has the answer, exploring six common methods these cyber-criminals use.
Posted: 14 Oct 2014 | Published: 14 Oct 2014

Blue Coat Systems

The Hidden Costs of Self-Signed SSL Certificates
sponsored by Symantec Corporation
WHITE PAPER: Security is not usually one of the first places companies look to trim expenses, but some IT professionals believe that they can easily lower costs by eliminating third-party Secure Sockets Layer (SSL) Certificate Authorities (CAs) from the budget equation. However, this kind of reasoning can backfire – badly.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

Symantec Corporation

The Cyber Resilience Blueprint: A New Perspective on Security
sponsored by Symantec Corporation
WHITE PAPER: This exclusive whitepaper offers up best practices for creating a cyber-resilient enterprise.
Posted: 14 Oct 2014 | Published: 12 Aug 2014

Symantec Corporation

How Alert Logic Enabled bfw Advertising to Better Secure Clients' Websites
sponsored by Alert Logic
WHITE PAPER: This white paper describes how bfw Advertising, an agency that builds and manages websites and applications for B2B clients, worked with Alert Logic to implement a Web Application Firewall (WAF) to filter out suspicious web traffic.
Posted: 22 Oct 2014 | Published: 22 Oct 2014

Alert Logic

Delivering a Secure Foundation For the Cloud with Red Hat Enterprise Linux
sponsored by Red Hat
WHITE PAPER: This technology overview details an operating system that can help you get past some common cloud concerns.
Posted: 08 Oct 2014 | Published: 10 Jul 2014

Red Hat

Improve Intrusion Detection with Effective Threat Management
sponsored by Alert Logic
CASE STUDY: This exclusive case study explores the threat management solution one organization chose to improve their intrusion detection.
Posted: 20 Oct 2014 | Published: 20 Oct 2014

Alert Logic

VMware Heartbleed: 50% of vSphere 5.5 Servers Remain Unprotected
sponsored by CloudPhysics
WHITE PAPER: This exclusive whitepaper looks at the problems Heartbleed is causing VMware users.
Posted: 06 Oct 2014 | Published: 21 Jul 2014

CloudPhysics

How SSL and TLS Secure Network Transactions
sponsored by Blue Coat Systems
EGUIDE: This expert e-guide explores how SSL and TLS can be used to defend any type of network traffic.
Posted: 15 Oct 2014 | Published: 15 Oct 2014

Blue Coat Systems

Secure Identity and Smart Employee ID Solutions
sponsored by HID
VIDEO: This short video introduces HID Global's innovative approach to access management, in which one single ID credential provides fast, convenient access to doors, data, and cloud applications.
Posted: 17 Oct 2014 | Premiered: 17 Oct 2014

HID

Big Data, Big Mess: Sound Cyber Risk Intelligence through “Complete Context”
sponsored by SurfWatch Labs
WHITE PAPER: The following white paper examines the common problem that faces many businesses when it comes to gleaning value from big data and offers insight into how to attain the "complete context" from you big data and how to leverage it for superior business value and benefits.
Posted: 07 Oct 2014 | Published: 07 Oct 2014

SurfWatch Labs
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement