IT Management  >   Systems Operations  >   Security  >  

Managing Security

RSS Feed    Add to Google    Add to My Yahoo!
Managing SecurityReports
 
Improve Intrusion Detection with Effective Threat Management
sponsored by Alert Logic
CASE STUDY: This exclusive case study explores the threat management solution one organization chose to improve their intrusion detection.
Posted: 20 Oct 2014 | Published: 20 Oct 2014

Alert Logic

How Alert Logic Enabled bfw Advertising to Better Secure Clients' Websites
sponsored by Alert Logic
WHITE PAPER: This white paper describes how bfw Advertising, an agency that builds and manages websites and applications for B2B clients, worked with Alert Logic to implement a Web Application Firewall (WAF) to filter out suspicious web traffic.
Posted: 22 Oct 2014 | Published: 22 Oct 2014

Alert Logic

How Threat Intelligence Can Give Enterprise Security the Upper Hand
sponsored by SurfWatch Labs
EGUIDE: This expert e-guide explores the value of security intelligence in giving you the upper hand on outside threats.
Posted: 15 Oct 2014 | Published: 15 Oct 2014

SurfWatch Labs

Information-Driven Security and RSA Security Analytics and RSA ECAT
sponsored by RSA, The Security Division of EMC
WHITE PAPER: Learn how RSA Security Analytics 10.4 and RSA ECAT 4.0 integrate into an end-to-end enterprise security analytics architecture to help anchor information-driven security initiatives.
Posted: 23 Oct 2014 | Published: 24 Sep 2014

RSA, The Security Division of EMC

Go Beyond SIEM with RSA Security Analytics
sponsored by RSA, The Security Division of EMC
WHITE PAPER: Today's security information and event management (SIEM) solutions aren't able to spot attacks and are far too slow to provide useful information. Learn how RSA Security Analytics can help.
Posted: 22 Oct 2014 | Published: 22 Oct 2014

RSA, The Security Division of EMC

Rosetta Stone Case Study: Improve Security and Compliance with Threat Management
sponsored by Alert Logic
CASE STUDY: This exclusive case study explores a threat management that can help you improve security and compliance.
Posted: 17 Oct 2014 | Published: 17 Oct 2014

Alert Logic

IBM InfoSphere Guardium for federal information systems
sponsored by IBM
DATA SHEET: This data sheet explains how continuous monitoring can secure sensitive data and simplify SCAP compliance validation.
Posted: 03 Oct 2014 | Published: 30 Apr 2013

IBM

IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
sponsored by IBM
WHITE PAPER: Gain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
Posted: 09 Oct 2014 | Published: 29 Nov 2013

IBM

Delivering Threat Intelligence to Security Technology Providers and Large Organizations
sponsored by Webroot
WHITE PAPER: One of the best ways to address poor incident detection and incident response is with greater use of information-driven security based upon internal security analytics and external threat intelligence. So what technology and strategies do you need to enable this insight? Read this white paper to find out now.
Posted: 09 Oct 2014 | Published: 09 Oct 2014

Webroot

Secure Identity and Smart Employee ID Solutions
sponsored by HID
VIDEO: This short video introduces HID Global's innovative approach to access management, in which one single ID credential provides fast, convenient access to doors, data, and cloud applications.
Posted: 17 Oct 2014 | Premiered: 17 Oct 2014

HID
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement