Standards  >  

P3P

RSS Feed    Add to Google    Add to My Yahoo!
P3P Reports
 
Point of Sale (POS) Systems and Security
sponsored by Bit9 + Carbon Black
WHITE PAPER: This white paper explains why organizations need more than the PCI DSS compliance stamp in order to truly secure their POS systems; describes how to secure your POS systems against common attacks; and discusses the Council on CyberSecurity's top 20 suggestions for protecting payment card information.
Posted: 16 Jan 2015 | Published: 31 Oct 2014

Bit9 + Carbon Black

Data Protection Masterclass: New EU Data Protection Regulation
sponsored by ComputerWeekly.com
PRESENTATION: Law firm, Morrison & Foerster, examines the impact of new EU Data Protection legislation on buinsesses.
Posted: 28 Sep 2012 | Published: 28 Sep 2012

ComputerWeekly.com

Strategies to Ensure Software Security
sponsored by Veracode, Inc.
WEBCAST: In this webcast, you will learn the strategies to ensuring software security and reliability and how to choose a platform that won't fail down the line. Watch now to gain insider tips and guidance.
Posted: 27 Feb 2015 | Premiered: Nov 7, 2014

Veracode, Inc.

Defense Contractor Resolves Breach, Saves Thousands in IR Costs with Carbon Black
sponsored by Bit9 + Carbon Black
CASE STUDY: This exclusive case study looks at the security solution one system administrator for a major defense contractor turned to with their job on the line.
Posted: 14 Jan 2015 | Published: 15 Jan 2014

Bit9 + Carbon Black

Tolly Test Report: Web Application and  Security Access Manager Appliance
sponsored by IBM
WHITE PAPER: Access this white paper that details a test report of a web security and access manger appliance. Read on to learn how this appliance scored, and find out about the benefits it can provide your company.
Posted: 02 Mar 2015 | Published: 30 Nov 2014

IBM

Webroot  Endpoint Security eBook
sponsored by Webroot
EBOOK: This resource outlines how a new approach to security may be what your business needs. If constant downloads, installations and updates are slowing down the efficiency of your company; it may be time to make some changes. Read this eBook to find out more about how Webroot can improve your endpoint security.
Posted: 25 Jul 2012 | Published: 25 Jul 2012

Webroot

Security-In-Depth Using Integrated Risk-Conscious Controls
sponsored by Tripwire, Inc.
WHITE PAPER: This white paper explores how your organization can change the way it protects its critical data, combining preventive, detective and corrective controls to stop breaches from happening, detect threats as they arise, and correct settings that introduce security risk or non-compliance. Read now to learn more.
Posted: 28 Sep 2012 | Published: 30 Dec 2011

Tripwire, Inc.

Enterprise Security Checklist
sponsored by Code42
WEBCAST: This 6-item checklist provides key recommendations to help boost security against today's cybercrime.
Posted: 08 Oct 2013 | Premiered: Nov 14, 2013, 13:00 EST (18:00 GMT)

Code42

Stealthy Threats: Driving a New Approach to Security Video
sponsored by Intel
WEBCAST: View this Webcast and uncover the steps to a new approach to security. Today, the threat landscape is more dangerous than ever before, so make sure you have the right security to mitigate the risks.
Posted: 01 Oct 2012 | Premiered: Oct 1, 2012

Intel

Reducing the Cost of Achieving PCI Compliance with Lumension® Compliance and IT Risk Management
sponsored by Lumension
WHITE PAPER: In this white paper, gain critical information about a streamlined compliance and risk management solution that helps identify, assess, remediate, and manage IT environments to demonstrate PCI DSS requirements.
Posted: 16 Oct 2013 | Published: 31 Dec 2009

Lumension
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
P3P White Papers | P3P Multimedia | P3P IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement