IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

PDD 63

RSS Feed    Add to Google    Add to My Yahoo!
PDD 63Reports
 
Moving Beyond the Firewall for Complete Data Protection
sponsored by Fortinet, Inc.
WHITE PAPER: Check out this white paper to discover several new security threats and what solutions are available to mitigate those risks going forward.
Posted: 09 Sep 2014 | Published: 09 Sep 2014

Fortinet, Inc.

451 Research Report: AlienVault USM - A Security Operations Center for the SMB
sponsored by AlienVault
WHITE PAPER: This in-depth 451 Research analysis examines AlienVault, a security vendor tailored for small and midsize businesses.
Posted: 05 Sep 2014 | Published: 05 Sep 2014

AlienVault

The Hidden Risks Behind Mobile Application Security
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper provides the findings on mobile application security, based on more than 2,000 mobile applications from over 600 companies.
Posted: 15 Sep 2014 | Published: 01 Feb 2014

Hewlett-Packard Company

SAP uses HP Fortify to help produce Secure Applications
sponsored by Hewlett-Packard Company
CASE STUDY: In this case study, examine how SAP embarks on a journey to perform static analysis on application code in order to identify and mitigate vulnerabilities early on.
Posted: 10 Sep 2014 | Published: 31 Jul 2013

Hewlett-Packard Company

WAF or IPS - Why you need more than a Firewall and IPS to protect your applications
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper explains the importance of using more than just a firewall and IPS to protect your applications from malicious attacks.
Posted: 11 Sep 2014 | Published: 11 Sep 2014

Fortinet, Inc.

A New Set of Network Security Challenges
sponsored by Icomm Technologies
WHITE PAPER: Today, workers demand access from devices beyond the firewall.  Smart phones, tablets, and laptops of all types.  However, the biggest challenge is finding a balance between productive and security.
Posted: 17 Sep 2014 | Published: 17 Sep 2014

Icomm Technologies

Mitigating Security Risks at the Network's Edge: Best Practices for Distributed Enterprises
sponsored by CradlePoint
WHITE PAPER: Access this white paper to discover the keys to preventing data breaches in distributed enterprises.
Posted: 04 Sep 2014 | Published: 04 Sep 2014

CradlePoint

Managed Security Service Providers Vs. On-Premise SIEM
sponsored by Solutionary
WHITE PAPER: This informative white paper compares the strengths and weakness of on SIEM products with the MSSPs, including the financial, operational, and organizations considerations of each.
Posted: 05 Sep 2014 | Published: 13 Mar 2014

Solutionary

Hands-On Teams: Computrace Protects the Laptops of the Intelligrated Mobile Workforce
sponsored by Absolute Software
CASE STUDY: This case study reveals how Intelligrated found a solution that would allow them to track and secure laptops in the field, in order to avoid any potential laptop theft.
Posted: 17 Sep 2014 | Published: 31 Dec 2013

Absolute Software

Cybercrime Investigation Use Case: Visualizing Data with Investigative Software
sponsored by DomainTools
WHITE PAPER: In this resource, learn how to accelerate your cybercrime investigations with a data visualization tool. Explore a step-by-step use case and discover how simple it is to choose between several visualization options to quickly spot commonalities in large data sets.
Posted: 03 Sep 2014 | Published: 03 Sep 2014

DomainTools
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement