IT Management  >   Systems Operations  >   Security  >  

Perimeter Security

RSS Feed    Add to Google    Add to My Yahoo!
Perimeter Security Reports
 
Mobile is the New Playground for Thieves: How to Protect Against Mobile Malware
sponsored by IBM
WHITE PAPER: In this white paper, you'll uncover how to move towards a proactive mobile security strategy to detect, analyze, and remediate today's mobile threats.
Posted: 12 Aug 2015 | Published: 13 Jul 2015

IBM

The Problem with the Padlock
sponsored by SearchSecurity.com
EBOOK: TLS/SSL is no longer a Web security cornerstone. While the industry responds to its vulnerabilities, with TLS 1.3, learn what else you must do to keep your connections secure.
Posted: 16 Jul 2015 | Published: 16 Jul 2015

SearchSecurity.com

From GPO to MDM: A New Era of Enterprise Computing
sponsored by MobileIron
WHITE PAPER: This white paper looks to enterprise mobility management (EMM) as the primary means of securing and managing enterprise devices during the evolution of operating systems.
Posted: 05 Aug 2015 | Published: 05 Aug 2015

MobileIron

Strong Authentication: Securing Identities and Enabling Productivity
sponsored by SafeNet, Inc.
WHITE PAPER: Access this informative white paper to learn how strong authentication methods like USB tokens and smart cards are helping organizations to stay ahead of the security curve.
Posted: 20 Aug 2015 | Published: 20 Aug 2015

SafeNet, Inc.

Considering Layered Security? 14 Questions to Ask
sponsored by VSS Monitoring
WHITE PAPER: Today's networks and data centers are a critical asset to organizations of every size. This white paper serves as a guideline when considering layered network security solutions, ensuring that your enterprise stays ahead of ever-advancing security and network threats. Click here to see your security questions answered.
Posted: 05 Aug 2015 | Published: 05 Aug 2015

VSS Monitoring

The Capabilities of 10 SIEM Technologies
sponsored by LogRhythm, Inc.
WHITE PAPER: This report analyzes ten different SIEM technologies for risk management capabilities and performance.
Posted: 05 Aug 2015 | Published: 05 Aug 2015

LogRhythm, Inc.

Special Report: Detailed Reviews of 7 IPS Platforms
sponsored by IBM
WHITE PAPER: This report presents detailed reviews of seven IPS platforms to help you decide which one meets your specific needs.
Posted: 24 Jun 2015 | Published: 29 Dec 2014

IBM

Quick Guide to Network Anomaly Detection
sponsored by Prelert
WHITE PAPER: This brief white paper details the two types of anomaly scores and how they are manifested. Continue reading now to learn how to use each score as an indicator for proactive alerting.
Posted: 10 Aug 2015 | Published: 30 Jul 2015

Prelert

Why Always-on SSL is Critical for Company Websites Today
sponsored by GeoTrust, Inc.
WHITE PAPER: This paper discusses how always-on SSL offers enhanced security to protect against these attacks, while delivering several additional business benefits.
Posted: 16 Jul 2015 | Published: 01 Jul 2015

GeoTrust, Inc.

Strengths and Weaknesses of 13 SIEM Solutions
sponsored by AlienVault
WHITE PAPER: This Gartner report provides detailed reviews of the strengths and weaknesses of 13 different SIEM solutions.
Posted: 30 Jul 2015 | Published: 20 Jul 2015

AlienVault
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement