IT Management  >   Systems Operations  >   Security  >  

Perimeter Security

RSS Feed    Add to Google    Add to My Yahoo!
Perimeter Security Reports
Best Practices For Managing Apple in the Enterprise
sponsored by JAMF Software
EGUIDE: In this expert e-guide, review the three Apple and iOS management strategies.
Posted: 24 Nov 2015 | Published: 17 Nov 2015

JAMF Software

Cybersecurity Strategy Needs to be More Dynamic
sponsored by Unisys
EGUIDE: This expert e-guide explores app vulnerabilities and security strategy shortcomings and how you can fill in the gaps and adjust your approach to adapt to the changing threat landscape. View now to learn why a walled network will enable more data breaches to succeed and how to take a more holistic view of cybersecurity.
Posted: 20 Nov 2015 | Published: 18 Nov 2015


Stealth Compliance Strategies
sponsored by Unisys
WHITE PAPER: Access this guide to find software-defined security strategies that help government and commercial enterprises prevent highly sensitive data, systems, and intellectual property from being compromised.
Posted: 20 Nov 2015 | Published: 30 Jun 2015


Behind the Mask: The Changing Face of Hacking
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This new report will help you learn more about hackers and how they work. Read it to understand what attack methods hackers use, why simple approaches like phishing still work, and more.
Posted: 12 Nov 2015 | Published: 30 Jun 2015

Hewlett Packard Enterprise

A Report on the Critical Capabilities Required for High-Security Mobility Management
sponsored by Good Technology
ANALYST REPORT: In this exclusive analyst report, you will learn how to achieve increased protection in mobile markets using a hybrid mix of enterprise mobility management (EMM), platform and security vendors. Read on to ensure your EMM vendor will support business processes without disruptions.
Posted: 23 Nov 2015 | Published: 29 Jul 2015

Good Technology

Building Next Generation End-to-End IP Communications Architecture
sponsored by Oracle Corporation
WHITE PAPER: This white paper explains how to build a next-gen IP communications architecture in your organization, delivering enterprise-grade connectivity, security, and control with a software-driven core. Access this paper to learn how to centralize your UC services and policies.
Posted: 02 Nov 2015 | Published: 02 Nov 2015

Oracle Corporation

Security in a Dangerous Time: Network Security's Top Fears in 2015
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper shares the top 5 security priorities that concerned network security professionals over the last year.
Posted: 17 Nov 2015 | Published: 08 Apr 2015

Fortinet, Inc.

Best Practices to Enable Clinician Mobility for Patient-Centric Healthcare
sponsored by Citrix
WHITE PAPER: In this white paper, review mHealth best practices to enable secure remote access to PHI and other sensitive data.
Posted: 12 Nov 2015 | Published: 14 Oct 2014


The Total Economic Impact of Comprehensive Security
sponsored by Alert Logic
WHITE PAPER: This white paper analyzes the TEI and ROI for one suite of security solutions and discusses how you can get the most out of your security spending.
Posted: 28 Oct 2015 | Published: 31 Dec 2014

Alert Logic

Transform Webcasting Services with Unified Communications Architecture
sponsored by VBrick
WEBCAST: This brief video illustrates how video hosting services can save you money, produce better quality, and enable you to host your own website videos. Learn how to manage all video content from a consumer-grade portal.
Posted: 02 Nov 2015 | Premiered: Nov 2, 2015

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement