IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Remote Access Policies

RSS Feed    Add to Google    Add to My Yahoo!
Remote Access Policies Reports
 
Simplify Saas and On-premises Integration
sponsored by Oracle Corporation
WEBCAST: Software as a Service (SaaS) is growing in popularity and is driving the need for new SaaS apps to be easily integrated with existing on-premises counterparts. This video introduces middleware that simplifies integration and enforces consistency through a common integration platform for SaaS and on-premise apps.
Posted: 13 May 2015 | Premiered: May 19, 2014, 01:17 EDT (05:17 GMT)

Oracle Corporation

Managed Cloud Environment Security FAQ
sponsored by Dimension Data
WHITE PAPER: Access this white paper to get answers to how security is maintained in multi-tenanted and dynamic environments.  Read on to explore how to evaluate the security of managed cloud environment providers.
Posted: 03 Mar 2015 | Published: 10 Sep 2014

Dimension Data

Make the Impossible Possible: Simplifying ISO Compliance
sponsored by BalaBit
WHITE PAPER: This white paper gives some helpful guidelines for compliance by laying out the steps necessary for complying with the latest revision of ISO.
Posted: 22 Apr 2015 | Published: 22 Apr 2015

BalaBit

Self-Assessment: What Steps Should You Take for Better Security?
sponsored by FireEye
WHITE PAPER: Take this brief self-assessment for an estimate on how prepared you are and suggestions on how to improve.
Posted: 01 Apr 2015 | Published: 31 Dec 2014

FireEye

Back to Basics: Securing Business Information on the Cloud
sponsored by Box
WHITE PAPER: View this white paper to learn how the cloud can enable us to go back to security basics to manage distributed computing.
Posted: 25 Feb 2015 | Published: 04 Feb 2015

Box

Hackers and Dating App Vulnerabilities - A Match Made in Heaven
sponsored by IBM
WHITE PAPER: This white paper outlines the 4 most dangerous data app vulnerabilities and offers steps to take for you and your users to mitigate risk.  Read on to learn more.
Posted: 21 Apr 2015 | Published: 11 Feb 2015

IBM

Gauntlet Case Study
sponsored by CloudPassage
WHITE PAPER: Access this informative resource to find out what happened when 367 people participated in a liver server exploitation exercise that ran for 23 days across a collection of Microsoft Windows and Linux-based servers with varying combinations of applications and application frameworks installed.
Posted: 04 Sep 2014 | Published: 04 Dec 2013

CloudPassage

Cloud Security - Why Traditional Measures Won't Cut It
sponsored by Microsoft
RESOURCE: In this white paper, you will uncover how to protect data from known and unknown threats to using a cloud-based security strategy. View now to learn more.
Posted: 06 May 2015 | Published: 11 Dec 2014

Microsoft

Cybersecurity Trends of 2015: A View from the Front Lines
sponsored by FireEye
WHITE PAPER: In today's dangerous threat landscape, the only way to stay secure is to know what you're up against. In this cybersecurity report, find essential information on today's latest security trends.
Posted: 04 May 2015 | Published: 31 Dec 2014

FireEye

The Wild World of Malware: Keeping Your Company Safe from Advanced Threats
sponsored by Icomm Technologies
WHITE PAPER: In this in-depth resource, gain essential knowledge on today's advanced malware threats, and discover how new next-generation firewalls (NGFW) can prevent them from gaining access to your valuable data.
Posted: 17 Sep 2014 | Published: 31 Jul 2012

Icomm Technologies
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement