IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Remote Access Policies

RSS Feed    Add to Google    Add to My Yahoo!
Remote Access PoliciesReports
 
Data Protection: From many angles and places
sponsored by TechTarget
RESOURCE: Data protection is not a one-size-fits-all mechanism; it comes in many forms and from many places. Understanding these different facets of data protection is crucial when choosing one that's right for your organization. Take this brief survey and access this expert e-guide to learn about the angles and places of data protection.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

TechTarget

Handling Security in the Cloud
sponsored by CloudPassage
EGUIDE: This expert e-guide from SearchSecurity.com offers advice on maintaining compliance and controlling issues with shadow IT when you move your critical business applications to the cloud.
Posted: 03 Apr 2014 | Published: 03 Apr 2014

CloudPassage

Enable Anytime, Anywhere Access Without Exposing Your Data
sponsored by ownCloud
WHITE PAPER: This exclusive whitepaper covers a solution that help you deal with security risks that come from users syncing sensitive data to their home devices.
Posted: 31 Jan 2014 | Published: 31 Jan 2014

ownCloud

Secure Network Access for Personal Mobile Devices
sponsored by Cisco
WHITE PAPER: This resource offers a solution to the challenges of mobility in the workplace, helping organizations realize the full benefits of BYOD without sacrificing strong security.
Posted: 31 Mar 2014 | Published: 30 Sep 2012

Cisco

The Safe On-Ramp to Big Data
sponsored by Informatica
WHITE PAPER: This white paper examines the risk and reward of big data and highlights how leading organizations are utilizing Informatica technology as a safe on-ramp to big data that reduces risk and cost while speeding insights and innovation.
Posted: 27 Mar 2014 | Published: 31 May 2013

Informatica

Secure File Transfer: Send it Fast, but Send it Safely
sponsored by SearchSecurity.com
EBOOK: FTP gets big files to colleagues and clients fast, but as the headlines remind us, the threat of electronic break-in is real. This guide to secure file transfer show how best to cure that sense of FTP insecurity.
Posted: 16 Apr 2014 | Published: 14 Apr 2014

SearchSecurity.com

Binary Option: Neustar SiteProtect Case Study
sponsored by Neustar┬«
CASE STUDY: This exclusive case study examines how an independent trading website was able to utilize a security service that protects against DDoS attacks 24/7, mitigating the attack when it occurs and escalating when needed.
Posted: 20 Mar 2014 | Published: 20 Mar 2014

Neustar®

Henan Mobile Achieves Information Security with Centralized, Automated Platform
sponsored by Hewlett-Packard Company
WHITE PAPER: This case study features one telecommunications company's experience implementing a centralized, automated network security management platform. Read through to see how the business is benefiting from improved information security and simplified management.
Posted: 24 Feb 2014 | Published: 31 Jan 2013

Hewlett-Packard Company

5 Steps to Network Situational Awareness
sponsored by Lumeta Corporation
WHITE PAPER: This exclusive paper examines a five step program to achieve Network Situational Awareness and gain a thorough understanding of your network infrastructure so you can more closely manage any changes and catch problems before they impact your business.
Posted: 07 Feb 2014 | Published: 07 Feb 2014

Lumeta Corporation

Business Driven Governance: Managing Policies for Data Retention
sponsored by IBM
WHITE PAPER: This resource explains how you can establish and manage an overall data retention strategy through information governance and database archiving policies.
Posted: 27 Feb 2014 | Published: 31 Aug 2013

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement