IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Remote Access Policies

RSS Feed    Add to Google    Add to My Yahoo!
Remote Access Policies Reports
 
Building a Layered Defense Against Data Breaches
sponsored by Absolute Software
WEBCAST: This webcast explores how a tri-layered security strategy can help protect you from a continuous barrage of malware. View now to learn why encryption is not enough to protect data and why endpoint security can pick up where traditional perimeter defenses leave off.
Posted: 05 May 2015 | Premiered: Dec 15, 2014

Absolute Software

The insider threat – solved with DRM
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Bob Tarzey and Bernt Østergaard look at the challenges faced by organisations when it comes to the insider threat and the protection of sensitive information.
Posted: 06 Jan 2015 | Published: 06 Jan 2015

ComputerWeekly.com

Extend Compliance and Risk Management to What Really Matters For Your Business
sponsored by Absolute Software
ANALYST REPORT: Access this informative report to find out how the current focus of risk and compliance efforts is too narrow because many GRC programs largely ignore the risks that cause companies to fail. Discover how to impact performance by expanding the fundamentals of GRC to the aspects of the business that drive success with customer interactions.
Posted: 22 Jan 2015 | Published: 31 Dec 2014

Absolute Software

Multifactor Authentication Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: In this virtual security classroom, Michael Cobb, a renowned security author with over 20 years of experience in the IT industry, surveys the latest authentication methods and technologies coming onto the market.
Posted: 16 Dec 2014 | Premiered: 15 Dec 2014

SearchSecurity.com

Secure Federal Data and Support Your Mobile Workforce
sponsored by Absolute Software
WHITE PAPER: This brief white paper covers the layered approach taken by progressive IT security leaders to ensure that you are not a statistic. Read on and discover imperative measures being implemented to mitigate the 49% of Federal employees who use their personal devices for work-related tasks.
Posted: 06 May 2015 | Published: 06 May 2015

Absolute Software

It’s Not Just an IT Affair: Understanding the Risks of Cyber Breaches
sponsored by UnitedLex
WHITE PAPER: This white paper explains why today's cyber threats and compliance regulations require multi-disciplinary expertise and a strategic mindset that extends across the entire enterprise.
Posted: 09 Apr 2015 | Published: 31 Dec 2014

UnitedLex

Avoiding the Headlines: 5 Critical Security Practices to Implement Now
sponsored by CloudPassage
VIDEO: Inside this webinar, join Adrian Sanabria, Senior Security Analyst at 451 Research, and Amrit Williams, CTO of CloudPassage to learn five best practices to put in place in order to avoid a security breach within your organization.
Posted: 24 Apr 2015 | Premiered: 24 Apr 2015

CloudPassage

Hackers and Dating App Vulnerabilities - A Match Made in Heaven
sponsored by IBM
WHITE PAPER: This white paper outlines the 4 most dangerous data app vulnerabilities and offers steps to take for you and your users to mitigate risk.  Read on to learn more.
Posted: 21 Apr 2015 | Published: 11 Feb 2015

IBM

Cybersecurity Trends of 2015: A View from the Front Lines
sponsored by FireEye
WHITE PAPER: In today's dangerous threat landscape, the only way to stay secure is to know what you're up against. In this cybersecurity report, find essential information on today's latest security trends.
Posted: 04 May 2015 | Published: 31 Dec 2014

FireEye

Data Loss Prevention: RFP Technology Decisions
sponsored by SearchSecurity.com
EBOOK: This expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

SearchSecurity.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement