IT Management  >   Systems Operations  >   Security  >  

Secure Data

RSS Feed    Add to Google    Add to My Yahoo!
Secure DataReports
 
CW Europe – October 2014 Edition
sponsored by ComputerWeekly.com
EZINE: BYOD policies: What's allowed and what's banned? As IT departments still try to come to terms with the notion of BYOD, CW Europe takes a look at what policies are being implemented to keep security under control.
Posted: 03 Oct 2014 | Published: 03 Oct 2014

ComputerWeekly.com

Cutting the Cost of Application Security
sponsored by Imperva
WHITE PAPER: This white paper describes the financial implications of web attacks, DDoS attacks, and other web-based threats, and also introduces one company's web application firewall as a potential solution.
Posted: 30 Oct 2014 | Published: 30 Oct 2014

Imperva

How to Deliver Attribute-Driven Authorization with Your Current Identity Infrastructure
sponsored by Radiant Logic, Inc.
WHITE PAPER: This white paper introduces a federated identity service that delivers smarter, finer-grained authorization without uprooting your current identity infrastructure, enabling you to reap the benefits of attribute-driven access control by federating identities and creating dynamic groups.
Posted: 16 Oct 2014 | Published: 16 Oct 2014

Radiant Logic, Inc.

Cloud Deployment with Enterprise Endpoint Backup and File Sync/Share
sponsored by Code42
WHITE PAPER: Read this white paper to find out about a solution that allows organizations to select their preferred cloud deployment strategy while providing enterprise endpoint backup and file sync and share to meet industry standards for data security.
Posted: 13 Oct 2014 | Published: 13 Oct 2014

Code42

Anittel Simplifies Managed Antivirus Service and Improves Customer Experience with Webroot
sponsored by Webroot
CASE STUDY: Anittel Group Ltd., a key managed service provider (MSP) to thousands of organizations, was experiencing an alarming amount of new and evolving malware across both personal and company devices. Learn about the endpoint protection tool that Anittel chose that was un-intrusive for its customers and highly responsive to the evolving malware landscape.
Posted: 08 Oct 2014 | Published: 30 Nov 2013

Webroot

Continuous Monitoring for Data Access and Sensitive Information
sponsored by IBM
WHITE PAPER: This white paper highlights a simple, robust solution that assures the security and integrity of data in several environments, such as big data platforms.
Posted: 07 Oct 2014 | Published: 31 Oct 2013

IBM

Weighing Risk Against the Total Cost of a Data Breach
sponsored by Akamai Technologies
WHITE PAPER: This white paper provides an approach to determine the risk of web application cyber-attacks that could potentially affect your company.
Posted: 11 Nov 2014 | Published: 01 Aug 2014

Akamai Technologies

IBM Infosphere Guardium Vulnerability Assessment
sponsored by IBM
DATA SHEET: This resource highlights a vulnerability assessment solution that scans database infrastructures on a scheduled basis to detect vulnerabilities.
Posted: 06 Oct 2014 | Published: 30 Apr 2014

IBM

Support Compliance and Continuously Monitor your Expanding Business
sponsored by LogRhythm, Inc.
CASE STUDY: Access this case study to get an insight into a financial security environment and finding a solution to detect potentially malicious activity.
Posted: 06 Nov 2014 | Published: 30 Sep 2014

LogRhythm, Inc.

Protection Storage Architecture: What, Why, and How?
sponsored by EMC Corporation
WHITE PAPER: This white paper explores how a Protection Storage Architecture enables backup teams to solve immediate tactical challenges, helps IT teams keep business applications running, and supports them as they evolve to support strategic services-oriented business models.
Posted: 19 Nov 2014 | Published: 28 Feb 2014

EMC Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement