IT Management  >   Systems Operations  >   Security  >  

Security Administration

RSS Feed    Add to Google    Add to My Yahoo!
Security Administration Reports
 
The Importance of Senior Executive Involvement in Breach Response
sponsored by Hewlett-Packard Limited
WHITE PAPER: This survey reveals how IT professionals view effective executive involvement in threat mitigation.
Posted: 24 Mar 2015 | Published: 31 Oct 2014

Hewlett-Packard Limited

Top 5 Web and Mobile App Security Challenges
sponsored by Veracode, Inc.
RESOURCE: Access this brief infographic to learn the top five challenges to securing web and mobile applications today. View now to explore an alternative strategy to reduce app-layer risk.
Posted: 26 Feb 2015 | Published: 27 Jan 2015

Veracode, Inc.

Data masking everywhere
sponsored by IBM
WHITE PAPER: Read this white paper now to learn how data masking can protect your sensitive information from hackers.
Posted: 16 Mar 2015 | Published: 31 May 2014

IBM

Deep Security AWS Success
sponsored by Trend Micro
CASE STUDY: This case study highlights how one organization integrated a security platform into their virtualized environment to ensure compliance for public cloud and AWS to provide secure gaming, social networking, and e-commerce services to its customers.
Posted: 27 Mar 2015 | Published: 31 Dec 2014

Trend Micro

Anomaly Detection in Unstructured Data
sponsored by Prelert
WHITE PAPER: This article introduces an anomaly detection program aimed to aid with the analysis of unstructured data.
Posted: 23 Mar 2015 | Published: 27 Feb 2015

Prelert

Protect Your Data with Advanced Encryption
sponsored by ESET
WHITE PAPER: This resource introduces one way you can create unbreakable security for your data.
Posted: 12 Mar 2015 | Published: 31 Dec 2014

ESET

Survey Reveals the Danger of DNS Attacks
sponsored by Efficientip
WHITE PAPER: This survey on DNS attacks reveals how powerful DNS attacks are and what securities are most effective against them.
Posted: 05 Mar 2015 | Published: 30 Jun 2014

Efficientip

Why Every IT Security Team Needs Anomaly Detection Software
sponsored by Prelert
WHITE PAPER: This white paper gives you the ins and outs of anomaly detection, including how it works and what its benefits are.
Posted: 25 Mar 2015 | Published: 31 Dec 2014

Prelert

Bridging the data security gap
sponsored by IBM
WHITE PAPER: This white paper describes the four main areas of data security and how to approach each one.
Posted: 16 Mar 2015 | Published: 31 May 2013

IBM

Detecting Security Anomalies with Machine Learning Analytics
sponsored by Prelert
WEBCAST: This webcast explores how machine learning can move around false positives and find the real threats.
Posted: 25 Mar 2015 | Premiered: Mar 25, 2015

Prelert
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement