IT Management  >   Systems Operations  >   Security  >  

Security Administration

RSS Feed    Add to Google    Add to My Yahoo!
Security Administration Reports
 
St. Joseph Health Mobilizes Patient Care with MobileIron Solutions
sponsored by MobileIron
WHITE PAPER: This whitepaper provides valuable information on mobile device management and security.
Posted: 11 Mar 2015 | Published: 11 Mar 2015

MobileIron

The 5 Challenges of Data Security
sponsored by IBM
WHITE PAPER: In this white paper, learn the five challenges regarding data security today. Additionally, read on to uncover the five steps to strengthening your data security strategy.
Posted: 09 Mar 2015 | Published: 10 Sep 2014

IBM

10 Ways to Tell its Time to Change Your Antivirus Software
sponsored by ESET
WEBCAST: This webcast addresses the question of whether you need to change your anti-virus software, and if so what to change it to.
Posted: 10 Mar 2015 | Premiered: Mar 10, 2015

ESET

Data Security and Privacy: Building Confidence in Big Data
sponsored by IBM
WHITE PAPER: In order to protect big data, you need to first understand big data. This white paper will help you do so.
Posted: 16 Mar 2015 | Published: 31 Oct 2012

IBM

4 Steps to Address Vulnerabilities Before a Breach
sponsored by IBM
WHITE PAPER: This white paper addresses how vulnerabilities can go undetected and gives you advice for mitigating these vulnerabilities.
Posted: 16 Mar 2015 | Published: 31 Dec 2014

IBM

Holistic Fraud Prevention: Transforming the Customer's Experience
sponsored by IBM
WHITE PAPER: Use this white paper to implement creative, efficient and comprehensive fraud prevention.
Posted: 04 Mar 2015 | Published: 04 Mar 2015

IBM

Machine Learning Anomaly Detection for IT Ops
sponsored by Prelert
VIDEO: Watch this brief video to discover how you can monitor all your data and discover why a problem occurs before it can harm your network.
Posted: 25 Mar 2015 | Premiered: 25 Mar 2015

Prelert

7 Ways to Find Rogue Users
sponsored by Prelert
WHITE PAPER: This article gives you seven foolproof steps towards setting up insider security with less disruption and better accuracy.
Posted: 23 Mar 2015 | Published: 03 Apr 2014

Prelert

The Landscape of Threat Intelligence
sponsored by SurfWatch Labs
WEBCAST: The webcast will help you determine if threat intelligence is the best solution for you by giving you an in-depth look today's intelligence landscape.
Posted: 27 Mar 2015 | Premiered: Feb 20, 2015

SurfWatch Labs

Case Study: Global 500 Company Integrates Security and Application Development
sponsored by Veracode, Inc.
WHITE PAPER: A global 500 company faced the challenge of balancing fast application development with security. This case study describes how they met that challenge.
Posted: 20 Mar 2015 | Published: 01 Jan 2015

Veracode, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement