IT Management  >   Systems Operations  >   Security  >  

Security Administration

RSS Feed    Add to Google    Add to My Yahoo!
Security Administration Reports
 
AWS Security Checklist
sponsored by Amazon Web Services
WHITE PAPER: Utilize these security checklists to help secure your AWS resources. Follow recommendations from AWS for the AWS Identity and Access Management (IAM) service, Amazon EBS Encryption, Amazon S3 Resources and much more.
Posted: 10 Oct 2017 | Published: 10 Oct 2017

Amazon Web Services

A New Way to Look at AWS Security
sponsored by AWS-Cisco
WHITE PAPER: AWS environments that make use of AWS-native services and entity modeling can be protected from known and unknown security threats in a scalable and cost-effective manner. Access this white paper to learn how entity modeling provides a new approach to AWS that ensures security.
Posted: 06 Nov 2017 | Published: 29 Sep 2017

AWS-Cisco

Do More with Complete Mobile-Cloud Security
sponsored by MobileIron
WHITE PAPER: This shift toward modern mobile-cloud technologies is forcing organizations to rethink everything from datacenter architectures to endpoint security because traditional, desktop-based security models are no longer adequate. Download this white paper to uncover some of the critical security gaps today's mobile-cloud enterprises must address.
Posted: 02 Oct 2017 | Published: 02 Oct 2017

MobileIron

10 Reasons Smart Power-Over-Ethernet Switches are the Wise Choice for Upgrading IP Surveillance Networks
sponsored by D-Link
WHITE PAPER: In this white paper, uncover the top 10 reasons to upgrade to Smart (managed) PoE Switches for IP surveillance networks.
Posted: 20 Nov 2017 | Published: 20 Nov 2017

D-Link

Is Your IT Security Affecting Your Workforce Productivity?
sponsored by Dell and Microsoft
VIDEO: In this video, Principal Analyst at Forrester Research David K. Johnson demonstrates how to achieve the often-conflicting goals of promoting employee flexibility alongside delivering greater device security. Tune in to overcome the risks BYOD programs, device malware, and more pose to your device landscape.
Posted: 22 Sep 2017 | Premiered: 21 Sep 2017

Dell and Microsoft

4 Steps to Kick-Start Your Security Program
sponsored by LogMeIn Rescue
RESOURCE: Your customers trust you to protect their data, so it is crucial to retain that trust by making security a top priority. Learn how you can protect customers and provide a better overall experience.
Posted: 09 Nov 2017 | Published: 09 Nov 2017

LogMeIn Rescue

Amazon Web Services: Automatically Scale Cloud Security
sponsored by AWS - Fortinet
WHITE PAPER: This white paper explores how Fortinet helps deliver seamless integration with Amazon Elastic Compute Cloud and Amazon Virtual Private Cloud to minimize risk and mitigate security treats for workloads running on the cloud. Then, find out how your organization can deploy and automate cloud security with auto scaling.
Posted: 17 Nov 2017 | Published: 17 Nov 2017

AWS - Fortinet

Managed Security Service Provider Selection for Dummies
sponsored by Rackspace
EBOOK: In this book, you learn how to leverage a managed security services provider to enhance your organization's security posture in the cloud.
Posted: 12 Oct 2017 | Published: 12 Oct 2017

Rackspace

How to Close Security Gaps to Stop Ransomware and other Threats
sponsored by Fortinet, Inc.
EBOOK: In this e-book, gain a stronger understanding on how protecting your enterprise starts with ensuring coverage across different attack vectors through coordinated Advanced Threat Protection (ATP). Then, find out how IT network pros strive to overcome network security challenges to help increase performance, reliability, and scalability.
Posted: 25 Oct 2017 | Published: 25 Oct 2017

Fortinet, Inc.

Three Reasons a Secure Web Gateway is Vital for your Security Stance
sponsored by Symantec
WHITE PAPER: According to IDC, by 2020 there will be 105.4 million mobile workers. With this hike, mobile and web security cannot be compromised. This white paper describes what a secure web gateway (SWG) offers and 3 main reasons it is a vital component of your layered defense strategy.
Posted: 09 Oct 2017 | Published: 09 Oct 2017

Symantec
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement