IT Management  >   Systems Operations  >   Security  >  

Security Administration

RSS Feed    Add to Google    Add to My Yahoo!
Security Administration Reports
A Report on the Critical Capabilities Required for High-Security Mobility Management
sponsored by Good Technology
ANALYST REPORT: In this exclusive analyst report, you will learn how to achieve increased protection in mobile markets using a hybrid mix of enterprise mobility management (EMM), platform and security vendors. Read on to ensure your EMM vendor will support business processes without disruptions.
Posted: 23 Nov 2015 | Published: 29 Jul 2015

Good Technology

Practical Threat Management and Incident Response for the Small-to-Medium-Sized Enterprise
sponsored by AlienVault
WHITE PAPER: In this white paper, examine several security controls and how they can change the outcome of an attack. Continue reading for industry advice for evaluating today's security control options.
Posted: 17 Nov 2015 | Published: 18 Jun 2014


Security Intelligence for the Modern Data Center
sponsored by AccelOps Inc.
WHITE PAPER: Organizations need an intelligent approach to understand data and proactively detect security threats and anomalies. In this white paper, learn how to consolidate security, performance, and compliance monitoring into a single pane of glass to improve protection across environments
Posted: 17 Nov 2015 | Published: 03 Nov 2015

AccelOps Inc.

State of Security Operations: The 2015 Report on Cyber Defense Maturity
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This report brings you the latest information on the capabilities of today's security operations centers and how they need to improve.
Posted: 23 Nov 2015 | Published: 23 Nov 2015

Hewlett Packard Enterprise

Multi-Layered Defense for an Evolving Threat Landscape
sponsored by Check Point Software Technologies Ltd.
WEBCAST: Access this webcast to learn how you can protect against both known and unknown malware and to make today's difficult cybersecurity landscape just a little bit easier.
Posted: 16 Nov 2015 | Premiered: Oct 13, 2015

Check Point Software Technologies Ltd.

Managed Security Services Portal Demo
sponsored by IBM
WEBCAST: This video provides a demonstration of a managed security services portal that acts as a command center for all of your security services. Access now to see the key features and benefits can provide to help you secure your information assets
Posted: 19 Nov 2015 | Premiered: Apr 12, 2013


Identity and Access Management Users Maximize Their ROI
sponsored by ForgeRock
WHITE PAPER: Access this infographic and learn how to maximize ROI on your identity access management, consolidate the identity data of customers to one platform, and more.
Posted: 17 Nov 2015 | Published: 17 Nov 2015


Understanding the Dynamics of Virtualization Security
sponsored by BitDefender
EGUIDE: This expert guide analyzes the complexities of virtualization security and explains how you can successfully secure your virtual environments.
Posted: 24 Nov 2015 | Published: 24 Nov 2015


Meeting the Challenges of HIPAA Compliance, Phishing Attacks, and Mobile Security
sponsored by Proofpoint, Inc.
WHITE PAPER: This white paper examines three top healthcare security challenges—stricter regulations, inbound threats, and mobile IT. Read on to protect PHI and other confidential data from inbound security threats while embracing mobile computing technologies and security as a service (SaaS).
Posted: 05 Nov 2015 | Published: 31 Dec 2013

Proofpoint, Inc.

Surfacing Critical Cyber Threats Through Security Intelligence
sponsored by LogRhythm, Inc.
WHITE PAPER: Access this white paper to discover why security intelligence is so important in today's threat environment and to learn how to implement it in your organization.
Posted: 05 Nov 2015 | Published: 05 Nov 2015

LogRhythm, Inc.
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement