IT Management  >   Systems Operations  >   Security  >  

Security Administration

RSS Feed    Add to Google    Add to My Yahoo!
Security AdministrationReports
 
Improve Performance and Increase Value With A PC Refresh
sponsored by Dell, Inc. and Windows 8 Pro
WHITE PAPER: This white paper reveals three reasons to upgrade to new client systems in order to improve performance.
Posted: 08 Sep 2014 | Published: 29 Aug 2014

Dell, Inc. and Windows 8 Pro

Next Generation Firewalls: Here’s What You Need To Know
sponsored by HP and Intel
WHITE PAPER: This expert eGuide breaks down next-generation firewalls, their new features, and the new IT rules that come along with them.
Posted: 19 Sep 2014 | Published: 19 Sep 2014

HP and Intel

The Balancing Act of Threat Intelligence and Risk
sponsored by CDW Corporation
WHITE PAPER: In this expert resource, get an inside at how risk management and threat intelligence affect global risk assessment, and how security officers can benefit from them.
Posted: 18 Sep 2014 | Published: 18 Sep 2014

CDW Corporation

Meet N-able Security Manager
sponsored by N-able Technologies
VIDEO: Access this brief video to learn about an industry-awarded and industry-leading anti-virus solution that meets the need of your business while still allowing you to remain profitable.
Posted: 23 Sep 2014 | Premiered: 25 Feb 2014

N-able Technologies

Truly Mobile File and Print Solution Provides Enterprise-Wide Coverage
sponsored by Novell, Inc.
WHITE PAPER: In this informative white paper, discover a new enterprise-class mobile file and print solution that provides file syncing, sharing, and printing to users wherever they are – all without compromising compliance or security standards.
Posted: 15 Sep 2014 | Published: 31 Dec 2012

Novell, Inc.

Stop Attacks Hiding Under the Cover of SSL Encryption
sponsored by Blue Coat Systems
WHITE PAPER: This concise info graphic presents a new encrypted traffic management solution that provides organizations with unprecedented visibility, control, and policy creation options.
Posted: 16 Sep 2014 | Published: 09 Dec 2013

Blue Coat Systems

Effective Access Control Strategies
sponsored by HID
EGUIDE: In this expert e-guide, get the answers you need for securing enterprise mobile access. Read on for several considerations surrounding two-factor mobile authentication, as well as effective access control strategies to protect a user's identity.
Posted: 11 Sep 2014 | Published: 11 Sep 2014

HID

In the Age of BYOD, How Do You Secure the Workforce?
sponsored by Imation Corp.
WHITE PAPER: In this white paper, explore the impact of the BYOD trend by implementing this strategy within your own business.
Posted: 12 Sep 2014 | Published: 31 Dec 2013

Imation Corp.

Does Your SIEM Integrate Threat Data?
sponsored by CDW Corporation
WHITE PAPER: This expert eGuide explores how new technologies are integrating threat intelligence into SIEM solutions and enabling organizations to better prioritize security controls.
Posted: 18 Sep 2014 | Published: 18 Sep 2014

CDW Corporation

8 Simple Steps to Bring Shadow IT into the Light
sponsored by Rackspace
WHITE PAPER: This in-depth white paper outlines the 8 essential steps for IT professionals to drag Shadow IT into the light and regain control of their organization.
Posted: 02 Sep 2014 | Published: 02 Sep 2014

Rackspace
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement