IT Management  >   Systems Operations  >   Security  >  

Security Administration

RSS Feed    Add to Google    Add to My Yahoo!
Security AdministrationReports
 
Gartner Predicts 2014: Identity and Access Management
sponsored by IBM
WHITE PAPER: Find out what Gartner's security analysts predict for the identity and access management space for 2014 and beyond.
Posted: 08 Oct 2014 | Published: 26 Nov 2013

IBM

Weighing Risk Against the Total Cost of a Data Breach: Can You Afford a Web Application Layer Attack?
sponsored by Akamai Technologies
WHITE PAPER: This white paper presents a proven, industry-standard approach to determining a company's risk of web application cyber-attacks. The provided equation can help you justify the cost of proactively deploying cybersecurity products and services to protect against web application attacks, including those that could lead to data breaches.
Posted: 08 Oct 2014 | Published: 08 Oct 2014

Akamai Technologies

Security in the Hybrid Cloud, Now and in 2016
sponsored by F5 Networks
RESOURCE: The infographic illustrates current security practices in the hybrid cloud and investigates where these trends are likely to head by 2016.
Posted: 21 Oct 2014 | Published: 21 Oct 2014

F5 Networks

The Hidden Costs of Self-Signed SSL Certificates
sponsored by Symantec Corporation
WHITE PAPER: Security is not usually one of the first places companies look to trim expenses, but some IT professionals believe that they can easily lower costs by eliminating third-party Secure Sockets Layer (SSL) Certificate Authorities (CAs) from the budget equation. However, this kind of reasoning can backfire – badly.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

Symantec Corporation

How Resellers can become the Trusted Advisors
sponsored by Webroot
WHITE PAPER: While the specific issues Value Added Resellers face vary widely, there is one universal challenge that every reseller has to undertake—positioning itself as a trusted advisor to its customers. So in short, how do you do it? Read the following white paper to find out now.
Posted: 09 Oct 2014 | Published: 09 Oct 2014

Webroot

IT and Enterprise Mobility: IT Is Fully Charged and Ready to Roam
sponsored by CA Technologies.
WHITE PAPER: Do you know how your mobility strategy stacks up against other organizations? This report reveals findings from a Vanson Bourne survey on IT and enterprise mobility.
Posted: 09 Oct 2014 | Published: 09 Oct 2014

CA Technologies.

Next-Generation Firewall Product Analysis
sponsored by Fortinet, Inc.
WHITE PAPER: This exclusive whitepaper offers a detailed performance report on one next-generation firewall solution.
Posted: 16 Oct 2014 | Published: 16 Oct 2014

Fortinet, Inc.

How to Detect a Ransomeware Infection with AlienVault USM
sponsored by AlienVault
WEBCAST: This exclusive webcast will show you how to detect and prevent ransomware from holding your network hostage.
Posted: 08 Oct 2014 | Premiered: Oct 8, 2014

AlienVault

Sharing the Blame: How Companies are Collaborating on Data Security Breaches
sponsored by Akamai Technologies
WHITE PAPER: The following report explores the ways in which organizations are collaborating to deal with the disclosure of data security breaches, who they are partnering with, and the technology they are leveraging.
Posted: 07 Oct 2014 | Published: 07 Oct 2014

Akamai Technologies

How to Define SIEM Strategy, Management and Success in the Enterprise
sponsored by TechTarget
RESOURCE: With the recent, highly-publicized data breaches, ensuring you can efficiently detect and respond to security issues should be a top-priority. This expert guide, available exclusively to members who have completed our SIEM survey, provides the insight you need to develop or revamp your SIEM strategy to set the stage for success.
Posted: 24 Oct 2014 | Published: 09 Sep 2014

TechTarget
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement