IT Management  >   Systems Operations  >   Security  >  

Security Administration

RSS Feed    Add to Google    Add to My Yahoo!
Security Administration Reports
 
Owner-controlled PKI: The Next Step in Securing IoT
sponsored by DigiCert
EGUIDE: Learn how owner-operated PKI is making strides in becoming the most secure option for IoT users.
Posted: 01 Sep 2017 | Published: 01 Sep 2017

DigiCert

SD-WAN Case Study: M&T Bank Coporation
sponsored by Hughes Network Systems
CASE STUDY: The case study explores how switching to an SD-WAN helped M&T Bank Corporation experience more reliability and security within their network.
Posted: 31 Aug 2017 | Published: 30 Apr 2017

Hughes Network Systems

Stop Password Sprawl with App Single Sign-on
sponsored by Centrify Corporation
WHITE PAPER: In this white paper, learn the key considerations you should ask before investing and deploying a single sign-on vendor to ensure a smooth transition that aligns with security best practices.
Posted: 12 Sep 2017 | Published: 12 Sep 2017

Centrify Corporation

Cost of Data Breach Study: United States
sponsored by IBM
RESEARCH CONTENT: The average cost for each lost or stolen record containing sensitive and confidential information increased from $217 to $221, according to the Ponemon Institute. Access this study for a look into the cost of data breach incidents in the United States.
Posted: 31 Aug 2017 | Published: 30 Jun 2016

IBM

Protecting Patient Data & Complying with HIPAA Security Regulations
sponsored by Trustwave
WHITE PAPER: Data protection is essential – particularly in the health industry. The Health Insurance Portability and Accountability Act (HIPAA) was enacted to protect Personal Health Information (PHI) of patients. Learn how to comply with HIPAA security regulations.
Posted: 30 Aug 2017 | Published: 30 Aug 2017

Trustwave

Cybersecurity 101: The Fundamentals of Today's Threat Landscape
sponsored by Kaspersky Lab
EBOOK: In this e-book explore the growing trend of ransomware attacks and prevention tips for enhancing cybersecurity with automation techniques.
Posted: 01 Sep 2017 | Published: 01 Sep 2017

Kaspersky Lab

Hybrid AI Takes on Cybersecurity
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Will hybrid AI disrupt your information security team? Experts agree that AI is the next step in identifying threats, but are we facing Westworld or just an evolutionary advancement? 7 security experts weigh in, inside this special report.
Posted: 28 Aug 2017 | Published: 28 Aug 2017

Arctic Wolf Networks, Inc.

Surviving the IT Security Skills Shortage
sponsored by Arctic Wolf Networks, Inc.
EBOOK: 82% of organizations want to keep their security staff at the same level or increase it. At the same time, there is a shortage of cybersecurity people. Access this e-book examines the struggles in recruiting and retaining security professionals with the necessary types and levels of skills.
Posted: 21 Aug 2017 | Published: 31 May 2017

Arctic Wolf Networks, Inc.

Cost Effectively Handling Encrypted Traffic Across the IT Infrastructure
sponsored by Radware
WHITE PAPER: More website, applications and web services are mandating the use of traffic encryption communications. Inside, discover the appropriate tools for cost effect methods to encrypt traffic across networks that match your specific IT needs.
Posted: 01 Sep 2017 | Published: 01 Sep 2017

Radware

Security Tech: Out with the Old in with the New
sponsored by Citrix
RESOURCE: Hackers love your outdated security tech. This new security infographic explores what's holding businesses back and what they need to do about it.
Posted: 21 Aug 2017 | Published: 21 Aug 2017

Citrix
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement