IT Management  >   Systems Operations  >   Security  >  

Security Administration

RSS Feed    Add to Google    Add to My Yahoo!
Security AdministrationReports
 
The Critical Incident Response Maturity Journey
sponsored by RSA, The Security Division of EMC
WHITE PAPER: This paper focuses on defining levels of critical incident response maturity and how organizations can continually improve their incident response capabilities to help reduce the risk of experiencing a damaging incident.
Posted: 16 Apr 2014 | Published: 31 Dec 2013

RSA, The Security Division of EMC

Why BridgeHead? Unique Capabilities for Protecting Data in Enterprise Hospital Environments
sponsored by BridgeHead Software
WEBCAST: This white paper explains 8 ways this data management solution exceeds other vendors' protection capabilities.
Posted: 10 Apr 2014 | Premiered: Dec 31, 2013

BridgeHead Software

Backup Mission-Critical Data Whenever and Wherever
sponsored by Code42
WHITE PAPER: This in-depth resource shines light on a continuous, multi-destination system to back up mission-critical data whenever and wherever it is created.
Posted: 21 Apr 2014 | Published: 21 Apr 2014

Code42

Design Security Policies For #GenMobile
sponsored by Aruba Networks
WHITE PAPER: This white paper highlights the 4 areas that must be addressed when providing secure, reliable access to business applications for mobile users. Click through to explore the essential tools you need for this strategy.
Posted: 18 Apr 2014 | Published: 18 Apr 2014

Aruba Networks

Content Security – Safe Guarding Organization Play
sponsored by Cisco Systems, Inc.
WEBCAST: This informative webcast discusses a security solution that is designed specifically to inspect the content of web and email transactions using state-of-the art threat intelligence, eliminating potentially harmful threats while allowing safe transactions to proceed effectively and efficiently.
Posted: 23 Apr 2014 | Premiered: Apr 22, 2014

Cisco Systems, Inc.

A Guide to Data Privacy for Business and IT Executives
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper explains the latest global government efforts in enforcing stronger data privacy laws. Click now to uncover 6 data protection recommendations to help you mitigate the risks of information sharing and prevent regulatory and market sanctions.
Posted: 18 Apr 2014 | Published: 31 Dec 2013

IntraLinks, Inc

SSO Vendor Evaluator’s Guide
sponsored by Imprivata
WHITE PAPER: Access this checklist for key qualities you should be looking for in a single sign-on (SSO) solution to help you evaluate vendors.
Posted: 11 Apr 2014 | Published: 28 Feb 2014

Imprivata

Cloud-Based Security Threats Present Challenges and Opportunities for MSPs
sponsored by Webroot
WHITE PAPER: This guide explores the current cloud-based security threats and how MSPs can face the challenge head on.
Posted: 15 Apr 2014 | Published: 31 Dec 2013

Webroot

Cisco Web Security Appliance
sponsored by Cisco Systems, Inc.
WHITE PAPER: This exclusive paper examines a web security appliance that combines advanced malware protection, application visibility and control, insightful reporting and highly secure mobility to ensure the protection and control of web traffic.
Posted: 23 Apr 2014 | Published: 23 Apr 2014

Cisco Systems, Inc.

LogRhythm’s Security Intelligence Platform
sponsored by LogRhythm, Inc.
WHITE PAPER: This brief guide explores one company's top-tier security intelligence platform and the essential security tools it provides.
Posted: 21 Apr 2014 | Published: 21 Apr 2014

LogRhythm, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement