IT Management  >   Systems Operations  >   Security  >  

Security Administration

RSS Feed    Add to Google    Add to My Yahoo!
Security Administration Reports
 
Can a CASB Protect You from the 2016 Treacherous 12? Infographic
sponsored by Palerra Inc.
RESOURCE: Uncover if a Cloud Access Security Broker (CASB) is ideal for your enterprise's cloud security needs. Consult this infographic to see how CASBs measure up against the "Treacherous 12" threats identified by the Cloud Security Alliance, find detailed examples of cloud security issues and strategies relevant to your enterprise, and more.
Posted: 11 Jul 2016 | Published: 11 Jul 2016

Palerra Inc.

Cybersecurity truth: Protection isn't enough
sponsored by Verizon
VIDEO: Access this short video to learn about improving your incident response time, and to gain access to the 2016 Data Breach Investigation Report.
Posted: 05 Jul 2016 | Premiered: 02 May 2016

Verizon

Cyberhunting: A Critical Component of Enterprise Security
sponsored by Infocyte
EGUIDE: Cyberhunting – actively looking for signs of compromise in an organization and controlling and minimizing the overall damage – must be a part of your security program. Learn more about this proactive security approach, and how to implement it within your organization, in this e-guide.
Posted: 20 Jun 2016 | Published: 15 Jun 2016

Infocyte

A Technology Brief on SSL/TLS Traffic
sponsored by Blue Coat Systems
RESOURCE: In this resource get a detailed breakdown of SSL/TSL traffic and not only its importance to enterprises but also the grave threat it can pose if malware hides in it. Read on to discover the skills necessary to effectively utilize encrypted traffic and combat the malware threat.
Posted: 27 Jul 2016 | Published: 27 Jul 2016

Blue Coat Systems

The Advanced Threat Protection Buyer’s Checklist
sponsored by Fortinet, Inc.
WHITE PAPER: Use the following checklist to help determine the strength of your security strategy. Access now and explore ways to make informed choices to move towards an integrated system of prevention, detection, and mitigation against advanced threats.
Posted: 22 Jun 2016 | Published: 22 Jun 2016

Fortinet, Inc.

Your Guide to Secure Access Architecture
sponsored by Fortinet, Inc.
WHITE PAPER: Evolving changes in mobile usage, devices, and applications create an enormous challenge for IT to protect the network. Explore ways to enable a secure network access architecture that helps keep internal enterprise assets safe, and protects users from cyberattacks.
Posted: 23 Jun 2016 | Published: 23 Jun 2016

Fortinet, Inc.

Enterprise cloud applications – can we trust them?
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series examines the more significant risks involved when an enterprise uses line-of-business applications hosted in the cloud.
Posted: 27 Jul 2016 | Published: 27 Jul 2016

ComputerWeekly.com

Security and Innovation Converge at Open Source Linux
sponsored by Red Hat
WHITE PAPER: Examine in this white paper today's server security landscape, and discover how employing Linux can help you meet security, risk management, and compliance goals in a cost-effective and scalable manner. Download now to mitigate vulnerabilities in both heterogeneous and hybrid infrastructures.
Posted: 15 Jul 2016 | Published: 15 Jul 2016

Red Hat

Amp Up Your Endpoint Data Security
sponsored by Dell and Microsoft
WHITE PAPER: More and more organizations are finding that effective security starts with endpoints. Discover ways to dramatically reduce the risk of harmful data breaches with proactive data protection, and advanced threat prevention designed for the mobile era.
Posted: 30 Jun 2016 | Published: 30 Jun 2016

Dell and Microsoft

Computer Weekly – 26 July to 1 August 2016: Olympic vision: Technology on track for Rio Games
sponsored by ComputerWeekly.com
EZINE: In this issue we interview the CIO for the forthcoming Rio Olympics. The technology his team has put in place will support delegations from over 200 countries, including 10,500 athletes. We also look at data centre and open source security, as well as take a first look at what the new UK Prime Minister's approach might be to the digital economy.
Posted: 25 Jul 2016 | Published: 26 Jul 2016

ComputerWeekly.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement