Business of Information Technology  >   Business Management  >   Best Practices  >  

Security Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Security Best Practices Reports
1 - 25 of 1128 Matches Previous Page  |  Next Page
Learn How to Configure and Use a PKI In Your Network
sponsored by Global Knowledge
WHITE PAPER: This white paper investigates the practical use of the PKI and its configuration, as well as how the PKI can secure different types of servers.
Posted: 28 Jan 2015 | Published: 31 Dec 2014

Global Knowledge

The Big Shift to Cloud-Based Security for Small Businesses
sponsored by Qualys
WHITE PAPER: This white paper explains why SMBs are just as vulnerable to cyberattacks as larger corporations, and how cloud-based security can provide them with a stronger network security posture without breaking the bank.
Posted: 28 Jan 2015 | Published: 29 Aug 2014

Qualys

Enterprises Reveal Significant Room for Improvement In Their Security Defenses
sponsored by Hewlett-Packard Company
WHITE PAPER: This resource explores the results of a survey that depicts that lack of confidence that organizations have in their security defenses, and also presents an approach to detecting malware to prevent it from spreading throughout the network.
Posted: 27 Jan 2015 | Published: 27 Jan 2015

Hewlett-Packard Company

Why You Need a Next-Generation Firewall
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper explores the reasons why enterprises benefit from implementing next-generation firewalls (NGFWs) and lays out a path to success.
Posted: 27 Jan 2015 | Published: 27 Jan 2015

Hewlett-Packard Company

The Zero Trust Model Of Information Security
sponsored by Zscaler
WHITE PAPER: This white paper introduces the Zero Trust Model of information security, which eliminates the idea of trusted and untrusted networks in favor of viewing all network traffic as untrusted.
Posted: 27 Jan 2015 | Published: 22 Oct 2014

Zscaler

A New Approach to DNS Security
sponsored by Cloudmark
VIDEO: This short video introduces a security platform that provides comprehensive protection of DNS networks, infrastructure, and traffic without the rigidity and cost of most network security solutions.
Posted: 27 Jan 2015 | Premiered: 27 Jan 2015

Cloudmark

Cloud Readiness: Securing Access to Your Private Cloud
sponsored by Ping Identity Corporation
EBOOK: This eBook explains the benefits of moving enterprise applications to the cloud and describes how to keep your applications and data secure during this process.
Posted: 27 Jan 2015 | Published: 27 Jan 2015

Ping Identity Corporation

4 Steps to Prevent a Data Breach: Address Your Weak Spots Before it's Too Late
sponsored by IBM
WHITE PAPER: Access this valuable resource to learn more about the common threats to data security, and how you can address your database vulnerabilities in 4 critical steps.
Posted: 27 Jan 2015 | Published: 31 Dec 2014

IBM

Protecting Your Organization from DNS Security Threats
sponsored by Cloudmark
WEBCAST: This webinar provides a detailed look at common threats to DNS infrastructure, and how your enterprise can mitigate these threats.
Posted: 26 Jan 2015 | Premiered: Nov 13, 2014

Cloudmark

Web Application Security for Dummies
sponsored by Qualys
EBOOK: This e-book explains how to quickly locate and remediate vulnerabilities in order to prevent attackers from gaining control over the application and obtaining access to the server, database, and other back-end IT resources.
Posted: 26 Jan 2015 | Published: 30 Dec 2011

Qualys

Six Essential Elements of Web Application Security
sponsored by Qualys
WHITE PAPER: This white paper discusses the most common classes of web application vulnerabilities, and how hackers most often take advantage of these weaknesses. Read on to learn the 6 essential elements of web application security that are the most valuable places for IT teams to invest their time and resources.
Posted: 26 Jan 2015 | Published: 31 Oct 2013

Qualys

Governance, Risk, and Compliance for Critical Data Movement
sponsored by IBM
WEBCAST: Join this webinar with experts from Forrester Research to learn about the key trends in GRC. Find out how to develop your lines of defense, learn how to measure your organization's GRC maturity, and get three key tips for developing a successful strategy.
Posted: 26 Jan 2015 | Premiered: Jan 26, 2015

IBM

Best Practices for Selecting a Web Application Scanning (WAS) Solution
sponsored by Qualys
WHITE PAPER: This white paper explains how a Web Application Scanning solution can help you to locate and test web-based apps, and provides a checklist of best practices that will help you to understand what to look for when selecting a WAS solution.
Posted: 23 Jan 2015 | Published: 16 May 2013

Qualys

APTs: Why the Best Defense is a Full Spectrum Offense
sponsored by Zscaler
WHITE PAPER: This white paper provides answers to all of your questions about advanced persistent threats, from the APT lifecycle to the best ways to evaluate potential APT defense solutions.
Posted: 23 Jan 2015 | Published: 23 Jan 2015

Zscaler

Healthcare Data Breaches - Lessons Learned
sponsored by Absolute Software
VIDEO: Access this video for data breach trends and statistics. Watch and learn how to avoid data breaches in the future.
Posted: 22 Jan 2015 | Premiered: 22 Jan 2015

Absolute Software

Extend Compliance And Risk Management To What Really Matters For Your Business
sponsored by Absolute Software
ANALYST REPORT: Access this informative report to find out how the current focus of risk and compliance efforts is too narrow because many GRC programs largely ignore the risks that cause companies to fail. Discover how to impact performance by expanding the fundamentals of GRC to the aspects of the business that drive success with customer interactions.
Posted: 22 Jan 2015 | Published: 31 Dec 2014

Absolute Software

Infographic: Is Your DNS Really Protected?
sponsored by Cloudmark
RESOURCE: View this informative infographic now to learn more about the consequences of DNS attacks, and how you can prevent them within your enterprise.
Posted: 22 Jan 2015 | Published: 22 Jan 2015

Cloudmark

Protect Your Fleet With Simple, Policy-Based Print Security
sponsored by Hewlett-Packard Limited
WHITE PAPER: This white paper explains the importance of securing your printing and imaging environment, and introduces a streamlined, policy-based approach to securing these devices before a data breach occurs.
Posted: 22 Jan 2015 | Published: 31 Oct 2014

Hewlett-Packard Limited

The Enemy Within: Why Insiders Are Still the Weakest Link in Your Data Security Chain
sponsored by Absolute Software
WHITE PAPER: This white paper describes the 5 steps that your enterprise needs to take in order to foster a conscientious data security environment within your enterprise, despite the challenges of the digital era.
Posted: 21 Jan 2015 | Published: 29 Dec 2014

Absolute Software

5 Secrets and 2 Gotchas of Vulnerability Scanning
sponsored by Risk IO
WHITE PAPER: IT security is the unsung hero of your organization. They stay on top of threats, attacks, and potential exploits to keep you and your company safe every day.
Posted: 21 Jan 2015 | Published: 21 Jan 2015

Risk IO

A Quick Guide to SSL for Apps
sponsored by Symantec Corporation
WHITE PAPER: This white paper lists the steps that your enterprise needs to take in order to create a stronger, more trustworthy SSL implementation.
Posted: 20 Jan 2015 | Published: 28 Feb 2014

Symantec Corporation

What to Consider When Formulating an Enterprise Mobile Security Strategy
sponsored by BlackBerry
EGUIDE: In this e-guide, Moriah Sargent explains why mobile device security policies should be revisited and revised often. In addition, Zeus Kerravala discusses essential enterprise security controls for the increasing amount of high-value information stored on mobile devices.
Posted: 20 Jan 2015 | Published: 20 Jan 2015

BlackBerry

Wildcard and SAN: Understanding Multi-Use SSL Certificates
sponsored by Symantec Corporation
WHITE PAPER: Find out about how Multi-Use SSL Certificates such as Wildcard and SAN certificates can provide greater flexibility to simplify certificate management and reduce costs.
Posted: 20 Jan 2015 | Published: 28 Feb 2014

Symantec Corporation

SSL for Apps: Best Practices for Developers
sponsored by Symantec Corporation
WHITE PAPER: This white paper lists the necessary steps that your enterprise needs to take in order to create a stronger, more trustworthy SSL implementation.
Posted: 20 Jan 2015 | Published: 31 Oct 2013

Symantec Corporation

Securing the Future of Trust on the Internet
sponsored by Symantec Corporation
WHITE PAPER: This white paper explains why public key infrastructure (PKI) is the key to the future of trust on the Internet, and the steps that must be taken to build a stronger, more trustworthy PKI ecosystem.
Posted: 20 Jan 2015 | Published: 28 Feb 2014

Symantec Corporation
1 - 25 of 1128 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement