Business of Information Technology  >   Business Management  >   Best Practices  >  

Security Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Security Best Practices Reports
1 - 25 of 1625 Matches Previous Page  |  Next Page
The Road to SDN is Paved with Visibility and Many Good Intentions
sponsored by Gigamon
WHITE PAPER: Understanding traffic pathways and baselines before during and after the SDN migration means knowing how well the transition is delivering on CAPEX and OPEX promises as well as potential for higher security. Eliminate security blind spots with this Security Deliver Platform.
Posted: 27 May 2016 | Published: 01 Apr 2016

Gigamon

Addressing the Threat Within: Rethinking Network Security Deployment
sponsored by Gigamon
WHITE PAPER: A structured and architectural approach to pervasive network visibility gives security solutions access while enabling them to scale cost effectively. Discover how the Security Delivery Platform is becoming a building block to deploying security solutions.
Posted: 27 May 2016 | Published: 01 Apr 2016

Gigamon

Application Session Filtering
sponsored by Gigamon
WHITE PAPER: Bringing intelligent application-aware traffic visibility and filtering relevant applications to these security tools will help them work at their most optimum while uncovering malicious communication patterns.
Posted: 27 May 2016 | Published: 31 Dec 2015

Gigamon

What CIOs Need to Know About IoT and Security Risks
sponsored by MASERGY
ANALYST REPORT: Perimeters have vanished. Organizations need to move past traditional security approaches and move to technologies like software-defined networking (SDN), which brings performance and efficiency advantages as well as security improvements. With so much to gain from the IoT, don't be scared away by fixable risks.
Posted: 27 May 2016 | Published: 21 Oct 2015

MASERGY

Micro-Segmentation: A Demonstration
sponsored by Unisys
VIDEO: This video illustrates how to micro-segment a network. Discover ways micro-segmentation cryptographically isolates your valuables down to the smallest levels, and organizes them into functional communities so that only the right people can do the right things.
Posted: 26 May 2016 | Premiered: 09 Nov 2015

Unisys

Satisfy that Android sweet tooth: Making it work for your enterprise
sponsored by IBM MaaS360
WHITE PAPER: Protect your corporate data while giving users seamless access to work information on their devices. Take advantage of unified policies, threat management, app distribution, device management and a standard framework for a consistent experience across a wide variety of Android devices.
Posted: 26 May 2016 | Published: 01 Apr 2016

IBM MaaS360

Security for Virtualization Getting the Balance Right
sponsored by Kaspersky Lab
WHITE PAPER: Virtualization promises cost savings, improved productivity, and the ability to transform your business. But too often security can either detract from the performance gains that virtualization promises, or just not give you the protection you need. Getting the balance right is critical.
Posted: 26 May 2016 | Published: 01 Apr 2016

Kaspersky Lab

Kaspersky in Action
sponsored by Kaspersky Lab
WHITE PAPER: In today's complex cyberthreat landscape, it's more important than ever to have the right security solution in place. Are you settling for partial protection?
Posted: 26 May 2016 | Published: 01 Apr 2016

Kaspersky Lab

IDC Server Security: Virtualization and Cloud Changes Everything
sponsored by TrendMicro
WHITE PAPER: Server security prevents the injection of malware into servers and protects the servers from attacks. Learn the many functions server security offers you and how to control them all from a single pan of glass.
Posted: 26 May 2016 | Published: 01 Apr 2016

TrendMicro

Complete Data Protection (Advanced) - Data Sheet
sponsored by Intel Security
WHITE PAPER: Discover how to stop data loss initiated by sophisticated malware that hijacks sensitive information. Implement and enforce organization-wide security policies that control how data is encrypted, monitored and protected from a central console.
Posted: 26 May 2016 | Published: 01 Apr 2016

Intel Security

Building a Cloud Network: What Does It Mean?
sponsored by MASERGY
EGUIDE: Building a network that supports cloud computing appears, for many engineers, to be a path paved by fat pipes. But that's not always the case. Find out what it means – and what it will take – to build a cloud network for your business.
Posted: 25 May 2016 | Published: 19 May 2016

MASERGY

Put Time On Your Side: The Heavy Cost Of Putting Off Your Cybersecurity Decisions Enterprise
sponsored by Kaspersky Lab
WHITE PAPER: A lot can happen in a business day. Deals close. Products launch. News items hit the airwaves. In fact, at Kaspersky Lab, we detect 310,000 new pieces of malware every day, which means that every day you put off the decision to upgrade your IT security system is a day that thousands of pieces of new malware can slip through.
Posted: 25 May 2016 | Published: 01 Apr 2016

Kaspersky Lab

The Threats From Within
sponsored by Kaspersky Lab
WHITE PAPER: With a robust security education program in place, your company can protect its most sensitive information by ensuring that cybercriminals cannot break through your employee firewall.
Posted: 25 May 2016 | Published: 25 May 2016

Kaspersky Lab

Virtualization Security: Know Your Options
sponsored by Kaspersky Lab
WHITE PAPER: Discover the top three options for delivering security to your virtual servers. Go in-depth on agent-based security, agentless security and light agent security to see which option fits your unique IT architecture.
Posted: 25 May 2016 | Published: 01 Apr 2016

Kaspersky Lab

LIFTING THE VEIL OF SECRECY ON CYBERCRIMINALS.
sponsored by Kaspersky Lab
WHITE PAPER: In this eBook, we'll look closely at cybercrime trends to answer your most pressing questions about cybercriminals. Most important, we will answer what you can do to protect your business from this growing threat.
Posted: 25 May 2016 | Published: 31 Dec 2015

Kaspersky Lab

RANSOMWARE: ALL LOCKED UP AND NO PLACE TO GO
sponsored by Kaspersky Lab
EBOOK: In this e-book, you'll discover how exactly ransomware works, types of ransomware you'll encounter and how to best deal with being held victim by ransomware. Learn hard facts and dispel myths about ransomware vs. businesses.
Posted: 25 May 2016 | Published: 01 Apr 2016

Kaspersky Lab

Future Risks Be Prepared
sponsored by Kaspersky Lab
EBOOK: An increasingly sophisticated threat landscape calls for a multi-layered security approach, in which a combination of integrated technologies provides comprehensive detection and protection against known, unknown and advanced malware and other threats. This report is designed to help you to be better prepared to fight APTs.
Posted: 25 May 2016 | Published: 31 Dec 2015

Kaspersky Lab

Rethinking IT Security
sponsored by Kaspersky Lab
EBOOK: This eBook explores the features that make antivirus a critical component of an effective cybersecurity strategy to fight all hazards targeting businesses today — including known, unknown and advanced cyberthreats.
Posted: 25 May 2016 | Published: 31 Dec 2015

Kaspersky Lab

Management of Native Encryption for Apple FileVault and Microsoft BitLocker
sponsored by Intel Security
WHITE PAPER: With the adoption of native encryption and other encryption layers across your organization, centralized management ensures that you have consistent policy and compliance enforcement across your encryption technology stack. This resource can help ensure you don't end up on the data breach victim's list.
Posted: 25 May 2016 | Published: 01 Apr 2016

Intel Security

CEO Fraud: How to Stop Impersonation Attacks
sponsored by Mimecast
WHITE PAPER: The following resource shows the results of 500 surveyed organizations that were victimized by whaling attacks. Access now to identify the impact of whaling attacks on other companies, so you can take the right safeguards in place.
Posted: 25 May 2016 | Published: 25 May 2016

Mimecast

George Washington University Leverages Gigamon’s GigaSECURE to Improve Network Visibility and Security Posture
sponsored by Gigamon
CASE STUDY: Discover how GW was able to reduce the video steaming traffic on its network from one of the top five applications routing data through its security and application performance solutions to one of the top 25. The university is now able to take advantage of centralized security processing and scale across multiple data centers.
Posted: 24 May 2016 | Published: 01 Apr 2016

Gigamon

Move Your Email to the Cloud with Confidence
sponsored by Mimecast
WHITE PAPER: As Office 365 adoption grows, Microsoft and all of its customers become a more appealing target. Explore the top five reasons you need a "Plan B" when it comes to securing Office 365.
Posted: 24 May 2016 | Published: 24 May 2016

Mimecast

Staying Ahead of Emerging Threats in Healthcare
sponsored by Symantec Corporation
VIDEO: To attain a strategic level of security in your healthcare organization, there are technology changes as well as cultural changes you must make. This video gives you expert insight from the latest study on healthcare IT security and risk management.
Posted: 24 May 2016 | Premiered: 24 May 2016

Symantec Corporation

Coalfire: Cloud & Data Center Security Solution to meet PCI DSS 3.1 Compliance
sponsored by TrendMicro
WHITE PAPER: In this paper, Coalfire examines the applicability of a security platform in regards to PCI DSS when used in physical or cloud environments. Access now for deep analysis on this security platform and for more PCI DSS compliance standards.
Posted: 24 May 2016 | Published: 31 Oct 2015

TrendMicro

Security Operations Centers: The Key to the Future
sponsored by Intel
RESOURCE CENTER: Security operations centers (SOCs) can help enterprises gain better visibility into their environments. In this resource, expert Eric Cole explains how to get the most out of SOCs.
Posted: 23 May 2016 | Published: 13 May 2016

Intel
1 - 25 of 1625 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement