Business of Information Technology  >   Business Management  >   Best Practices  >  

Security Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Security Best Practices Reports
1 - 25 of 1178 Matches Previous Page  |  Next Page
Newest Data Center Dilemma: Security vs. Performance
sponsored by BitDefender
WHITE PAPER: This white paper elaborates on the security concerns of virtualized environments and why traditional security approaches don't work.
Posted: 27 Apr 2015 | Published: 31 Dec 2014

BitDefender

Evolve or Die: Security Adaptation in a Virtual World
sponsored by BitDefender
WHITE PAPER: This white paper describes and suggests solutions for some of the biggest issues in virtualization security.
Posted: 27 Apr 2015 | Published: 31 Dec 2014

BitDefender

Phone Number Verification Done Right
sponsored by Nexmo
WEBCAST: This webcast offers 6 best practices for phone number verification to ensure maximum conversion rates and spam/fraud mitigation. View now to learn more.
Posted: 24 Apr 2015 | Premiered: Nov 5, 2014

Nexmo

OpenText Secure Shell
sponsored by OpenText
PRODUCT OVERVIEW: Access this informative resource to explore a comprehensive security solution that protects network traffic between host systems and remote PCs and web browsers by encrypting application traffic across networks. Learn how you can ensure zero disruption to users who remotely access data and applications from web browsers and desktop computers.
Posted: 24 Apr 2015 | Published: 31 Mar 2015

OpenText

Avoiding the Headlines: 5 Critical Security Practices to Implement Now
sponsored by CloudPassage
VIDEO: Inside this webinar, join Adrian Sanabria, Senior Security Analyst at 451 Research, and Amrit Williams, CTO of CloudPassage to learn five best practices to put in place in order to avoid a security breach within your organization.
Posted: 24 Apr 2015 | Premiered: 24 Apr 2015

CloudPassage

Best Practices for Securing Your Citrix Remote Access Against Hacker Intrusions
sponsored by Citrix Ready and SMS Passcode
WEBCAST: Join this live webcast on May 21, 2015 to learn the best practices for securing your remote access against sophisticated hackers.
Posted: 24 Apr 2015 | Premiered: Apr 24, 2015

Citrix Ready and SMS Passcode

Securing #GenMobile: Is Your Business Running the Risk?
sponsored by Aruba Networks
WHITE PAPER: This white paper outlines a 5 step mobile security strategy to mitigating the risks created by #GenMobile. View now to learn how to adapt your data protection to prevent loss.
Posted: 23 Apr 2015 | Published: 25 Feb 2015

Aruba Networks

The six most important things to know about VDI/DaaS security
sponsored by BitDefender
WHITE PAPER: This white paper describes the challenges of securing virtual desktops and suggests solutions for overcoming these challenges.
Posted: 23 Apr 2015 | Published: 31 Dec 2014

BitDefender

Layered Cyber Defenses for Better Security
sponsored by Hewlett-Packard Company
WHITE PAPER: View this webcast to learn how to evolve your cyber security strategy into a four phase process to stop APT attacks. Read on now to learn the 12 critical capabilities of an adaptive protection process and how to move beyond a reactive architecture to an always-on monitoring model.
Posted: 22 Apr 2015 | Published: 04 Jun 2014

Hewlett-Packard Company

SMS: A New Approach to Two Factor Authentication
sponsored by Nexmo
WHITE PAPER: This white paper explores how to secure enterprise data and sensitive information on mobile devices by using two factor authentication (2FA). View now to learn the 15 best practices to implementing a 2FA strategy and ensuring security success.
Posted: 22 Apr 2015 | Published: 21 Jan 2015

Nexmo

5 Best Practices to Reduce Incident Response Time
sponsored by Great Bay
WEBCAST: Join security guru Ty Powers as he explains the 5 best practices for reducing incident response (IR) time.
Posted: 22 Apr 2015 | Premiered: Apr 22, 2015

Great Bay

SLA Management Checklist and Data Restoration Tips After a Breach
sponsored by Carbonite
EGUIDE: In this e-guide you will find a checklist of major items that should be addressed in service-level agreement before signing the dotted line, including security and privacy.
Posted: 22 Apr 2015 | Published: 22 Apr 2015

Carbonite

How a Security Operations Center Can Better Safeguard Your Business
sponsored by IBM
WHITE PAPER: This white paper suggests a new, innovative strategy for building security operations centers (SOCs) that streamline your security by focusing all security operations one central place.
Posted: 22 Apr 2015 | Published: 31 Dec 2013

IBM

How to Avoid Today's Top 8 Enterprise Mobility Security Issues
sponsored by BlackBerry
WHITE PAPER: This helpful resource presents the top 8 mobile security risks that you need to be on top of right now in order to protect your business, and also provides a questionnaire designed to elucidate and resolve the gaps in your approach to mobile security.
Posted: 22 Apr 2015 | Published: 12 Dec 2014

BlackBerry

Make the Impossible Possible: Simplifying ISO Compliance
sponsored by BalaBit
WHITE PAPER: This white paper gives some helpful guidelines for compliance by laying out the steps necessary for complying with the latest revision of ISO.
Posted: 22 Apr 2015 | Published: 22 Apr 2015

BalaBit

How to Achieve Complete Mobile Security without Sacrificing User Experience
sponsored by BlackBerry
WHITE PAPER: This exclusive white paper takes an in-depth look at dealing with the difficult security challenges associated with mobility adoption. Read on to learn more.
Posted: 22 Apr 2015 | Published: 18 Dec 2014

BlackBerry

How BlackBerry Addresses BYOD Security Issues
sponsored by BlackBerry
WHITE PAPER: This white paper examines how the BlackBerry® platform aims to resolve the security issues inherent in accessing sensitive enterprise data on consumer devices.
Posted: 22 Apr 2015 | Published: 04 Dec 2014

BlackBerry

The Secret Ingredient in Mobile ROI
sponsored by BlackBerry
WHITE PAPER: In this white paper, you'll learn why security doesn't have to be a barrier to your business goals, but rather enable business decision-makers, end users and daily operations.
Posted: 21 Apr 2015 | Published: 21 Apr 2015

BlackBerry

One Solution to Mobile Enterprise Management
sponsored by BlackBerry
WHITE PAPER: In this white paper, you'll learn how one mobile management solution enables your company to support secure and productive mobile business.
Posted: 21 Apr 2015 | Published: 21 Apr 2015

BlackBerry

7 Best Practices for Securing Hadoop
sponsored by IBM
WHITE PAPER: This white paper explores how to develp a data life-cycle-centric approach to Hadoop security by asking yourself five integral questions. Access now to learn the 7 step program to improving your security strategy.
Posted: 21 Apr 2015 | Published: 11 Apr 2014

IBM

Best Practices for Intelligent Security and File-Sharing
sponsored by Ipswitch File Transfer
EGUIDE: Take a look at this expert guide to discover how to enhance your data protection with stronger threat intelligence and more secure file sharing.
Posted: 20 Apr 2015 | Published: 10 Apr 2015

Ipswitch File Transfer

The Essential Guide to Privileged Activity Monitoring
sponsored by BalaBit
WHITE PAPER: In it, learn how privileged activity monitoring can help you control your IT environment without compromising user productivity.
Posted: 20 Apr 2015 | Published: 20 Apr 2015

BalaBit

Implementing a Proactive Strategy For Data Security
sponsored by IBM
WHITE PAPER: In this white paper, you will learn how to implement a proactive data security strategy using a 5 step approach. Access now and discover how to overcome data security struggles and use people and processes to enhance technology solutions.
Posted: 17 Apr 2015 | Published: 17 Sep 2014

IBM

Tips for Successful Private Cloud Planning and IP Address Management
sponsored by Infoblox
EGUIDE: This expert e-guide teaches you the five questions to ask to ensure optimal performance and security.  Read on to uncover the answers in this helpful guide.
Posted: 17 Apr 2015 | Published: 14 Jan 2015

Infoblox

Quarterly Cyberthreat Report
sponsored by IBM
WHITE PAPER: In this quarterly security report, discover what lessons have been learned in 2014 and how cybersecurity needs to evolve in 2015.
Posted: 17 Apr 2015 | Published: 31 Mar 2015

IBM
1 - 25 of 1178 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement