Business of Information Technology  >   Business Management  >   Best Practices  >  

Security Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Security Best Practices Reports
1 - 25 of 1658 Matches Previous Page  |  Next Page
10 Real-Time Reporting Strategies for Better Security and Compliance
sponsored by Dell Software
WHITE PAPER: With real-time auditing tools, you can immediately uncover what's happening in your environment. Learn about 10 reports designed to help you track changes in real-time, receive alerts about critical changes, and more.
Posted: 30 Sep 2016 | Published: 30 Sep 2016

Dell Software

Solution Brief: Waste Less Time Fighting Ransomware Attacks
sponsored by OpenDNS
WHITE PAPER: Discover how to map out the internet infrastructure that attackers use to launch current and future attacks. Learn how to not only immediately validate malicious domains and IPs, but also pivot on different data points to build out a view of other related infrastructure used in attacks.
Posted: 30 Sep 2016 | Published: 31 Aug 2016

OpenDNS

Retail Tip Sheet
sponsored by Trustwave
WHITE PAPER: It's easy to assume your organization won't fall victim if you've check off all compliance requirements. But hackers are always evolving their methods to get what you don't want them to have. Discover 10 practices you can enact to avoid costly data breaches.
Posted: 30 Sep 2016 | Published: 31 Aug 2016

Trustwave

Your Quick Reference Guide to Always-On SSL
sponsored by Symantec
WHITE PAPER: Learn in quick and easy bullet points and infographics what Always-On SSL is, why it works, and what it can do for your organization.
Posted: 30 Sep 2016 | Published: 30 Sep 2016

Symantec

Your MSSP Decision Guide
sponsored by Trustwave
WHITE PAPER: Discover key questions and considerations to help you select an MSSP and evaluate their solutions to better secure your business. Access now to find how much global reach your MSSP should have, what it means to have security expertise, and more.
Posted: 30 Sep 2016 | Published: 30 Sep 2016

Trustwave

MYDIGIPASS for Healthcare
sponsored by VASCO Data Security International
WHITE PAPER: Discover a unified ID proofing method and authentication tool that can be used throughout all applications and platforms. Access now to learn the five critical elements to support trusted digital identities and secure information exchange within healthcare organizations and HIT providers.
Posted: 30 Sep 2016 | Published: 31 Aug 2016

VASCO Data Security International

How a CASB with Built-In UBA Unmasks Insider Threats in the Cloud
sponsored by Palerra Inc.
WHITE PAPER: Uncover a better approach to dealing with a user with valid credentials, but malicious intent. Learn how the focus of most enterprise security teams is misaligned towards outside threats, how the network perimeter has been corroded, and what can truly be done about an data breach caused by an insider.
Posted: 30 Sep 2016 | Published: 30 Sep 2016

Palerra Inc.

DIGIPASS GO 7
sponsored by VASCO Data Security International
WHITE PAPER: Discover a convenient single-button authentication device that boosts security while providing unmatched user acceptance. Access now to learn how to economically deploy a comprehensive, scalable, high performance two-factor authentication solution for secure network/remote access.
Posted: 30 Sep 2016 | Published: 31 Dec 2015

VASCO Data Security International

Addressing Mobile App Risk: Why Network Traffic Analysis Isn't Enough
sponsored by Appthority
WHITE PAPER: Uncover why enterprises need to take a mobile first approach to the security of employees and the data they access/share via apps on their mobile devices.
Posted: 30 Sep 2016 | Published: 30 Sep 2016

Appthority

2016 Security Pressures Report
sponsored by Trustwave
WHITE PAPER: No matter what your security maturity level looks like, you undoubtedly have security pressures you'd like to alleviate. This report serves as a reliable compass of where your security efforts need to be in 2016 and into the future. Learn how to not only placate the pressure, but to help make your organization more secure overall.
Posted: 30 Sep 2016 | Published: 31 Aug 2016

Trustwave

Cisco 2016 Midyear Cybersecurity Report
sponsored by OpenDNS
WHITE PAPER: Get a global perspective on cybersecurity over the past half-year and learn what techniques other organizations are using to bolster their security practices. Discover what you must do to effectively undermine cybercriminals and ultimately catch them, ending their attacks at the source.
Posted: 30 Sep 2016 | Published: 01 Jul 2016

OpenDNS

Top 5 SSL Attack Vectors
sponsored by Symantec
WHITE PAPER: Discover not only the basics of SSL vulnerabilities, but what your enterprise can do to avoid the top 5 hazards that so many organizations fall prey to when deploying encryption.
Posted: 29 Sep 2016 | Published: 29 Sep 2016

Symantec

APRIL 2016 SECURITY OPERATIONS CENTER REPORT
sponsored by Neustar
WHITE PAPER: This report analyzes some of the major attack types seen in today's digital world and discusses trends for the future of cyber threats. You'll see statistics on DDoS attack vectors, attack volume and what sort of damage these attacks caused so you can best plan for the dangerous future of cybercrime.
Posted: 29 Sep 2016 | Published: 31 Aug 2016

Neustar

April 2016 Neustar DDoS Attacks & Protection Report
sponsored by Neustar
WHITE PAPER: This report represents a global view of the DDoS outlook with insights and data from 6 continents and more than one thousand executives. Discover what the future portends for your organization and learn why security should be a central concern for all devices on your network.
Posted: 29 Sep 2016 | Published: 30 Apr 2016

Neustar

Not All Certificate Authorities are Created Equal
sponsored by Symantec
WHITE PAPER: Learn the importance of continual hardening of the infrastructure that protects cryptographic keys and securing the authentication process that validates identity. Uncover how to maximize SSL encryption effectiveness, utilize daily penetration testing, and create a secure certificate authorities environment.
Posted: 29 Sep 2016 | Published: 29 Sep 2016

Symantec

Designing a Multilayered, In-Depth Defense Approach to Authentication
sponsored by Dell Software
WHITE PAPER: This white paper details the logical and administrative layers of security that you should implement to improve your authentication and authorization security posture. Uncover features you should look for in third-party solutions to supplement native security mechanisms.
Posted: 29 Sep 2016 | Published: 29 Sep 2016

Dell Software

Streamlining Security Incident and Vulnerability Response
sponsored by ServiceNow
WHITE PAPER: Discover vital shortcomings in the way IT defends itself from incidents and breaches, and how to shore up your own defenses. Learn how to integrate security and IT tools while coordinating incident response, reducing time-until-response, and remediate issues quickly.
Posted: 29 Sep 2016 | Published: 29 Sep 2016

ServiceNow

How Healthcare Benefits from Cloud-delivered Security
sponsored by OpenDNS
WHITE PAPER: By utilizing the cloud for healthcare, you can enhance security today while ensuring scalability into the future. Learn how to deal with malware, ransomware and other threats that impact patient well-being and best come into regulatory compliance with the cloud.
Posted: 29 Sep 2016 | Published: 31 Aug 2016

OpenDNS

Focus: Securing new technology
sponsored by ComputerWeekly.com
EGUIDE: The scarcity of information security professionals with the required depth and breadth of experience is one of the biggest challenges facing businesses. As businesses seek to gain competitive edge through digital transformation, they are increasingly exposing themselves to increasing risk of cyber attack.
Posted: 29 Sep 2016 | Published: 29 Sep 2016

ComputerWeekly.com

To Increase Downloads, First Instill Trust: Security Advantages of Code Signing
sponsored by Symantec
WHITE PAPER: Malware poses a serious threat to the mobile environment: malicious code can slip into app stores and become a threat to anyone who downloads them. Discover how code signing enables end users to take advantage of the ease and convenience of content distribution—without worrying about security consequences.
Posted: 28 Sep 2016 | Published: 31 Dec 2014

Symantec

How Status Quo Creates Security Risk - The State of Incident Response
sponsored by ServiceNow
ANALYST REPORT: Learn what was found after the current practices and challenges associated with incident response processes and technologies are evaluated from thousands of respondents all over North America.
Posted: 28 Sep 2016 | Published: 29 Feb 2016

ServiceNow

Simple Steps to Evolving Your Website Security in 2016
sponsored by Symantec
WHITE PAPER: Learn how to enforce total protection against website security threats, given the evolving threat landscape of 2016. Access this paper to view several simple steps used to evolve your coverage, including how to increase trust and simplify code signing.
Posted: 28 Sep 2016 | Published: 28 Sep 2016

Symantec

Why Code Signing Is an Essential Website Security Feature
sponsored by Symantec
WHITE PAPER: Learn how code signing mitigates the risks of transferring code over the Internet or wireless networks, and also allows end users to take advantage of the ease and convenience of content distribution without worrying about security consequences.
Posted: 28 Sep 2016 | Published: 28 Sep 2016

Symantec

Understanding Shared Responsibility for Microsoft Azure
sponsored by Alert Logic
WHITE PAPER: Discover your enterprise's relationship with Azure for IaaS, PaaS, and both Microsoft's and Azure's Active directories. Also learn 7 Azure best practices.
Posted: 28 Sep 2016 | Published: 28 Sep 2016

Alert Logic

It’s Not You, It’s Me: Understanding the Shared Responsibility of Cloud Security
sponsored by Alert Logic
WHITE PAPER: Discover what specific security responsibilities belong to you and your provider, the latest cloud security threats, and 7 cloud security best practices.
Posted: 28 Sep 2016 | Published: 28 Sep 2016

Alert Logic
1 - 25 of 1658 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement