Business of Information Technology  >   Business Management  >   Best Practices  >  

Security Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Security Best Practices Reports
1 - 25 of 1696 Matches Previous Page  |  Next Page
Why Secure Information Exchange is Critical for Digital Transformation
sponsored by OpenText
WEBCAST: Join Forrester Senior Analyst Heidi Shey as she breaks down the digital transformation and key requirements for success in regards to the information that fuels this digital future. Also delve into the importance and benefits of secure information exchange, as well as what to look for in secure information exchange solutions.
Posted: 20 Feb 2017 | Premiered: Feb 20, 2017

OpenText

Email Security Threats: Not Just from the Outside
sponsored by Mimecast
WHITE PAPER: Analysts have recently evaluated the state of enterprise security readiness for email threats. Learn how to look beyond basic defensive capabilities to avoid missing out on advancing security technologies.
Posted: 20 Feb 2017 | Published: 20 Feb 2017

Mimecast

2017 Study on Mobile and IoT App Security
sponsored by IBM
RESEARCH CONTENT: Explore how many companies are unprepared for risks created by IoT apps. Uncover the report's key findings about how malware could pose a larger threat to mobile apps rather than IoT, organizations don't believe they know all the mobile and IoT apps running in the workplace, rush to release and ad hoc testing generates vulnerable code, and more.
Posted: 20 Feb 2017 | Published: 31 Jan 2017

IBM

The Mimecast Email Security Risk Assessment 2017
sponsored by Mimecast
WHITE PAPER: By testing cloud security services against email security systems, Mimecast gathered data from 25,000 customers to understand the severity of threats and the effectiveness of commonly deployed email security systems. Learn more about what kind of threats are getting through incumbent email security systems both in large number and type.
Posted: 20 Feb 2017 | Published: 20 Feb 2017

Mimecast

Taking a Proactive Approach to Addressing Ransomware
sponsored by AttackIQ
WEBCAST: In this webcast, industry expert Kevin Beaver discusses the challenges associated with ransomware and proactive steps that can be taken to minimize the threat and fortify information security programs.
Posted: 17 Feb 2017 | Premiered: Feb 8, 2017

AttackIQ

Implementing App Security Efficacy and Centralized, Intelligent Threat Management
sponsored by Citrix
VIDEO: This brief video explores how to implement app security efficacy for centralized threat management both on-premise and in the cloud. Discover how to leverage a web app firewall, defend against threats on the app, infrastructure, and network levels, create stronger identity and access management, and enable real-time threat analytics.
Posted: 17 Feb 2017 | Premiered: 10 Feb 2017

Citrix

Taking a Proactive Approach to Addressing Ransomware
sponsored by AttackIQ
TRANSCRIPT: In this transcript join experts Brent Midwood and Kevin Beaver as they discuss best practices in approaching and addressing ransomware. Gain valuable insight into what drives ransomware developers (hint: the profits are enormous), the developing trends in ransomware deployment, and more.
Posted: 16 Feb 2017 | Published: 09 Feb 2017

AttackIQ

Today's State of Endpoint Protection & Management
sponsored by Absolute
WHITE PAPER: Unravel these 5 endpoint protection myths that are preventing your organization from attaining total endpoint visibility.
Posted: 16 Feb 2017 | Published: 16 Feb 2017

Absolute

Top 5 Risk Mitigations In a Cloud-First World
sponsored by Forcepoint
WEBCAST: Dive head-first into risk mitigation on the cloud with this webcast featuring experts Neil Thacker and Adrian Sanabria as they discuss 5 ways to make sure your cloud is secure and handled properly.
Posted: 16 Feb 2017 | Premiered: Feb 16, 2017

Forcepoint

Your Guide to Advanced Persistent Threat Protection
sponsored by Forcepoint
WHITE PAPER: In this guide find a detailed breakdown of how individual vendors fit within the advanced-persistent threat market and who the top players, trail blazers, specialists, and mature players are. Discover market segmentation and an in-depth breakdown of each organization in the field.
Posted: 16 Feb 2017 | Published: 16 Apr 2016

Forcepoint

Busting the Myth of the Malware “Silver Bullet”
sponsored by Intel Security
WHITE PAPER: This white paper explores how to architect an anti-malware and endpoint security toolbox that relies on coordinating multi-layer, sophisticated defense. Discover which technologies can be connected to bolster your security posture, and learn about 3 critical layers of defense for keeping up with modern threats.
Posted: 16 Feb 2017 | Published: 16 Feb 2017

Intel Security

6 Discoveries IT Security Pros Need to Know about SSL Inspection
sponsored by A10 Networks
RESOURCE: Find 6 discoveries that will help you better understand the threat increasingly hiding amongst your encrypted data, and what you can do to ensure that it isn't hiding for long.
Posted: 15 Feb 2017 | Published: 15 Feb 2017

A10 Networks

Your Guide to Uncovering Hidden Threats within Encrypted Traffic
sponsored by A10 Networks
WHITE PAPER: In this Ponemon Study discover how the malicious use of SSL encryption is on the rise, and what your organization can do about mitigating its risk to your business.
Posted: 15 Feb 2017 | Published: 15 Feb 2017

A10 Networks

How to Uncover Threats in SSL Traffic
sponsored by A10 Networks
WHITE PAPER: Delve into 5 features to consider when selecting an SSL inspection platform, helping you pick out the threats that may be hiding in the very encryption that you thought was making your organization safe.
Posted: 14 Feb 2017 | Published: 14 Feb 2017

A10 Networks

Security in a Mobile First World
sponsored by AVST
WEBCAST: Watch this webcast to learn mobile practices that will provide your business with secure mobile communications.
Posted: 14 Feb 2017 | Premiered: Dec 15, 2016

AVST

Agility meets Control: 3 Ways to Boost Security in the Cloud
sponsored by Microsoft
WHITE PAPER: Explore how to implement modern, cloud-capable security strategies that empower rather than hinder development and innovation. Find out 3 ways to boost security in the cloud with Windows Server 2016, starting with your OS, your data center and critical workloads, business apps, and more.
Posted: 14 Feb 2017 | Published: 31 Dec 2016

Microsoft

Vendor Risk Management Checklist
sponsored by ModoModo
WHITE PAPER: As outsourcing becomes the norm with more and more aspects of an enterprise's operations managed by third parties, these organizations expose themselves to a growing amount of shared risk. The following checklist can serve as a guide to help your organization mitigate vendor risk.
Posted: 13 Feb 2017 | Published: 13 Feb 2017

ModoModo

How to Implement Practical Security Assessments
sponsored by ModoModo
WHITE PAPER: This white paper covers ways to gain perspective about your security based on developing a proper and balanced perspective in the rather oblique world of assessments.
Posted: 13 Feb 2017 | Published: 13 Feb 2017

ModoModo

Finding a Better Metaphor, Staring into the Cloud, and What to Expect at RSA 2017
sponsored by Booz Allen Hamilton
WHITE PAPER: This white paper explores the security challenges of cloud and IoT, and examines which topics dominated the 2017 RSA conference. Find out which security paradigms are shifting and learn how security pros are putting a new spin on old topics, like how analytics and intelligence are increasing their role in threat and event management.
Posted: 13 Feb 2017 | Published: 13 Feb 2017

Booz Allen Hamilton

Cyber Threat Analysis For 2017
sponsored by Booz Allen Hamilton
WHITE PAPER: Access this guide to uncover a number of vital security predictions for 2017, including: enterprise environments providing fertile territory for ransomware operators, how IoT can enable DDoS attacks, and more.
Posted: 13 Feb 2017 | Published: 13 Feb 2017

Booz Allen Hamilton

What's The Best Risk Analysis Method for Enterprises?
sponsored by Presidio Networked Solutions
EGUIDE: In this expert e-guide, learn about the best frameworks and analysis methods to mitigate risk for your enterprise. Expert Michael Cobb highlights some of the best options available.
Posted: 20 Feb 2017 | Published: 16 Feb 2017

Presidio Networked Solutions

Before Tackling Secure Texting In Healthcare, Change Your Company Culture
sponsored by AVST
EGUIDE: In this expert e-guide, learn why the first step to secure communications technology (like texting) is convincing leaders and clinicians to recognize the risks to health data.
Posted: 16 Feb 2017 | Published: 16 Feb 2017

AVST

Mobile Network Security Remains an Enterprise Challenge
sponsored by Appthority
EGUIDE: This expert e-guide addresses the needs enterprises need to meet to successfully deploy a secure, available, and lightning-fast mobile network.
Posted: 15 Feb 2017 | Published: 13 Feb 2017

Appthority

Risk Management: Best and Worst Practices
sponsored by BitSight
EGUIDE: Discover the downsides to digitization, how to manage the risk to your organization's data, and 5 top IT risk management mistakes.
Posted: 15 Feb 2017 | Published: 15 Feb 2017

BitSight

Five Ways to Secure Mobile Data with EMM
sponsored by Appthority
EGUIDE: This expert e-guide details 5 ways to secure mobile data using enterprise mobility management (EMM) to keep your organization on the cutting edge.
Posted: 14 Feb 2017 | Published: 10 Feb 2017

Appthority
1 - 25 of 1696 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement