Business of Information Technology  >   Business Management  >   Best Practices  >  

Security Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Security Best Practices Reports
126 - 150 of 1257 Matches Previous Page  |  Next Page
2016 Prediction in Cybercrime
sponsored by WatchGuard Technologies, Inc.
VIDEO: Watch this video to get a glimpse into what cybercrime will look like in the coming year.
Posted: 20 Jan 2016 | Premiered: 16 Dec 2015

WatchGuard Technologies, Inc.

Revolutionizing Remote Secure Access: Adaptive Authentication for Healthcare
sponsored by SecureAuth
WHITE PAPER: In this white paper, you will learn how to use adaptive authentication in your organization to solve the access control challenges that will lead to stronger ePHI protection and safer patient care. Read on to access a security service with stronger data protection, rapid deployment, and friendly integration.
Posted: 20 Jan 2016 | Published: 30 Jun 2015

SecureAuth

Using Identity to Create Next Generation, Risk-based Access Management
sponsored by SecureAuth
WHITE PAPER: In this white paper, you will learn why becoming an identity provider is an important and growing need in today's connected world, and identify adaptive authentication's integral role in the identify provider market. Access this paper to learn how to formulate a risk-based access management strategy.
Posted: 20 Jan 2016 | Published: 31 Aug 2015

SecureAuth

Evaluating Standout Services in the Cloud Identity and Access Management Sector
sponsored by SecureAuth
WHITE PAPER: If you're to enforce strict identity management, you must shift your gaze to focus on both internal and external users that want to access apps running on-premise or in the cloud. In this report, you will focus your efforts on how to create strong authentication and risk-based access control empowered by cloud single sign-on.
Posted: 20 Jan 2016 | Published: 31 Mar 2015

SecureAuth

The Global Risks Report 2016
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from the World Economic Forum identifies the most pressing global risks countries and organisations will face in 2016, including sections on technology and cyber crime.
Posted: 20 Jan 2016 | Published: 20 Jan 2016

ComputerWeekly.com

Security Breaks DevOps – Here’s How to Fix It
sponsored by CloudPassage
WHITE PAPER: This webcast presents the key ingredients your security strategy needs in order to secure and accelerate DevOps.
Posted: 20 Jan 2016 | Published: 14 Jul 2015

CloudPassage

6 Keys to Eliminating SSL Blind Spots: What You Need for SSL Inspection
sponsored by A10 Networks
WHITE PAPER: It is estimated that 67 percent of Internet traffic will be encrypted by 2016, but that won't stop hackers from using it to their advantage. Learn six ways to ensure your network can stand up to malicious traffic with SSL inspection technology.
Posted: 20 Jan 2016 | Published: 20 Jan 2016

A10 Networks

MSSP Success Checklist
sponsored by AlienVault
WHITE PAPER: This white paper acts as a checklist for MSSP implementation in your organization. Review the template and find out how to centralize management and get organized.
Posted: 20 Jan 2016 | Published: 30 Dec 2015

AlienVault

Evaluating Cloud Security Solution for Amazon Web Services
sponsored by Palerra Inc.
WHITE PAPER: This buyer's guide outlines various requirements you must consider when purchasing an AWS security solution.
Posted: 19 Jan 2016 | Published: 30 Dec 2015

Palerra Inc.

Docker and Enterprise Security: Establishing Best Practices
sponsored by CloudPassage
NEWSLETTER: This blog entry discusses the best way to implement a security structure using virtualized containers.
Posted: 19 Jan 2016 | Published: 21 Oct 2015

CloudPassage

How to Overcome Distributed Network Security Risks
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This white paper examines into how you can overcome the major network security risks facing distributed retail environments today. Learn how to build and maintain a secure network, protect cardholder data, and more.
Posted: 19 Jan 2016 | Published: 19 Jan 2016

WatchGuard Technologies, Inc.

The Threat Landscape of 2015
sponsored by Forcepoint
WHITE PAPER: This report examines new technological trends and discusses what these trends mean for your security.
Posted: 19 Jan 2016 | Published: 14 Sep 2015

Forcepoint

SANS Critical Security Controls - Accelerated & Simplified
sponsored by AlienVault
WHITE PAPER: The AlienVault USM platform, with its built-in essential security capabilities and integrated threat intelligence, can help organizations implement these controls quickly and effectively. Learn how the AlienVault USM platform maps to each of the SANS CSCs.
Posted: 19 Jan 2016 | Published: 30 Dec 2015

AlienVault

Staying ahead of threats with global threat intelligence and automated protection
sponsored by IBM
WHITE PAPER: In this white paper you will discover how to stay ahead of the ever evolving security landscape and keep your precious data safe.
Posted: 19 Jan 2016 | Published: 30 Jun 2015

IBM

Forrester Total Economic Impact (TEI) Study of IBM Security Guardium
sponsored by IBM
WHITE PAPER: In this white paper you will learn how to improve process efficiency while meeting security and compliance requirements. Continue reading to learn how you can reduce the time and cost of compliance.
Posted: 19 Jan 2016 | Published: 30 Sep 2015

IBM

Detecting Data Exfiltration
sponsored by LogRhythm, Inc.
VIDEO: Watch this webcast and learn how you can rapidly detect, respond and neutralize breaches in your networks before they cause serious damage.
Posted: 19 Jan 2016 | Premiered: 03 Aug 2015

LogRhythm, Inc.

Security Breaks DevOps: Here's How Fix It
sponsored by CloudPassage
WEBCAST: This webcast presents the key ingredients your security strategy needs in order to secure and accelerate DevOps.
Posted: 18 Jan 2016 | Premiered: Dec 30, 2015

CloudPassage

A Practical Guide to Combating Advanced Malware
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This white paper features research based on thousands of pieces of malware they detected over the course of one year. Access this guide for details on four capabilities designed to help protect your organization against next-generation network threats.
Posted: 18 Jan 2016 | Published: 30 Sep 2014

WatchGuard Technologies, Inc.

Combating the Next Generation of Advanced Malware
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This white paper invites you to take a look beyond traditional network security measures. Read on and discover how a cloud-based sandbox with full system emulation can detect and block advanced malware and zero day attacks.
Posted: 18 Jan 2016 | Published: 18 Jan 2016

WatchGuard Technologies, Inc.

Data Theft Prevention: The Key to Security, Growth and Innovation
sponsored by Forcepoint
WHITE PAPER: In this white paper, you will discover how Data Theft Prevention allows you to successfully embrace technological change and new opportunities.
Posted: 18 Jan 2016 | Published: 18 Jan 2016

Forcepoint

8 Data Threat Trends You Must Defend Against Immediately
sponsored by Forcepoint
RESOURCE: Cyber security now goes far beyond the essential everyday cost of doing business. But great advances invite great risk; find out what experts think you need to do to prepare for what lies ahead in 2016 in this expert resource.
Posted: 18 Jan 2016 | Published: 18 Jan 2016

Forcepoint

Six Steps to SIEM Success
sponsored by AlienVault
WEBCAST: Tune in for this webcast to learn 6 practical steps every IT admin should take before embarking on a SIEM deployment.
Posted: 18 Jan 2016 | Premiered: Jan 6, 2016

AlienVault

Surfacing Critical Cyber Threats Through Security Intelligence
sponsored by LogRhythm, Inc.
WEBCAST: In this webcast, experts will discuss today's rapidly evolving cyber threat landscape and offer solutions to detect incursions early so your company can respond quickly and avoid loss.
Posted: 18 Jan 2016 | Premiered: Mar 19, 2015

LogRhythm, Inc.

Malware Detection: How to Spot Infections Early with AlienVault USM
sponsored by AlienVault
WEBCAST: With so many complicated threats to manage your company needs a simplified solution. Unified security managements (USM) is a single platform for simplified, accelerated threat detection, incident response and policy compliance.
Posted: 18 Jan 2016 | Premiered: Dec 16, 2015

AlienVault

2016 Security Predictions eBook
sponsored by WatchGuard Technologies, Inc.
EBOOK: Examine the 10 cybersecurity predictions for 2016 to prepare yourself for the attacks that are coming.
Posted: 15 Jan 2016 | Published: 15 Dec 2015

WatchGuard Technologies, Inc.
126 - 150 of 1257 Matches Previous Page    4 5 6 7 8 9    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement