Business of Information Technology  >   Business Management  >   Best Practices  >  

Security Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Security Best Practices Reports
126 - 150 of 1894 Matches Previous Page  |  Next Page
Secure IoT As It Advances Through Maturity Phases
sponsored by Cloudera
WHITE PAPER: This analyst report analyzes the attributes of IoT risk by industry. The framework provided helps enterprise security and risk professionals predict when the products they build or the tools they use will likely become targets of attack.
Posted: 09 Nov 2016 | Published: 07 Jan 2016

Cloudera

New Data Classifications Vital to Information Governance and Security
sponsored by STEALTHbits
EGUIDE: In this e-guide, learn how 3 new data classifications are becoming vital to information governance and security.
Posted: 09 Nov 2016 | Published: 31 Oct 2016

STEALTHbits

Limelight DDoS Attack Interceptor
sponsored by Limelight Networks, Inc.
WHITE PAPER: Learn how to divert a DDoS attack and scrub the traffic before it ever reaches your enterprise. Learn how DDoS traffic can be identified, filtered, scrubbed off-site, and the passed back to your origin, all without compromising performance.
Posted: 09 Nov 2016 | Published: 09 Nov 2016

Limelight Networks, Inc.

Protect Medical Data and Prevent Ransomware Attacks in Healthcare
sponsored by VASCO, INC.
EGUIDE: Access this e-guide to discover how to fend off cybercriminals using a three-layered approach to healthcare data protection, and read insights from one hospital CIO on both preventing a ransomware attack and recovering from one.
Posted: 09 Nov 2016 | Published: 07 Nov 2016


6 Ways to Put 'Secure" Back in Secure Web Gateways
sponsored by Trustwave
WEBCAST: Recent research shows 33% of malware used encryption, underscoring the importance of having an advanced secure web gateway with the capability to inspect encrypted content. Discover practical steps your organization can take to optimize protection and policy control for your web users.
Posted: 09 Nov 2016 | Premiered: Oct 31, 2016

Trustwave

Protecting Smart Devices and Application Throughout the IoT Ecosystem
sponsored by PTC
WHITE PAPER: Discover new techniques and best practices for securing your network in today's hyper-connected environments. Following these best practices will make it possible to develop connected products that deliver real business value to your organization and its customers while protecting against intruders.
Posted: 09 Nov 2016 | Published: 31 Oct 2016

PTC

Best Practices for Securing Microsoft Azure Hybrid Clouds
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This white paper discusses the best practices for securing your Microsoft Azure Cloud environment. Learn how to provide uncompromising protection against even the most sophisticated cyberattacks now.
Posted: 09 Nov 2016 | Published: 31 May 2016

Check Point Software Technologies Ltd.

Why Your Business Needs Enterprise-Strength Password Management
sponsored by Keeper Security Inc
WHITE PAPER: Learn how your enterprise can ensure that not only the strength of the passwords your teams use are up to par, but that they are regularly changed out, the secrets behind supportive authentication processes, and more.
Posted: 08 Nov 2016 | Published: 08 Nov 2016

Keeper Security Inc

Best Practices to Securing the Cloud and SDDC
sponsored by Check Point Software Technologies Ltd.
WEBCAST: Join Jon Olstik, senior principal analyst at ESG, as he explores where the threat landscape has been, where it's going, and -- more importantly -- the tools and management strategies you need to address security gaps in your cloud infrastructure or SDDC.
Posted: 08 Nov 2016 | Premiered: Sep 30, 2016

Check Point Software Technologies Ltd.

The Path Ahead for Security Leaders
sponsored by Dell SecureWorks
WHITE PAPER: Learn how to link your identity to business value rather than limiting it to security expertise. By doing so, the security leaders of today can earn a strategic role on the executive teams of tomorrow.
Posted: 08 Nov 2016 | Published: 31 Oct 2016

Dell SecureWorks

Top Three Gaping Holes in Your Data Security
sponsored by Globalscape
WHITE PAPER: Regardless of efforts to secure your network from external threats, data breaches usually begin from inside. In this Globalscape paper, you'll learn: the 3 layers most targeted (the network, data & users), bad security practices, why Managed File Transfer is a critical component to combat bad practices, and more.
Posted: 08 Nov 2016 | Published: 08 Nov 2016

Globalscape

Genius Project Security Guide
sponsored by Cerri.com AG
WHITE PAPER: Discover the security features you should be looking for in project management software solution. It's important for your project management software to protect your data from attacks while ensuring the availability, integrity and confidentiality.
Posted: 08 Nov 2016 | Published: 31 Oct 2016

Cerri.com AG

Healthcare Security in an Internet of Things€™ World
sponsored by Xerox
RESOURCE: Is the Internet of Things becoming the Internet of Stings for healthcare organizations? Learn about today's threats against healthcare in the IoT era and discover innovative approaches to protecting your organization.
Posted: 08 Nov 2016 | Published: 07 Jan 2016

Xerox

Outthinking Cybercrime: Prepare for the Human Factor
sponsored by Trustwave
WEBCAST: Learn some of the key risks associated with defending modern IT infrastructures and see real-world scenarios where human influence is the weak link in security.
Posted: 08 Nov 2016 | Premiered: Oct 6, 2016

Trustwave

Cloud IAM Buyer's Guide: Which Vendor is Right for You?
sponsored by IBM
WHITE PAPER: Discover five simple questions you must ask of any potential Identity and Access Management as a Service (IDaaS) vendor to get a fresh look at your options. Learn how to score each vendor to easily compare their strengths and weaknesses.
Posted: 08 Nov 2016 | Published: 31 Oct 2016

IBM

Insider Security Threats: What CISOs Can Do to Mitigate Them
sponsored by Preempt Security
EGUIDE: Insider security threats will always exist, but there are steps you can take to limit their impact. Discover how to implement technical access control and authentication to ensure only the right eyes are consuming sensitive data.
Posted: 07 Nov 2016 | Published: 01 Nov 2016

Preempt Security

The New Generation of Network Security
sponsored by Juniper Networks, Inc.
WEBCAST: Learn the new strategy for network security amidst today's threat landscape. Discover how to create a malleable, proactive policy and implement it to keep your enterprise safe from modern malicious activity.
Posted: 07 Nov 2016 | Premiered: Nov 7, 2016

Juniper Networks, Inc.

Healthcare Data Privacy: 5 Basic Steps to Secure Your Patient Records
sponsored by Xerox
RESOURCE: Discover 5 basic steps to securing EHRs and enacting robust patient information protection. Additionally, get tips on re-thinking your cyber incident response plan to account for new and increasing forms of ransomware that attempt to attack and impact the reputation of your organization.
Posted: 07 Nov 2016 | Published: 05 Oct 2016

Xerox

Preventing PDF Exploits with Endpoint Security
sponsored by TrendMicro
VIDEO: See how endpoint security can fail when it comes to detecting malicious documents, particularly PDFs. Uncover a side-by-side comparison of endpoint security vendors as they attempt to deal with malicious documents.
Posted: 07 Nov 2016 | Premiered: 07 Nov 2016

TrendMicro

Is Managed Security Monitoring Right for Your Organization?
sponsored by IBM
WHITE PAPER: The effort it takes to keep a security monitoring platform up and running can often make the whole endeavor seem more of a hassle than it is worth. Access this white paper now to learn whether managed security monitoring is right for your organization, and how to find the best partner for you.
Posted: 07 Nov 2016 | Published: 25 Jul 2016

IBM

Securing the Private Cloud
sponsored by Fortinet, Inc.
WHITE PAPER: The demands on private cloud all too often leave operators in a position of favoring performance and agility over security. This white paper details how you can protect your private cloud environment by building security into the network that can accommodate powerful threat detection technologies while maximizing throughput and flexibility.
Posted: 07 Nov 2016 | Published: 28 Jul 2016

Fortinet, Inc.

Mitigating Security Risk from Partners, Affiliates and Suppliers
sponsored by Dell SecureWorks
WHITE PAPER: Discover tips and guidelines for managing a third party's security posture so that you can strengthen your own. Learn how to assess a third-party's potential risk carefully so you can mitigate the threat of data loss and financial ruin.
Posted: 07 Nov 2016 | Published: 31 Oct 2016

Dell SecureWorks

Effectively Manage Application Security Risk in the Cloud
sponsored by IBM
WHITE PAPER: Discover why application security is so important, why organizations struggle to achieve it and what effective application security looks like.
Posted: 07 Nov 2016 | Published: 31 Oct 2016

IBM

Modern Cybercrime: Staying Ahead of The Perfect Storm
sponsored by Trustwave
WEBCAST: Discover how to get ahead of today's cyber threats using simple steps and key strategies. The more you know the better equipped you are to detect and prevent cybercrime - and ultimately protect your business.
Posted: 07 Nov 2016 | Premiered: Jul 20, 2016

Trustwave

Next Level Threats: Stopping Ransom & CEO Email fraud
sponsored by Trustwave
WEBCAST: Ransomware and CEO email fraud cause organizations billions of dollars in losses annually. This webinar reveals valuable insight from researchers, security experts and industry leaders on how to prevent ransomware and CEO fraud.
Posted: 07 Nov 2016 | Premiered: Oct 19, 2016

Trustwave
126 - 150 of 1894 Matches Previous Page    4 5 6 7 8 9    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement