Business of Information Technology  >   Business Management  >   Best Practices  >  

Security Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Security Best Practices Reports
126 - 150 of 1414 Matches Previous Page  |  Next Page
Dealing with Data Sovereignty in the Cloud Era
sponsored by VMware
WHITE PAPER: This white paper examines how you can gain back control of your data in the cloud era. Learn considerations for maintaining data sovereignty and security while future proofing your cloud strategy.
Posted: 24 Mar 2016 | Published: 24 Mar 2016

VMware

Protect Against Zero-Day Attacks at the Every Level
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: It's time to take threat defense to the next level and protect your organization. In this white paper, you'll uncover ways to combine OS-level sandboxing with threat prevention capabilities for integrated prevention and security management.
Posted: 24 Mar 2016 | Published: 24 Mar 2016

Check Point Software Technologies Ltd.

Understand How to Implement DLP that fits your Organization
sponsored by Digital Guardian
EGUIDE: This e-guide shows you different levels of DLP tools that you'll need depending on the size of your organization. Continue reading and make an assessment based on the four DLP categories: Knowing where your data is, understanding where it goes, knowing how it's used and educating employees and blocking unwanted activities.
Posted: 24 Mar 2016 | Published: 22 Mar 2016

Digital Guardian

Video: Advanced Endpoint Protection & Forensics
sponsored by Check Point Software Technologies Ltd.
VIDEO: This video invites you to uncover key strategies for continuously preventing even the most sophisticated attacks. Tune in and learn how to respond quickly to limit damages on endpoint devices.
Posted: 24 Mar 2016 | Premiered: 08 Feb 2016

Check Point Software Technologies Ltd.

Recognize Your Security Shortcomings and Address Them with Confidence
sponsored by Dell, Inc. and Intel®
EGUIDE: This white paper shows you the current state of data security among businesses of all sizes. Learn about the concerns adopting a cloud-based infrastructure raises and how to confidently secure your IT environment overall.
Posted: 24 Mar 2016 | Published: 21 Mar 2016

Dell, Inc. and Intel®

7 Key Questions to Ask When Selecting an Incident Response Service Provider
sponsored by Dell SecureWorks
WHITE PAPER: This white paper is designed to make you ask tough, direct questions of any incident response services provider to help you determine their capabilities.
Posted: 24 Mar 2016 | Published: 01 Feb 2016

Dell SecureWorks

4 Steps to Developing a Proactive Security Program
sponsored by Dell SecureWorks
WHITE PAPER: The harsh truth of security today is reactive strategies are outdated and it's time to switch gears to a proactive defense. This paper outlines the discrete layers and levels needed for a proactive security strategy. Inside, learn how to shift from a reactive to a proactive defense in 4 simple steps.
Posted: 24 Mar 2016 | Published: 02 Mar 2016

Dell SecureWorks

Securing mobile productivity for Microsoft Office 365
sponsored by IBM
WHITE PAPER: This white paper explains the importance of deploying and securing the Microsoft ecosystem across all mobile platforms, including Windows 10. Access now and start efficiently managing your enterprise productivity, connectivity and security in today's hostile mobile world.
Posted: 23 Mar 2016 | Published: 01 Feb 2016

IBM

Charting a New Course for IT Security with Coordinated Threat Defenses
sponsored by TrendMicro
WHITE PAPER: Access this white paper and find out how you can achieve fewer compromises, substantially shorter dwell times for threats that do manage to get through, and far less effort and expense required for incident response and to operate and maintain your security infrastructure.
Posted: 23 Mar 2016 | Published: 24 Feb 2016

TrendMicro

Setting the Stage: Landscape Shifts Dictate Future Threat Response Strategies
sponsored by TrendMicro
RESOURCE: A deeper threat landscape greeted 2016—a playing field shaped by the introduction of new technologies and attack models. Access this report to see 2016's threat landscape in review, and discover why you need to reconsider traditional methods of protecting your data and assets.
Posted: 23 Mar 2016 | Published: 23 Mar 2016

TrendMicro

10 Tips to Help You Minimize the Duration and Impact of a Security Breach
sponsored by Dell SecureWorks
WHITE PAPER: Uncover the top 10 things you should do to enhance the security of your enterprise and reduce the duration and impact of a security breach.
Posted: 23 Mar 2016 | Published: 02 Mar 2016

Dell SecureWorks

Webinar - Network security without compromise
sponsored by Aruba Networks
WEBCAST: In this webcast, you will learn how to enhance network security, enforcement and a better user experience.
Posted: 23 Mar 2016 | Premiered: Feb 1, 2016

Aruba Networks

Adaptive Mobile Protection: The need for user endpoint context
sponsored by Aruba Networks
WEBCAST: This webcast teaches you about the changing threat landscape and best practice you should implement for top notch mobile security.
Posted: 23 Mar 2016 | Premiered: Feb 1, 2016

Aruba Networks

CPU-level Sandboxing: Disrupt Threats, not Productivity
sponsored by Check Point Software Technologies Ltd.
VIDEO: In this video, you'll find different features that eliminate threats at the point of pre-infection. Tune in and uncover ways to provide a higher catch rate of threats and give your organization a new level of protection against attackers.
Posted: 23 Mar 2016 | Premiered: 19 Feb 2016

Check Point Software Technologies Ltd.

Determining the True Costs of a Data Breach
sponsored by Dell SecureWorks
WHITE PAPER: This white paper takes an in-depth look at the true costs of a data breach. Keep reading to learn steps and tips you may take to determine and reduce the cost of your next breach.
Posted: 23 Mar 2016 | Published: 01 Feb 2016

Dell SecureWorks

Data Governance: The True Key to Effective Risk Management
sponsored by Guidance Software, Inc.
EGUIDE: In this eguide, you will learn the real importance of information governance. It's much more than keeping track of digital records for compliance reasons. Discover how to build classification tools and functional descriptive data into our digital assets so they can be accessed for business with increased efficiency.
Posted: 22 Mar 2016 | Published: 18 Mar 2016

Guidance Software, Inc.

Definitive eGuide: Mobility and IoT cuasing IT headaches? Connect and protect with Adaptive Trust
sponsored by Aruba Networks
WHITE PAPER: This white paper outlines the pre-planning and deployment steps needed to help guide you on your journey of enterprise BYOD and IoT. Learn how greater visibility and the integration of your policy decision engine with third-party security solutions can enhance your ability to offer end-to-end mobile protection.
Posted: 22 Mar 2016 | Published: 01 Feb 2016

Aruba Networks

Make Security Part of Your Client Systems Refresh
sponsored by Dell, Inc. and Intel®
WHITE PAPER: To address security challenges while sufficiently supporting business processes and modern workflows, your secure data strategy should keep up. Uncover an approach that is designed to help your organization protect, comply, and enable.
Posted: 21 Mar 2016 | Published: 21 Mar 2016

Dell, Inc. and Intel®

CISO's Guide to the Top 7 IoT Risks
sponsored by ForeScout Technologies, Inc.
EGUIDE: As more devices connect to the internet, hackers raise their chances of successfully breaking into an organization. This e-guide gives CISOs defensive strategies to mitigate IoT driven attacks.
Posted: 21 Mar 2016 | Published: 09 Mar 2016

ForeScout Technologies, Inc.

Study Shows New Generation of IT Security Threats
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This report relays the importance of embracing both evolving workforce demands and more advanced, converged infrastructure. View now and learn how to prepare for the potential threats and vulnerabilities of BYOD and cloud technology, while increasing productivity and competitive advantage.
Posted: 18 Mar 2016 | Published: 18 Mar 2016

Dell, Inc. and Intel®

Protecting your Endpoints from Cyber-Crime
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This white paper discusses the increasingly sophisticated nature of today's modern threatscape. Discover secure, trusted strategies for significantly reducing the potential impacts of a threat, while keeping users productive and secure.
Posted: 18 Mar 2016 | Published: 18 Mar 2016

Dell, Inc. and Intel®

The New Network Security Front Line
sponsored by Ixia
WEBCAST: In this brief video, learn how to decrease your network's attack surface to minimize the number of threats that can potentially breach your defenses.
Posted: 18 Mar 2016 | Premiered: Jan 6, 2016

Ixia

Forget Network Defense - Focus on Offense
sponsored by Ixia
WHITE PAPER: This white paper explains why your network security strategy needs to include testing and training to make sure a product or service is protected before launch. Read on to learn more about an offensive security strategy and what it needs to contain.
Posted: 18 Mar 2016 | Published: 02 Mar 2016

Ixia

5 Tips for Managing Guest Wireless Network Access
sponsored by Rogers Communications, Inc.
EGUIDE: In this e-guide, you'll learn about 5 key considerations when setting up a network access policy for guests including, operational specifications, splash-page agreement and 3 more.
Posted: 18 Mar 2016 | Published: 15 Mar 2016

Rogers Communications, Inc.

Formulate a Game Plan for Closing the SecOps Gap
sponsored by BMC
WHITE PAPER: Access this report to discover why collaboration between security and operations (SecOps) will drive faster threat response, stronger security, and improved compliance in your organization. Take a closer look at the SecOps gap now, and learn the gravity of IT misalignment.
Posted: 18 Mar 2016 | Published: 18 Mar 2016

BMC
126 - 150 of 1414 Matches Previous Page    4 5 6 7 8 9    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement