Business of Information Technology  >   Business Management  >   Best Practices  >  

Security Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Security Best Practices Reports
176 - 200 of 1272 Matches Previous Page  |  Next Page
Insider Threats: The Unexpected Risk
sponsored by Varonis
WHITE PAPER: This white paper reveals just how prevalent insider threats are and gives you advice on stopping them.
Posted: 26 Jun 2015 | Published: 26 Jun 2015

Varonis

The Peripheral You're Not Managing, and The Risk It Poses
sponsored by Nuance
WEBCAST: This webcast discusses the hidden security risk multi-function printers and other devices pose and gives advice for mitigating that risk.
Posted: 25 Jun 2015 | Premiered: Jun 9, 2015

Nuance

Cybercrime Readiness in Europe
sponsored by Hewlett-Packard Limited
WHITE PAPER: This report reveals the results of a survey assessing Europe's cybercrime readiness.
Posted: 25 Jun 2015 | Published: 25 Jun 2015

Hewlett-Packard Limited

How European Enterprises Are Preparing for Cybercrime
sponsored by Hewlett-Packard Limited
WHITE PAPER: This report reveals the results of a survey assessing Europe's cybercrime readiness.
Posted: 24 Jun 2015 | Published: 24 Jun 2015

Hewlett-Packard Limited

The Security Challenges of Digital Collaboration
sponsored by Varonis
WHITE PAPER: This white paper discusses the problem of universal access to sensitive data and gives suggestions for solving this problem without interfering with the business process.
Posted: 24 Jun 2015 | Published: 24 Jun 2015

Varonis

Strategy Considerations for Building a Security Operations Center
sponsored by IBM
WHITE PAPER: This white paper discusses the benefits of SOCs and gives essential advice on designing one that will work for you.
Posted: 24 Jun 2015 | Published: 31 Dec 2013

IBM

Protect Your Web Applications from the OWASP Top 10
sponsored by IBM
WHITE PAPER: Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
Posted: 22 Jun 2015 | Published: 31 Aug 2012

IBM

Corporate Data: A Protected Asset or a Ticking Time Bomb?
sponsored by Varonis
WHITE PAPER: Access this white paper for in-depth research into the growing risks and challenges to productivity that data growth and a lack of internal controls currently present for organizations of all sizes.
Posted: 19 Jun 2015 | Published: 31 Dec 2014

Varonis

Malware Defense and the Fundamentals of Endpoint Security
sponsored by Malwarebytes Corporation
EGUIDE: This e-guide contains expert advice on malware detection, endpoint security, and more.
Posted: 12 Jun 2015 | Published: 12 Jun 2015


Endpoint Security and Best Practices for Detecting Malware
sponsored by Malwarebytes Corporation
EGUIDE: In this e-guide, you can find essential tips for adapting your endpoint security to the mobile workforce, and for protecting against hidden malware.
Posted: 12 Jun 2015 | Published: 12 Jun 2015


How to Protect Data from Ransomware and Defend Against the Digital Invasion
sponsored by Malwarebytes Corporation
EGUIDE: This e-guide can help you stay ahead of new cyber-threat developments by telling you all you need to know about ransomware, new digital threats, and more.
Posted: 12 Jun 2015 | Published: 12 Jun 2015


Advanced Persistent Threat Detection and How to Prevent Drive-By Download Attacks
sponsored by Malwarebytes Corporation
EGUIDE: This e-guide explains what you can do to detect and stop even the most advanced threats.
Posted: 12 Jun 2015 | Published: 12 Jun 2015


IAM: Delivering Secure, New Business Services in a Multi-Channel Customer Environment
sponsored by CA Technologies.
WHITE PAPER: This white paper explores 13 requirements to leverage multi-channel IAM to convert customers and protect their sensitive data.
Posted: 11 Jun 2015 | Published: 04 Dec 2014

CA Technologies.

Customer Spotlight: Deploying a Data Protection Program In Less Than 120 Days
sponsored by Digital Guardian
WEBCAST: In this webcast, Mike Ring from Jabil discusses his company's experience deploying a data protection program from Digital Guardian in 120 days.
Posted: 09 Jun 2015 | Premiered: Nov 5, 2014

Digital Guardian

Security Audit Checklist
sponsored by Digital Guardian
RESOURCE: This checklist presents the 12 most common questions in a client data protection audit to get your organization ready to meet stringent partner or supplier data management requirements. Continue reading to assess your security strategy and prepare for an audit.
Posted: 09 Jun 2015 | Published: 29 Apr 2015

Digital Guardian

Managing and Securing Identities
sponsored by HID
EGUIDE: This expert e-guide presents a simple strategy to assess your IAM strength and offers 9 best practices for establishing effective IAM business rules
Posted: 09 Jun 2015 | Published: 06 May 2015

HID

Value of Security Analytics & Anomaly Detection
sponsored by Prelert
RESEARCH CONTENT: In this infographic you will find the results of an EMA research report, digested for easy consumption and action.
Posted: 04 Jun 2015 | Published: 04 Jun 2015

Prelert

Awareness and Protection Help Prevent Phishing and Spoofing in Email Marketing
sponsored by Neustar®
WHITE PAPER: Access this resource to see how to block fraudulent emails to your customers. Continue reading learn how to see who is sending emails from your organization and how to block emails coming from unauthorized users.
Posted: 02 Jun 2015 | Published: 02 Jun 2015

Neustar®

Think You are Safe from DDoS Attacks?
sponsored by Neustar®
WHITE PAPER: This white paper examines the repercussions of relying solely on firewalls and IPS/IDS to attempt blocking DDoS attacks. View now to learn the steps to take to protect sensitive data stored in the cloud.
Posted: 02 Jun 2015 | Published: 06 May 2015

Neustar®

4 Ways To Strengthen Your DNS Security
sponsored by Neustar®
WHITE PAPER: This white paper presents the four steps to strengthening DNS security to block today's constant dynamic attacks.
Posted: 02 Jun 2015 | Published: 27 May 2015

Neustar®

Why Patch Management Matters
sponsored by Solarwinds N-able
WHITE PAPER: This white paper explains why an effective MSP needs to offer patch management services and suggests best practices for doing so.
Posted: 02 Jun 2015 | Published: 02 Jun 2015

Solarwinds N-able

Untangling Work and Personal Data with Enterprise MAM
sponsored by SearchMobileComputing
EBOOK: This exclusive three-part guide explains how and why IT should use MAM to control applications from start to finish. Read on here to see how your business can securely enable successful enterprise mobility, and get an inside look at an MAM comparison: app wrapping versus containerization.
Posted: 01 Jun 2015 | Published: 01 Jun 2015

SearchMobileComputing

Breach Response: How to Prepare for the Inevitable
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper tells you what you need to know to be prepared for a major security breach.
Posted: 01 Jun 2015 | Published: 01 Jun 2015

Hewlett-Packard Company

Current DDoS Attack and Security Landscape
sponsored by Neustar®
RESOURCE: This white paper report outlines the state of DDoS attack trends and the defensive approaches organizations are using. View now to learn why traditional DDoS defenses are allowing hidden malware to sneak through and the new approaches to mitigate DDoS attacks.
Posted: 29 May 2015 | Published: 25 Mar 2015

Neustar®

The 5 Essential Functions of an Enterprise Security Operations Center
sponsored by IBM
WHITE PAPER: This infographic describes the five ways a dedicated security operations center can help you develop smarter and more efficient responses to threats.
Posted: 29 May 2015 | Published: 29 May 2015

IBM
176 - 200 of 1272 Matches Previous Page    6 7 8 9 10 11    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement