Business of Information Technology  >   Business Management  >   Best Practices  >  

Security Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Security Best Practices Reports
201 - 225 of 1200 Matches Previous Page  |  Next Page
Know the Big Three: Top three mobile application threats
sponsored by Hewlett-Packard Company
WHITE PAPER: This exclusive paper examines how to prevent sensitive data leakage over insecure channels or stolen devices. Read on to discover the top three threats to mobile applications and how to mitigate their potential impact.
Posted: 01 Feb 2015 | Published: 26 Aug 2014

Hewlett-Packard Company

SANS - Securing Web Applications Made Simple and Scalable
sponsored by Hewlett-Packard Company
ANALYST REPORT: This SANS report features an automated application security testing solution that identifies known vulnerabilities across multiple sources to keep your networks fully protected.
Posted: 01 Feb 2015 | Published: 30 Sep 2013

Hewlett-Packard Company

SANS - 2015 State of Application Security: Closing the Gap
sponsored by Hewlett-Packard Company
WHITE PAPER: This SANS report pinpoints where the vulnerability gaps lie in today's application security programs. Click through for key recommendations on how to address these issues.
Posted: 01 Feb 2015 | Published: 28 Feb 2014

Hewlett-Packard Company

A Guide to Improving Your Network Security in 30 Days
sponsored by Hewlett-Packard Company
WHITE PAPER: This resource highlights a NGFW solution combined with intrusion prevention to cure your network security issues.
Posted: 01 Feb 2015 | Published: 19 Aug 2014

Hewlett-Packard Company

HP Global 2000 Mobile Risk Report
sponsored by Hewlett-Packard Company
WHITE PAPER: Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.
Posted: 01 Feb 2015 | Published: 18 Aug 2014

Hewlett-Packard Company

Seven steps to software security
sponsored by Hewlett-Packard Company
WHITE PAPER: Learn seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Posted: 01 Feb 2015 | Published: 01 Sep 2013

Hewlett-Packard Company

Reducing Security Risks from Open Source Software
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper explores organizations' growing concerns over open source software. Read now to find out why open source should be on your radar, as well as the detrimental consequences and costs associated with it. Furthermore, you'll uncover 5 steps to obtaining peace of mind when it comes to open source software.
Posted: 01 Feb 2015 | Published: 01 Oct 2013

Hewlett-Packard Company

Global Report on the Cost of Cyber Crime
sponsored by Hewlett-Packard Company
WHITE PAPER: This up-to-date study shows just how much the costs of cybercrime has been rising, and what your business stands to lose if it's breached today.
Posted: 01 Feb 2015 | Published: 31 Oct 2014

Hewlett-Packard Company

Network Security Intelligence Selection Buying Guide
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper explains why network defense can make or break the success of an enterprise; and also introduces HP TippingPoint, a leader in security intelligence, as a potential solution.
Posted: 01 Feb 2015 | Published: 19 Nov 2014

Hewlett-Packard Company

Four steps to improving cloud security and compliance
sponsored by Dimension Data
WHITE PAPER: Access this white paper to find out why a collaborative partnership is the best approach to ensuring security and compliance. Explore four steps to take to improve security governance, risk management, and compliance in the cloud within your own organization.
Posted: 28 Jan 2015 | Published: 31 Dec 2014

Dimension Data

Learn How to Configure and Use a PKI In Your Network
sponsored by Global Knowledge
WHITE PAPER: This white paper investigates the practical use of the PKI and its configuration, as well as how the PKI can secure different types of servers.
Posted: 28 Jan 2015 | Published: 31 Dec 2014

Global Knowledge

Extend Compliance and Risk Management to What Really Matters For Your Business
sponsored by Absolute Software
ANALYST REPORT: Access this informative report to find out how the current focus of risk and compliance efforts is too narrow because many GRC programs largely ignore the risks that cause companies to fail. Discover how to impact performance by expanding the fundamentals of GRC to the aspects of the business that drive success with customer interactions.
Posted: 22 Jan 2015 | Published: 31 Dec 2014

Absolute Software

Is Your Printing/Imaging Environment As Safe As the Rest of Your Infrastructure?
sponsored by Hewlett-Packard Limited
WHITE PAPER: This white paper explains the importance of securing your printing and imaging environment, and introduces a streamlined, policy-based approach to securing these devices before a data breach occurs.
Posted: 22 Jan 2015 | Published: 31 Oct 2014

Hewlett-Packard Limited

The Enemy Within: Why Insiders Are Still the Weakest Link in Your Data Security Chain
sponsored by Absolute Software
WHITE PAPER: This white paper describes the 5 steps that your enterprise needs to take in order to foster a conscientious data security environment within your enterprise, despite the challenges of the digital era.
Posted: 21 Jan 2015 | Published: 29 Dec 2014

Absolute Software

A Quick Guide to SSL for Apps
sponsored by Symantec Corporation
WHITE PAPER: This white paper lists the steps that your enterprise needs to take in order to create a stronger, more trustworthy SSL implementation.
Posted: 20 Jan 2015 | Published: 28 Feb 2014

Symantec Corporation

SSL for Apps: Best Practices for Developers
sponsored by Symantec Corporation
WHITE PAPER: This white paper lists the necessary steps that your enterprise needs to take in order to create a stronger, more trustworthy SSL implementation.
Posted: 20 Jan 2015 | Published: 31 Oct 2013

Symantec Corporation

Securing the Future of Trust on the Internet
sponsored by Symantec Corporation
WHITE PAPER: This white paper explains why public key infrastructure (PKI) is the key to the future of trust on the Internet, and the steps that must be taken to build a stronger, more trustworthy PKI ecosystem.
Posted: 20 Jan 2015 | Published: 28 Feb 2014

Symantec Corporation

Spoofing Server-Server Communication: How You Can Prevent It
sponsored by Symantec Corporation
WHITE PAPER: In this must-read white paper, you'll learn how to prevent the new SSL Strip threat that could compromise your secure applications.
Posted: 19 Jan 2015 | Published: 31 Oct 2013

Symantec Corporation

Why IT Leaders Should Take Strategic Action in Mobile and Endpoint Computing in 2015
sponsored by Absolute Software
WHITE PAPER: This white paper explains why enterprises should develop a broader-based, long-term endpoint strategy that connects to business goals, processes, and practices.
Posted: 19 Jan 2015 | Published: 25 Apr 2014

Absolute Software

Protecting This House: IT's Role in Cloud Security
sponsored by SearchCloudComputing.com
EBOOK: Having a clear-cut cloud governance strategy helps ease administrative issues for IT and allows organizations to proactively protect their data.
Posted: 15 Jan 2015 | Published: 15 Jan 2015

SearchCloudComputing.com

Protecting Users from Firesheep and other Sidejacking Attacks with SSL
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses the Firesheep Wi-Fi attack tool and other sidejacking attacks with SSL and explains how to avoid these attacks.
Posted: 15 Jan 2015 | Published: 28 Feb 2014

Symantec Corporation

How Extended Validation SSL Brings Confidence to Online Sales and Transactions
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses the importance of increasing customer confidence in the security of online business transactions, and introduces Symantec Extended Validation SSL Certificates as a potential solution to this challenge.
Posted: 15 Jan 2015 | Published: 31 Oct 2013

Symantec Corporation

Why Every CIO Should Consider Vulnerability Assessment a Necessity
sponsored by IBM
WHITE PAPER: In this resource, CIOs will learn why vulnerability assessment is so essential to enterprise security, and can discover a leading vulnerability assessment platform that scans targeted systems on a scheduled basis in order to increase your understanding of your organization's overall security posture.
Posted: 03 Feb 2015 | Published: 30 Apr 2014

IBM

Mobile Cloud Security: What CXOs Need to Know
sponsored by Cisco Systems, Inc.
WHITE PAPER: This blog post discusses the need for end-to-end security in a mobile cloud environment.
Posted: 29 Jan 2015 | Published: 29 Jan 2015

Cisco Systems, Inc.

Cloud Security: Enterprise Point of View
sponsored by Dimension Data
VIRTUAL SEMINAR: Access this webcast today to listen as Darren O'Loughlin, CSO for Dimension Data's global business enabling IT as a Service, shares strategic objectives for securing applications and workloads on an enterprise-class cloud.
Posted: 29 Jan 2015 | Premiered: 26 Nov 2014

Dimension Data
201 - 225 of 1200 Matches Previous Page    7 8 9 10 11 12    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement