Business of Information Technology  >   Business Management  >   Best Practices  >  

Security Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Security Best PracticesReports
26 - 50 of 1145 Matches Previous Page  | Next Page
Log Management—The Foundation for Federal Security and Compliance
sponsored by Intel Security
WHITE PAPER: This paper examines what US federal agencies and organizations should look for in log management strategy and integration into and support of applicable and prospective security and compliance programs and initiatives.
Posted: 10 Sep 2014 | Published: 31 Dec 2013

Intel Security

Need for Speed: Streamlining Response and Reaction to Attacks
sponsored by Intel Security
WHITE PAPER: This SANS white paper explores how to weave together and correlate information from disparately managed systems and bring visibility to their behavior with accurate, actionable reporting.
Posted: 10 Sep 2014 | Published: 31 May 2013

Intel Security

Needle in a Datastack: The Rise of Big Security Data
sponsored by Intel Security
WHITE PAPER: Big data holds many answers, but only if an organization has the capability to harness the ever growing amounts of security information. In deploying a SIEM solution to analyze this data, organizations can repel advanced threats in real-time as well as spot the stealthy, dormant threat.
Posted: 10 Sep 2014 | Published: 10 Sep 2014

Intel Security

Manage Security and Risk
sponsored by Intel Security
WHITE PAPER: Read how managing risk today means making sense of more data: vulnerability scans, application and database logs, flows, access and session records, alerts, and trending analysis.
Posted: 10 Sep 2014 | Published: 10 Sep 2014

Intel Security

DDoS Report: The Escalating Threat of DDoS Attacks
sponsored by A10 Networks
WHITE PAPER: If you are concerned about the possibility of major service outages due to DDoS attacks, you should ensure that your vendor can scale to mitigate the largest multi-vendor attacks at your network's edge. So where can you turn? Check out the following report to learn where now.
Posted: 10 Sep 2014 | Published: 10 Sep 2014

A10 Networks

Leverage Security Event Data to Improve Vulnerability Detection & Remediation
sponsored by Intel Security
WHITE PAPER: Learn how network attacks can be avoided by utilizing a SIEM platform that combines historical data with real-time data for better and more accurate reporting.
Posted: 09 Sep 2014 | Published: 31 Oct 2013

Intel Security

Citrix ShareFile Cloud for Healthcare: 10 Days to Facilitate HIPAA Compliance
sponsored by CloudPassage
WHITE PAPER: Check out this white paper to find out how one particular company utilized a virtual private cloud to support HIPAA compliance regulations.
Posted: 09 Sep 2014 | Published: 31 Mar 2014

CloudPassage

BYOD Simplified Into 10 Steps
sponsored by Citrix
WHITE PAPER: Access this white paper to find out how to successfully use a BYOD program in the workplace with 10 simple steps.
Posted: 08 Sep 2014 | Published: 24 Jun 2014

Citrix

2014 Security Report: How DDoS Attacks Can Mask More Dangerous Malware Threats
sponsored by Neustar®
RESOURCE: In this informative report, discover key findings on the top strategies and techniques for dealing with new DDoS attacks.
Posted: 08 Sep 2014 | Published: 08 Sep 2014

Neustar®

Streamline Your Federal Contingency Planning/COOP
sponsored by RSA, The Security Division of EMC
WEBCAST: Learn how to streamline your COOP with an automated and integrated solution. Understand the nuances of the terminology and align with best practices such as NIST 800-34. Align recovery efforts with organizational objectives and priorities.
Posted: 05 Sep 2014 | Premiered: Sep 5, 2014

RSA, The Security Division of EMC

It’s All About the App: Mobile Security That Helps Enable the Business
sponsored by CA Technologies.
WHITE PAPER: This white paper reveals why mobile application security is crucial element of your business.
Posted: 05 Sep 2014 | Published: 05 Sep 2014

CA Technologies.

PCI DSS Questions Answered: Solutions To Tough Compliance Problems
sponsored by Pwine Express
WHITE PAPER: In this expert Q&A, get expert answers to the compliance and security issues that are most affecting the payment card industry today.
Posted: 05 Sep 2014 | Published: 05 Sep 2014

Pwine Express

Top 7 Steps for Better DoS and DDoS Protection
sponsored by Solutionary
WHITE PAPER: In this essential white paper, discover the top 7 steps to help prevent these cyber-attacks and minimize their impact.
Posted: 04 Sep 2014 | Published: 04 Sep 2014

Solutionary

Mitigating Security Risks at the Network's Edge: Best Practices for Distributed Enterprises
sponsored by CradlePoint
WHITE PAPER: Access this white paper to discover the keys to preventing data breaches in distributed enterprises.
Posted: 04 Sep 2014 | Published: 04 Sep 2014

CradlePoint

Top 10 Reasons MDM is just a Fad
sponsored by IBM
WHITE PAPER: This white paper reveals the top 10 reasons you don't need a mobile device management (MDM) solution ... or do you?
Posted: 02 Sep 2014 | Published: 16 May 2014

IBM

The Next Generation of Data-Driven Security
sponsored by MapR Technologies
WHITE PAPER: In this in-depth white paper, get the facts on how new adaptive algorithms like Machine Learning and Big Data can identify security risks that other outdated techniques simply couldn't.
Posted: 02 Sep 2014 | Published: 30 Jun 2014

MapR Technologies

2014 Global Threat Intelligence Report
sponsored by Solutionary
RESOURCE: This critical report outlines today's most dangerous cyber threats and the key security strategies that will keep your organization protected.
Posted: 02 Sep 2014 | Published: 02 Sep 2014

Solutionary

e-Guide: Conquering Advanced Persistent Threat Attacks
sponsored by CDW Corporation
EGUIDE: This expert e-Guide clears up common misconceptions about the dangers and characteristics of advanced persistent threats (APTs), and also explains how context-aware security can improve the detection of APTs within enterprises.
Posted: 29 Aug 2014 | Published: 29 Aug 2014

CDW Corporation

App Security: Decompiling Android APK Files
sponsored by CDW Corporation
EGUIDE: In this informative e-guide, expert Andrew Hogg takes you through the steps of reverse-engineering Android applications for the purpose of scoping out security weaknesses.
Posted: 29 Aug 2014 | Published: 29 Aug 2014

CDW Corporation

Combatting Digital Fraud: A CIO Report
sponsored by RSA, The Security Division of EMC
WHITE PAPER: In this informative white paper, explore a web threat detection solution that leverages big data to enable security teams to better combat digital fraud.
Posted: 29 Aug 2014 | Published: 30 Jun 2014

RSA, The Security Division of EMC

Vendor Landscape: Intrusion Detection and Prevention Systems
sponsored by IBM
WHITE PAPER: This comprehensive resource compares 12 competitors in the Intrusion Detection and Prevention Systems (IDPS) market, providing a number of tools for comparing and evaluating each vendor's solution in order to determine the best fit for your enterprise's needs.
Posted: 28 Aug 2014 | Published: 31 Dec 2013

IBM

Online Brand Infringement: Where Do You Start?
sponsored by DomainTools
WHITE PAPER: In this informative white paper, discover a new brand monitoring solution that can quickly identify and notify you of any domain registration that possibly infringes on your brand.
Posted: 28 Aug 2014 | Published: 28 Aug 2014

DomainTools

Boost Advanced Persistent Threat Security Levels in 6 Steps
sponsored by CDW Corporation
EGUIDE: This e-guide contains expert suggestions for mitigating the dangerous threat presented by APTs.
Posted: 28 Aug 2014 | Published: 28 Aug 2014

CDW Corporation

Why and How You Should Use a VPN
sponsored by Global Knowledge
WHITE PAPER: This resource explains why VPNs are instrumental in eliminating the risk of public wired and wireless connections; how to use VPN at home and on the go; and how to choose a VPN provider.
Posted: 27 Aug 2014 | Published: 27 Aug 2014

Global Knowledge

Safety Through Synergy
sponsored by NEC Corporation of America
WHITE PAPER: Governments and city planners must be prepared for a wide variety of threats to public safety.  This makes IT Professionals realize just how important it really is to secure sensitive information.
Posted: 27 Aug 2014 | Published: 27 Aug 2014

NEC Corporation of America
26 - 50 of 1145 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement