Business of Information Technology  >   Business Management  >   Best Practices  >  

Security Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Security Best Practices Reports
26 - 50 of 1791 Matches Previous Page  |  Next Page
Why You Need an Automated Approach to Cloud Security and Compliance
sponsored by evident.io
WHITE PAPER: Learn how to embrace a continuous security model, making your organization able to automate many processes that would normally overwhelm your teams and systems if they had to be done manually.
Posted: 22 May 2017 | Published: 22 May 2017

evident.io

Detecting "WannaCry" Ransomware
sponsored by AlienVault
WHITE PAPER: Discover how the recent "WannaCry" ransomware attacks function, what to update to avoid it, how to scan your environment for the vulnerability it exploited, and more.
Posted: 22 May 2017 | Published: 22 May 2017

AlienVault

Out of Order! The Risks of Being Out of Compliance
sponsored by Globalscape
WHITE PAPER: Discover common regulations and how compliance risks evolved across the enterprise, the top 6 consequences of failing to comply with industry or government regulations, and the role of data management in helping facilitate or maintain compliance.
Posted: 22 May 2017 | Published: 22 May 2017

Globalscape

Cyber Security in the Era of Industrial IoT
sponsored by Bayshore Networks
EGUIDE: Discover how to define, identify, and contextualize security needs in a connected enterprise as IoT becomes a more pervasive and important facet of today's business.
Posted: 22 May 2017 | Published: 22 May 2017

Bayshore Networks

Modern DLP: A case study
sponsored by InteliSecure
CASE STUDY: Discover how a well-known cancer research and treatment center deployed a proven, successful process for implementing and leveraging DLP.
Posted: 22 May 2017 | Published: 22 May 2017

InteliSecure

The 6 Essential Capabilities of an Analytics-Driven SIEM
sponsored by Splunk
WHITE PAPER: Collecting and analyzing security data is no longer enough, today's business needs to be able to use a security event management (SIEM) platform to derive actionable intelligence from this information. Read this white paper to learn the 6 capabilities every SIEM needs to succeed.
Posted: 19 May 2017 | Published: 19 May 2017

Splunk

When It Comes to Cloud Security, What You Don't Know Can Hurt You
sponsored by evident.io
WHITE PAPER: Access this resource now to learn how to secure your cloud services and get a big-picture view across all of your cloud environments, lower costs, and more.
Posted: 18 May 2017 | Published: 18 May 2017

evident.io

Data Protection: Not Just About Personal Data and Compliance
sponsored by Arrow + NetApp
EGUIDE: Despite the focus on data protection, many organizations are still leaving their data wide open for attack. Access this e-guide now to learn if a cloud-based data storage and protection strategy works and is right for you.
Posted: 18 May 2017 | Published: 18 May 2017

Arrow + NetApp

10 Questions You Should Ask Any MSSP
sponsored by InteliSecure
WHITE PAPER: Learn the 10 questions that you should be asking of any MSSP and ensure that your enterprise is setting itself up for future success.
Posted: 18 May 2017 | Published: 18 May 2017

InteliSecure

Choosing an Optimal Solution for DDoS Protection
sponsored by Radware
WHITE PAPER: Discover which cloud-based DDoS protection could work best for your organization, including on-premise, on-demand, always-on, and hybrid cloud options.
Posted: 17 May 2017 | Published: 17 May 2017

Radware

How to Deliver Comprehensive, End-to-End Mobile Security
sponsored by Citrix
WHITE PAPER: Learn how EMM could be your key to managing personal devices in a corporate setting at scale – without impacting user experience, and without inflating costs or introducing security risks.
Posted: 17 May 2017 | Published: 17 May 2017

Citrix

Ransomware: 4 Ways to Protect Data Now
sponsored by Citrix
WHITE PAPER: Discover recommendations towards a multilayered approach designed to reduce exposure to ransomware attacks, as well as to recover encrypted data more quickly and effectively. Access now for the 4 key steps to kidnap-proof your data.
Posted: 17 May 2017 | Published: 17 May 2017

Citrix

The Current State of Email Security
sponsored by Microsoft
WHITE PAPER: Explore email security threats' most common delivery methods and ID their risks to your organization. Also uncover effective remedies to both internal and external threats and how to implement them.
Posted: 17 May 2017 | Published: 17 May 2017

Microsoft

Cloud DDoS Protection Service – Protecting AWS-Hosted Applications
sponsored by Radware
WHITE PAPER: Discover how to deploy real-time cloud app threat mitigation with high accuracy, an attack lifecycle management timeline, and more.
Posted: 16 May 2017 | Published: 16 May 2017

Radware

How to Effectively Manage the Cloud Logs of Security Events
sponsored by Splunk
EGUIDE: Discover the security growing pains created by the growth of cloud file sharing and collaboration services and how they are presenting new problems including "shadow cloud" and alert fatigue.
Posted: 16 May 2017 | Published: 11 May 2017

Splunk

Your Endpoint Essentials Checklist
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Discover a comprehensive checklist to ensure that your endpoints have essential features to protect your enterprise from ransomware and other malicious activities.
Posted: 16 May 2017 | Published: 16 May 2017

Symantec & Blue Coat Systems

Global Study on Compliance Challenges & Security Effectiveness
sponsored by Citrix
RESEARCH CONTENT: In this Ponemon Institute research report, discover the risks created by compliance with regulations, especially compliance with the EU's General Data Protection Regulations (GDPR).
Posted: 16 May 2017 | Published: 31 Mar 2017

Citrix

2016 Mobile Security & Business Transformation Study
sponsored by IBM
RESEARCH CONTENT: In this research report, learn how mobile adoption grew and changed in 2016, and how this information can help you secure your apps and devices in the years to come.
Posted: 16 May 2017 | Published: 16 May 2017

IBM

The Need for a New IT Security Architecture: Global Study
sponsored by Citrix
RESEARCH CONTENT: In this Ponemon Institute report, discover an analysis of the risks created by cybercrime, employee negligence, and organizational dysfunctions. Uncover the tech your peers believe are most effective at dealing with these risks.
Posted: 15 May 2017 | Published: 15 May 2017

Citrix

Global Study on the Risk of Outdated Technologies
sponsored by Citrix
WHITE PAPER: Discover global trends in IT security risks and reasons why security practices and policies need to evolve to deal with threats from disruptive technologies, insider risk and compliance.
Posted: 15 May 2017 | Published: 28 Feb 2017

Citrix

Unified Communication: β€œIt should work as easily as a telephone call!”
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security series explains the security implications of unified communication.
Posted: 15 May 2017 | Published: 15 May 2017

ComputerWeekly.com

How to Secure Office 365 from Advanced Attacks
sponsored by Microsoft
EGUIDE: This e-guide details how to protect Office 365 from phishing attempts, defend end users from malicious sites, and more.
Posted: 12 May 2017 | Published: 12 May 2017

Microsoft

Digital Transformation and Network Security
sponsored by Forcepoint
RESEARCH CONTENT: In this ESG white paper, learn how digital transformation is changing the security landscape, and how pros are adapting to meet these new challenges.
Posted: 11 May 2017 | Published: 31 Jan 2017

Forcepoint

How Technology helps with the reporting burden-KPMG
sponsored by Tagetik Software
WHITE PAPER: Discover how to maximize your CFO's greatest opportunities to contribute to or impact the value of the organization by leveraging EPM.
Posted: 11 May 2017 | Published: 11 May 2017

Tagetik Software

What to Know About SIEM as a Service Before Deployment
sponsored by Splunk
EGUIDE: Access this expert e-guide to learn what would justify a product carrying the "SIEM as a service" label and what characteristics they bear that have contributed to the rising interest in them over the last few years.
Posted: 11 May 2017 | Published: 09 May 2017

Splunk
26 - 50 of 1791 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement