Business of Information Technology  >   Business Management  >   Best Practices  >  

Security Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Security Best Practices Reports
26 - 50 of 1218 Matches Previous Page  |  Next Page
Systems and Tips for Improving Enterprise Email Security
sponsored by Rackspace
EGUIDE: In order to protect on-premises email systems, your organization needs to bring network security strategies up to speed. This expert e-guide provides several practical tips to improve enterprise email security.
Posted: 23 Jun 2015 | Published: 18 Jun 2015

Rackspace

Protect Your Exchange Server with a Simple Update
sponsored by Rackspace
EGUIDE: This expert e-guide takes a look at why it's important to keep on top of Exchange security update installation. Access this exclusive resource now to learn how hackers get around the basic security measures present and how easy it is to become a data breach victim if you ignore security updates and patches.
Posted: 23 Jun 2015 | Published: 17 Jun 2015

Rackspace

Hosted Exchange Security Questions You Should Be Asking
sponsored by Rackspace
EGUIDE: This expert e-guide presents the 6 questions you need to ask vendors about hosted Exchange environment security.
Posted: 22 Jun 2015 | Published: 17 Jun 2015

Rackspace

Protect Your Web Applications from the OWASP Top 10
sponsored by IBM
WHITE PAPER: Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
Posted: 22 Jun 2015 | Published: 31 Aug 2012

IBM

Corporate Data: A Protected Asset or a Ticking Time Bomb?
sponsored by Varonis
WHITE PAPER: Access this white paper for in-depth research into the growing risks and challenges to productivity that data growth and a lack of internal controls currently present for organizations of all sizes.
Posted: 19 Jun 2015 | Published: 31 Dec 2014

Varonis

Malware Defense and the Fundamentals of Endpoint Security
sponsored by Malwarebytes Corporation
EGUIDE: This e-guide contains expert advice on malware detection, endpoint security, and more.
Posted: 12 Jun 2015 | Published: 12 Jun 2015


Endpoint Security and Best Practices for Detecting Malware
sponsored by Malwarebytes Corporation
EGUIDE: In this e-guide, you can find essential tips for adapting your endpoint security to the mobile workforce, and for protecting against hidden malware.
Posted: 12 Jun 2015 | Published: 12 Jun 2015


How to Protect Data from Ransomware and Defend Against the Digital Invasion
sponsored by Malwarebytes Corporation
EGUIDE: This e-guide can help you stay ahead of new cyber-threat developments by telling you all you need to know about ransomware, new digital threats, and more.
Posted: 12 Jun 2015 | Published: 12 Jun 2015


Advanced Persistent Threat Detection and How to Prevent Drive-By Download Attacks
sponsored by Malwarebytes Corporation
EGUIDE: This e-guide explains what you can do to detect and stop even the most advanced threats.
Posted: 12 Jun 2015 | Published: 12 Jun 2015


Data Security Research Report: Understanding Risks and Impacts on Customer Behavior
sponsored by Honeywell
WHITE PAPER: This report reveals just how heavily the threat of cybercrime weighs on consumers, and what they're doing as a result of it. Read on to discover what growing cybercrime means for your business, and how you can pacify consumer concerns.
Posted: 12 Jun 2015 | Published: 31 Dec 2014

Honeywell

IAM: Delivering Secure, New Business Services in a Multi-Channel Customer Environment
sponsored by CA Technologies.
WHITE PAPER: This white paper explores 13 requirements to leverage multi-channel IAM to convert customers and protect their sensitive data.
Posted: 11 Jun 2015 | Published: 04 Dec 2014

CA Technologies.

Customer Spotlight: Deploying a Data Protection Program In Less Than 120 Days
sponsored by Digital Guardian
WEBCAST: In this webcast, Mike Ring from Jabil discusses his company's experience deploying a data protection program from Digital Guardian in 120 days.
Posted: 09 Jun 2015 | Premiered: Nov 5, 2014

Digital Guardian

Security Audit Checklist
sponsored by Digital Guardian
RESOURCE: This checklist presents the 12 most common questions in a client data protection audit to get your organization ready to meet stringent partner or supplier data management requirements. Continue reading to assess your security strategy and prepare for an audit.
Posted: 09 Jun 2015 | Published: 29 Apr 2015

Digital Guardian

Managing and Securing Identities
sponsored by HID
EGUIDE: This expert e-guide presents a simple strategy to assess your IAM strength and offers 9 best practices for establishing effective IAM business rules
Posted: 09 Jun 2015 | Published: 06 May 2015

HID

Securely Leveraging Internet of Things Data
sponsored by Aruba Networks
WHITE PAPER: This white paper explores how to build a trust-based IoT web for business-critical applications using a new methodology. Continue reading to learn how to exploit IoT data without incurring unacceptable levels of risk.
Posted: 08 Jun 2015 | Published: 06 May 2015

Aruba Networks

The Importance of Multi-Layered Web Security
sponsored by Melbourne IT
WHITE PAPER: The following white paper examines the importance of having a multi-layered Web security approach in today's quickly evolving online market. Access now and uncover what you can do to ensure your Web security strategy is as effective and adaptive as it should be.
Posted: 08 Jun 2015 | Published: 08 Jun 2015

Melbourne IT

Meeting PCI and ISO Compliance Checklist
sponsored by Melbourne IT
WHITE PAPER: The following white paper provides a checklist for meeting PCI and ISO compliance. Access now and discover what it takes to keep the cyber criminals at bay when it comes to your client's credit card information.
Posted: 08 Jun 2015 | Published: 08 Jun 2015

Melbourne IT

The Evolving Role Of Cloud Security: Understanding Why A New Approach Is Needed
sponsored by Cloud Sherpas
WHITE PAPER: The way forward will lead the security industry of tomorrow in one of two very different directions: The top-down approach of IT pushing back against user autonomy, or the opposite approach, where empowerment and user agency are balanced by behavior analytics and risk measurement policy.
Posted: 08 Jun 2015 | Published: 20 May 2015

Cloud Sherpas

Value of Security Analytics & Anomaly Detection
sponsored by Prelert
RESEARCH CONTENT: In this infographic you will find the results of an EMA research report, digested for easy consumption and action.
Posted: 04 Jun 2015 | Published: 04 Jun 2015

Prelert

Unified Mobile Device, App and Data Security
sponsored by Pulse Secure
WHITE PAPER: Access this white paper to learn how you can implement a solution that unifies mobile app and network security technologies, eliminating headaches for IT departments.
Posted: 04 Jun 2015 | Published: 02 Oct 2014

Pulse Secure

A strong information security program is a competitive gain, not just a cost
sponsored by Hewlett-Packard Company
EGUIDE: This e-guide discusses why good cybersecurity can win you more customers and gives you tips for getting the most return on your security investments.
Posted: 03 Jun 2015 | Published: 03 Jun 2015

Hewlett-Packard Company

Awareness and Protection Help Prevent Phishing and Spoofing in Email Marketing
sponsored by Neustar®
WHITE PAPER: Access this resource to see how to block fraudulent emails to your customers. Continue reading learn how to see who is sending emails from your organization and how to block emails coming from unauthorized users.
Posted: 02 Jun 2015 | Published: 02 Jun 2015

Neustar®

Think You are Safe from DDoS Attacks?
sponsored by Neustar®
WHITE PAPER: This white paper examines the repercussions of relying solely on firewalls and IPS/IDS to attempt blocking DDoS attacks. View now to learn the steps to take to protect sensitive data stored in the cloud.
Posted: 02 Jun 2015 | Published: 06 May 2015

Neustar®

4 Ways To Strengthen Your DNS Security
sponsored by Neustar®
WHITE PAPER: This white paper presents the four steps to strengthening DNS security to block today's constant dynamic attacks.
Posted: 02 Jun 2015 | Published: 27 May 2015

Neustar®

Why Patch Management Matters
sponsored by Solarwinds N-able
WHITE PAPER: This white paper explains why an effective MSP needs to offer patch management services and suggests best practices for doing so.
Posted: 02 Jun 2015 | Published: 02 Jun 2015

Solarwinds N-able
26 - 50 of 1218 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement