Business of Information Technology  >   Business Management  >   Best Practices  >  

Security Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Security Best Practices Reports
26 - 50 of 1294 Matches Previous Page  |  Next Page
Steer Your Enterprise Towards Smooth Mobility
sponsored by SafeNet, Inc.
WHITE PAPER: This white paper weighs the benefits of securely adopting enterprise mobility and the potential roadblocks of doing so. Read on to learn more about secure enterprise mobility and its potential to impact every facet of your organization, from VPN to VDI.
Posted: 19 Aug 2015 | Published: 19 Aug 2015

SafeNet, Inc.

A Comprehensive Guide for Video Collaboration and UC Solutions
sponsored by Polycom, Inc.
WHITE PAPER: Access this Forrester report and learn more about a framework to examine your return on investment (ROI) by deploying several of these emerging unified communications (UC) technologies.
Posted: 19 Aug 2015 | Published: 31 Jan 2014

Polycom, Inc.

What You Need to Know Now About Next Generation Data Protection Architecture
sponsored by arcserve
WHITE PAPER: This white paper walks you through the driving forces behind rapidly evolving data protection architectures, the trends you'll want to keep an eye on, and more.
Posted: 19 Aug 2015 | Published: 19 Aug 2015

arcserve

Your Layered Security Defenses are Riddled with Holes… Here's what to do instead
sponsored by Malwarebytes Corporation
WEBCAST: In this webcast, security experts discuss the holes in the typical layered security approach and outline steps you can take to make your security program truly successful.
Posted: 19 Aug 2015 | Premiered: Jul 27, 2015


Understanding Zero-Day Attacks and Gaining Control
sponsored by Malwarebytes Corporation
PODCAST: This podcast discusses ways to mitigate zero-day vulnerabilities and to detect subtle zero-day attacks.
Posted: 19 Aug 2015 | Premiered: Jul 30, 2015


The Digital Revolution, Simplified: Reinventing Mobile App Development with the Cloud
sponsored by Oracle Corporation
WEBCAST: This webcast previews a platform for cloud-based, backend mobile services that makes app development quicker, secure and easier to deploy. Click here to access a strategy that offers rich mobile analytics, enabling enterprises to make smart business decisions.
Posted: 19 Aug 2015 | Premiered: Aug 19, 2015

Oracle Corporation

Cloud Service: Solving Your Data Security Concerns
sponsored by Splunk
PRODUCT OVERVIEW: In this product sheet, you'll explore how a private cloud platform hosted within Amazon Web Services (AWS) can enable you to safeguard your data through strict controls, as well as access real-time operational intelligence. Access this quick read to explore the security features.
Posted: 18 Aug 2015 | Published: 18 Aug 2015

Splunk

The State of Enterprise Mobile Threats
sponsored by Lookout
WHITE PAPER: This report examines the current state of security threats to iOS and Android devices in the workplace.
Posted: 18 Aug 2015 | Published: 18 Aug 2015

Lookout

Insider Threat Report 2015
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This survey of 500 cyber security professionals offers insight into the state of insider threats and solutions to prevent them.
Posted: 18 Aug 2015 | Published: 18 Aug 2015

ComputerWeekly.com

The State Of Data Security: 2014 Through 2015
sponsored by Digital Guardian
WHITE PAPER: In this webinar transcript, a Forrester researcher discusses the state of data security, how things have changed in the past year, and what can be done going forward.
Posted: 17 Aug 2015 | Published: 17 Aug 2015

Digital Guardian

SSL Decryption: Uncovering The New Infrastructure Blind Spot
sponsored by Gigamon
WHITE PAPER: This white paper makes the case for adopting SSL decryption to protect your enterprise.
Posted: 17 Aug 2015 | Published: 17 Aug 2015

Gigamon

Four Steps to a Proactive Big Data Security Strategy
sponsored by IBM
WHITE PAPER: This white paper introduces four essential steps to proactively securing all the data in your enterprise.
Posted: 17 Aug 2015 | Published: 30 Jun 2014

IBM

A Simple Guide to Successful Penetration Testing
sponsored by Core Security Technologies
WHITE PAPER: This white paper discusses the importance of penetration testing and presents six steps to doing it effectively.
Posted: 17 Aug 2015 | Published: 17 Aug 2015

Core Security Technologies

Enterprise MAM Takes Center Stage: The Next Chapter in Mobile Strategy
sponsored by Apperian, Inc.
WEBCAST: In this webcast, Gartner Research Director Chris Silva and Steven Wheat, Chief Information Technology Architect at Emory Healthcare, look at how organizations use mobile application management to securely deliver mobile apps. Tune in now to key into these can't-miss MAM strategies.
Posted: 17 Aug 2015 | Premiered: Aug 17, 2015

Apperian, Inc.

Data Protection Systems and Practices
sponsored by Oracle Corporation
EGUIDE: This expert guide can help you make sure your sensitive data stays secure. In it, you'll find articles addressing some essential techniques and common questions regarding data protection.
Posted: 17 Aug 2015 | Published: 17 Aug 2015

Oracle Corporation

Understanding Zero-Day Attacks and Gaining Control
sponsored by Malwarebytes Corporation
WEBCAST: This webcast discusses specific ways to address zero-day risks and fight exploit attempts.
Posted: 17 Aug 2015 | Premiered: Jul 31, 2015


Five Critical Questions You Should Be Asking SIEM Vendors
sponsored by Splunk
WHITE PAPER: This white paper examines one solution that provides agile threat response via a combination of pre-built data views and ad hoc analysis. Read on here to find out how to and cultivate the knowledge of your security practitioner by asking questions of potential vendors.
Posted: 17 Aug 2015 | Published: 17 Aug 2015

Splunk

Is Network Your Security More Like Eggshells or Diamonds?
sponsored by VMware
RESOURCE: This handy resource compares two popular network security approaches and outlines why focusing on perimeter defenses alone will end in a data breach. View now to learn how to protect your network from the perimeter to the data center.
Posted: 14 Aug 2015 | Published: 29 Jul 2015

VMware

Adapt Your Security to Today's Threats
sponsored by Digital Guardian
WHITE PAPER: This white paper discusses why changes in security strategies are necessary and how you can make these changes.
Posted: 14 Aug 2015 | Published: 14 Aug 2015

Digital Guardian

A Zero-Day Agnostic Approach to Defending Against Advanced Threats
sponsored by Digital Guardian
WHITE PAPER: This webinar transcript discusses how information security products have changed and why these changes are essential for tackling advanced threats.
Posted: 14 Aug 2015 | Published: 14 Aug 2015

Digital Guardian

Technology for Simplified SOC Creating
sponsored by Splunk
WHITE PAPER: This white paper discusses the importance of an SOC and gives suggestions for implementing technology that simplifies the process of SOC creation.
Posted: 14 Aug 2015 | Published: 31 Dec 2014

Splunk

State of Security Operations
sponsored by Hewlett-Packard Company
WHITE PAPER: With businesses recognizing the need for further investment in cyber-defense, it is essential to figure out which tools and strategies are best for your organization. Read now and find out more about the current state of security operations in 2014.
Posted: 14 Aug 2015 | Published: 31 Jan 2014

Hewlett-Packard Company

Mobile Data Security: Finding the Balance
sponsored by IBM
WHITE PAPER: This helpful white paper presents the steps every organization should take before committing to a mobile security solution, and examines the pros and cons of different potential security strategies.
Posted: 13 Aug 2015 | Published: 07 Aug 2014

IBM

Advanced Threat Detection and Response
sponsored by Splunk
WHITE PAPER: This white paper explains how to detect advanced threat activity from both the host and the network perspectives and advises on several solutions to combat these threats.
Posted: 13 Aug 2015 | Published: 13 Aug 2015

Splunk

Why Security is the Key to Unlocking the Full Value of the Mobile Workforce
sponsored by EE
WHITE PAPER: This white paper discusses why rethinking security is essential for boosting productivity in an increasingly mobile world.
Posted: 13 Aug 2015 | Published: 13 Aug 2015

EE
26 - 50 of 1294 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement