Business of Information Technology  >   Business Management  >   Best Practices  >  

Security Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Security Best Practices Reports
51 - 75 of 1599 Matches Previous Page  |  Next Page
IT Guide: Windows 10 Migration Minus The Complexity
sponsored by Druva Software
WHITE PAPER: With six steps, you can leverage endpoint data protection to help you ease into OS migration. Learn how to craft a migration plan that drastically simplifies the OS refresh process and provides comprehensive data protection and governance foundation for your organization.
Posted: 16 May 2016 | Published: 31 Dec 2015

Druva Software

Your Complete Guide to Office 365 Security
sponsored by Datto, Inc.
WHITE PAPER: Get an in-depth look at the security features that Microsoft has built into Office 365. Learn how stringent Office 365's security practices are and learn exactly what's being done to protect your valuable data, including O365 encryption, multi-factor authentication, and more.
Posted: 16 May 2016 | Published: 16 May 2016

Datto, Inc.

SOC Blog
sponsored by Citrix
RESOURCE: This report contains detailed information about the design and operation of shared file systems put in place to protect customer data. Access now to learn how you can provide greater customer security assurance.
Posted: 16 May 2016 | Published: 10 Mar 2016

Citrix

How ShareFile Works to Prevent Data Loss and Meet Compliance Requirements
sponsored by Citrix
RESOURCE: To prevent costly data leakage, data loss prevention tools must be integrated into your file sharing system. This will enable you to put restrictions on what information can leave your network giving you full visibility into your data's whereabouts. Learn more about content-aware sharing to better protect your organization.
Posted: 16 May 2016 | Published: 12 May 2015

Citrix

Practical Guide to IT Security Breach Prevention Part II
sponsored by Kaspersky Lab
EBOOK: With users connecting to unsecured public networks and social media platforms on both company-owned and personal devices, sensitive data can now be accessed--and lost--from more endpoints than ever before. Kaspersky Lab has created a set of IT & Data Security Breach Prevention Practical Guides to simplify this seemingly daunting task.
Posted: 16 May 2016 | Published: 01 Apr 2016

Kaspersky Lab

Barracuda NextGen Firewalls protect the ever-expanding operation ofGeorgia’s leading telecoms provider, Geocell
sponsored by Barracuda Networks
RESOURCE: Geocell chose a next-generation firewall that fit every criteria and beyond. Within only two months, business-critical apps were running smoothly and network management controls were centralized. Learn more about how Geocell's experiences could benefit your network.
Posted: 16 May 2016 | Published: 01 Apr 2016

Barracuda Networks

Security without Limits: Extending Enterprise-Grade Security from your Data Center to the Cloud
sponsored by Unisys
WHITE PAPER: Need the ability to quickly and securely shift workloads back forth between the data center and the cloud? Access this white paper and discover ways cryptographic micro-segmentation can seamlessly protect data center workloads against unauthorized access.
Posted: 16 May 2016 | Published: 16 May 2016

Unisys

Security and availability in extremely adverse environments
sponsored by Barracuda Networks
RESOURCE: Exalo Drilling chose a next-generation firewall to protect their growing infrastructure. The centralized management, application awareness and overall efficiency exceeded their expectations. Learn more about how their experience could benefit your organization's IT infrastructure.
Posted: 16 May 2016 | Published: 01 Apr 2016

Barracuda Networks

A Comprehensive, Innovative Approach to Cloud Security
sponsored by Unisys
WHITE PAPER: The use of roles -- rather than IP addresses -- significantly reduces the risk of configuration errors that leave your applications exposed to unauthorized users. Discover ways cloud security tools can mirror your on-premise application infrastructure with identical security policy definitions for both environments.
Posted: 16 May 2016 | Published: 16 May 2016

Unisys

Prevent Data Loss with Exabeam
sponsored by Exabeam
WHITE PAPER: User behavior analytics (UBA) provides the context needed to evaluate user behavior accurately and efficiently. It focuses on the user handling the data rather than the data itself. Learn how you can pair your DLP tools with UBA to best prevent data loss and exfiltration.
Posted: 16 May 2016 | Published: 01 Apr 2016

Exabeam

Are You Prepared for a HIPAA Audit? 7 Steps to Security Readiness
sponsored by Aventura
WHITE PAPER: If you are one of the selected entities for an Office for Civil Rights (OCR) HIPAA audit, will you be ready? Uncover 7 steps to ensure you're fully prepared for a HIPAA audit.
Posted: 16 May 2016 | Published: 16 May 2016

Aventura

Gartner Magic Quadrant for Enterprise Data Loss Prevention
sponsored by Intel Security
ANALYST BRIEF: This report gives you strengths and weaknesses from some of today's best (and worst) integrated data loss prevention (DLP) vendors to help you choose the right DLP solution aligned with your organization's particular security pain points.
Posted: 13 May 2016 | Published: 28 Jan 2016

Intel Security

Stop Data Exfiltration
sponsored by Intel Security
RESOURCE: Gain insight into hackers' motivations and understand which pieces of information are most valuable for them to steal (chances are they're the same ones most valuable to you). Go in depth into data exfiltration secrets to better understand the complexities of how a network is breached and robbed of personal, corporate, and customer information.
Posted: 13 May 2016 | Published: 01 Apr 2016

Intel Security

Why Traditional Data and Network Security is Not Good Enough
sponsored by Unisys
WHITE PAPER: Learn now about a security innovation that can eliminate the tradeoff between cost and risk, improve agility by strengthening data protection, and reduce reliance on physical technology infrastructure.
Posted: 13 May 2016 | Published: 13 May 2016

Unisys

Advanced Security through Micro-segmentation and Cryptographic Cloaking for Highly Sensitive Data, Networks, and Systems
sponsored by Unisys
WHITE PAPER: Traditional network security hardware and software are becoming less effective and increasingly susceptible to advanced threats. Discover a different approach to mitigating risks by securing data-in-motion across any public or private network.
Posted: 13 May 2016 | Published: 13 May 2016

Unisys

What’s the Problem? Overcoming 4 Key Challenges in Data Privacy
sponsored by Iron Mountain
WHITE PAPER: Learn the 4 key challenges in data privacy and how to overcome them. Data privacy must be protected on a continuous basis far beyond the requirements of passing compliance audits.
Posted: 13 May 2016 | Published: 01 Apr 2016

Iron Mountain

5-Step Guide For GDPR Compliance
sponsored by Druva Software
WHITE PAPER: This white paper shows you a 5-point plan to prepare your organization to meet the new needs of data protection regulations. Learn how to track the creation of new files on laptops and other mobile devices and automatically ensure that files containing customer data and PII are protected.
Posted: 13 May 2016 | Published: 01 Apr 2016

Druva Software

IT Guide: Protecting Corporate Data Beyond the Firewall
sponsored by Druva Software
WHITE PAPER: 24/7 data monitoring can ensure your important information stays on devices and on networks that you deem safe. Learn how to be proactive in your compliance requirements and stay on top of how your data is handled.
Posted: 13 May 2016 | Published: 01 Apr 2016

Druva Software

Flipping the Economics of Attacks
sponsored by Palo Alto Networks
RESEARCH CONTENT: Discover the results of this independent study of over 300 security experts on the topic of building a security plan with the bottom line in mind. You'll discover the most economical way to prevent your enterprise from falling victim to attack.
Posted: 13 May 2016 | Published: 29 Jan 2016

Palo Alto Networks

Symantec Data Loss Prevention for Cloud
sponsored by Symantec Corporation
DATA SHEET: Not only can you keep total visibility of your enterprise data, but also gain new capabilities to increase workflow. Access now to discover how data loss prevention can secure your cloud data and automate incident response processes and remediation.
Posted: 13 May 2016 | Published: 31 Dec 2015

Symantec Corporation

Everything You Need to Know About Crypto Management
sponsored by Gemalto
WHITE PAPER: Build a Crypto Foundation - a centralized approach to secure various types of data in various types of environments. Learn how to better manage your disparate islands of encrypted data to enable greater security enforcement and overall better efficiency.
Posted: 13 May 2016 | Published: 01 Apr 2016

Gemalto

Secur ing Productivity in the Border less Enterprise
sponsored by Microsoft
WHITE PAPER: The combination of cloud and mobility can allow for great employee productivity and greater customer responsiveness. However, these new business opportunities mean nothing if you can't protect against the new security challenges they bring.
Posted: 13 May 2016 | Published: 01 Apr 2016

Microsoft

Why a Modern Security Architecture Matters
sponsored by Palo Alto Networks
WHITE PAPER: Discover the benefits of an integrated, unified security architecture over the sequential, additive approaches that have evolved the industry. Understand the ability of security architectures to address modern threats while supporting the use of new applications.
Posted: 13 May 2016 | Published: 01 Apr 2016

Palo Alto Networks

Security and CDW- With Threats Detected, Your Business is Protected
sponsored by CDW
WHITE PAPER: Access this white paper for insights on how small businesses can more efficiently handle their security infrastructure. Even without an extensive IT staff, small businesses can deploy a robust, easy-to-manage security platform protecting your data and your reputation.
Posted: 13 May 2016 | Published: 01 Apr 2016

CDW

Internet Security Threat Report: Healthcare
sponsored by Symantec Corporation
EBOOK: This thorough 108-page threat report examines multiple facets of today's threat landscape including targeted attacks, smartphone threats, social media scams and IoT vulnerabilities to help you secure your healthcare system effectively now and into the future.
Posted: 12 May 2016 | Published: 01 Apr 2016

Symantec Corporation
51 - 75 of 1599 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement