Business of Information Technology  >   Business Management  >   Best Practices  >  

Security Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Security Best Practices Reports
51 - 75 of 1299 Matches Previous Page  |  Next Page
Best Practices for Threat & Vulnerability Management
sponsored by Core Security Technologies
WHITE PAPER: This white paper discusses what you can do to adapt your vulnerability management to the modern threat landscape.
Posted: 13 Aug 2015 | Published: 13 Aug 2015

Core Security Technologies

Gain the Competitive Edge with Streamlined Big Data Analytics
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This business-oriented white paper summarizes the wide-ranging benefits of the Hadoop platform across diverse industries, from healthcare and retail to telecommunications, highlighting common data processing use cases and exploring examples of specific use cases. Read on to find out more.
Posted: 13 Aug 2015 | Published: 13 Aug 2015

Dell, Inc. and Intel®

Manufacturing Goes Mobile: Highlights in MDM and Application Security
sponsored by IBM
WHITE PAPER: This white paper surveys the use of mobile device management (MDM) in the manufacturing industry. Read on to learn how you can leverage MDM to improve operational efficiency and bottom-line benefits.
Posted: 12 Aug 2015 | Published: 31 Dec 2014

IBM

Mobile Enterprise Apps: Expert Tips to Eliminate Top Security Risks
sponsored by IBM
WHITE PAPER: In this white paper, learn the key security dangers of mobile apps in the enterprise and discover expert tips on how to eliminate them in your app-driven business.
Posted: 12 Aug 2015 | Published: 12 Aug 2015

IBM

Big Data SIEM on the Horizon
sponsored by Splunk
WHITE PAPER: In this white paper, you will learn the three SIEM trends that call for a big data SIEM approach as well as the limitations of traditional SIEM strategies.
Posted: 12 Aug 2015 | Published: 05 Aug 2015

Splunk

The Productivity Transformation: Secure Content Collaboration on the Go
sponsored by IBM
WHITE PAPER: This white paper discusses the dangers of mobile content sharing and gives advice on what you can do to make it secure.
Posted: 12 Aug 2015 | Published: 15 Jul 2015

IBM

Make Android Work for Your Enterprise: Expert Tips for EMM Strategy
sponsored by IBM
WHITE PAPER: In this white paper, you'll discover best practices for using enterprise mobility management (EMM) securely on both corporate and employee-owned Android devices. Read on to learn how to make Android work for your enterprise.
Posted: 12 Aug 2015 | Published: 12 Aug 2015

IBM

Five Signs You Have Been – Or Are Being – Hacked
sponsored by EE
WHITE PAPER: This white paper can help you stay alert for advanced threats with five signs that your organization has been hacked
Posted: 12 Aug 2015 | Published: 12 Aug 2015

EE

Threat intelligence sharing and the government's role
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This survey for Alien Vault paints a picture of how threat intelligence is obtained, utilised and shared, and seeks out views as to the role the government and law enforcement has to play to help better protect enterprises from threats.
Posted: 12 Aug 2015 | Published: 12 Aug 2015

ComputerWeekly.com

Healthcare's Now in the Cloud with MDM
sponsored by IBM
WHITE PAPER: This white paper outlines the risks associated with incorporating MDM in hospital environments, and examines an MDM solution specific unto healthcare organizations.
Posted: 11 Aug 2015 | Published: 11 Aug 2015

IBM

3 Guidelines to Establishing Your Code Confidence
sponsored by Rogue Wave Software
WEBCAST: Navigating the day-to-day issues of automotive software development can be overwhelming, but with little effort it can be easily managed. This webinar will explore how to deliver secure, compliant, and defect-free software.
Posted: 11 Aug 2015 | Premiered: Aug 11, 2015

Rogue Wave Software

The 3 Steps to Protect Your Software Apps from Failure and Attack
sponsored by Rogue Wave Software
WHITE PAPER: This white paper outlines three important steps that software development teams can follow to identify critical coding errors and security vulnerabilities, and protect software against failure and malicious attacks.
Posted: 11 Aug 2015 | Published: 31 Dec 2014

Rogue Wave Software

Data Breaches: What Can and Cannot Be Done
sponsored by Global Knowledge
WHITE PAPER: This white paper discusses the inevitability of data breaches and gives tips for staying as secure as possible in an insecure threat environment.
Posted: 11 Aug 2015 | Published: 11 Aug 2015

Global Knowledge

"Appifying" the Enterprise Mobility Landscape
sponsored by StarMobile
WEBCAST: In this webcast, Brian Katz talks with Todd Fryburger, CEO of StarMobile, about "Appifying" your enterprise with a codeless, cloud-based solution, which transforms existing enterprise sources and legacy systems into mobile apps with a native user experience.
Posted: 10 Aug 2015 | Premiered: Aug 3, 2015

StarMobile

Mobilize Your Virtual Enterprise Applications with 4 Steps
sponsored by StarMobile
WHITE PAPER: Learn how next-generation remote computing protocols accelerate your company's application mobilization and improve user experience. Continue reading to access advice on implementing successful enterprise mobilization.
Posted: 07 Aug 2015 | Published: 07 Aug 2015

StarMobile

5 Tips to Get Your Site Hosting Started
sponsored by Hostway Corporation
WHITE PAPER: Are you considering website hosting? This white paper serves as an end-to-end guide in doing so. Click here to see why web hosting (and email) should be part of your market offering.
Posted: 07 Aug 2015 | Published: 07 Aug 2015

Hostway Corporation

EEMM Strategy and Vendor Comparison: Who Makes the Grade?
sponsored by IBM
WHITE PAPER: Access this white paper to examine EMM and MDM vendors, and determine which products are most appropriate your enterprise needs.
Posted: 07 Aug 2015 | Published: 07 Aug 2015

IBM

Secure by Design: Balancing Security with Employee Productivity
sponsored by Citrix
WHITE PAPER: This white paper explores an app virtualization solution that addresses today's growing IT security challenges while giving users fast, simple, and flexible remote access.
Posted: 06 Aug 2015 | Published: 06 Aug 2015

Citrix

Top 10 Data Security Tips to Safeguard Your Business
sponsored by Absolute
WHITE PAPER: This white paper describes ten steps you can take to increase your cybersecurity.
Posted: 06 Aug 2015 | Published: 06 Aug 2015

Absolute

Cloud Computing Solutions to App Delivery Issues
sponsored by Red Hat
WHITE PAPER: This white paper highlights one PaaS solution in particular, complete with automation technologies built on secure cloud architecture. Read on to learn how PaaS could make life easier for your application developers, IT operations staff, enterprise architects, and more.
Posted: 06 Aug 2015 | Published: 06 Aug 2015

Red Hat

Data protection: Time-Proven Truths for Your Virtual World
sponsored by Datalink
WHITE PAPER: This white paper presents four steps you can take to make the right data protection and backup decisions for your environment.
Posted: 06 Aug 2015 | Published: 06 Aug 2015

Datalink

EMM Report Card: 10 Mobility Suites to Keep an Eye On
sponsored by IBM
WHITE PAPER: This white paper examines and compares 10 of the top EMM suites to look out for, highlighting the pros and cons to each. Read on to find out which dynamic suite best stacks up when it comes to the EMM magic quadrant of features.
Posted: 06 Aug 2015 | Published: 06 Aug 2015

IBM

Does Open Source Software Still Make Sense? 10 Reasons Why
sponsored by SERENA Software, Inc.
WHITE PAPER: This white paper explores the unexpected costs of OSS, and provides several case examples to look at how and when we use OSS. Click here to find out how the following contribute to the security of your software development lifecycle (SDLC).
Posted: 05 Aug 2015 | Published: 05 Aug 2015

SERENA Software, Inc.

Considering Layered Security? 14 Questions to Ask
sponsored by VSS Monitoring
WHITE PAPER: Today's networks and data centers are a critical asset to organizations of every size. This white paper serves as a guideline when considering layered network security solutions, ensuring that your enterprise stays ahead of ever-advancing security and network threats. Click here to see your security questions answered.
Posted: 05 Aug 2015 | Published: 05 Aug 2015

VSS Monitoring

Top 6 Security Considerations in Migrating to Microsoft Windows 10
sponsored by Absolute
WHITE PAPER: This white paper can help you make the migration to Windows 10 without sacrificing your security.
Posted: 05 Aug 2015 | Published: 05 Aug 2015

Absolute
51 - 75 of 1299 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement