Business of Information Technology  >   Business Management  >   Best Practices  >  

Security Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Security Best Practices Reports
51 - 75 of 1221 Matches Previous Page  |  Next Page
Fast Detection & Deep Understanding: Responding Effectively to Cyber Attacks
sponsored by BAE Systems Applied Intelligence (formerly SilverSky)
WHITE PAPER: This white paper discusses the importance of the relationship between threat identification and security intelligence, and gives tips on how you can improve both of these factors.
Posted: 07 Jul 2015 | Published: 31 Dec 2013

BAE Systems Applied Intelligence (formerly SilverSky)

SMBs: Are You Considering the Cloud for Security?
sponsored by Dell Software
WHITE PAPER: This essential white paper explores how a cloud-based service can provide always up-to-date security for SMBs.
Posted: 06 Jul 2015 | Published: 25 Apr 2015

Dell Software

Taking Control of File Sharing Services
sponsored by Mimecast
WHITE PAPER: This white paper discusses the security challenges of cloud-based file sharing services and gives tips on how to enjoy their productivity benefits without putting your business at risk.
Posted: 06 Jul 2015 | Published: 31 Dec 2014

Mimecast

Tackling Cyber-Enabled Financial Fraud
sponsored by BAE Systems Applied Intelligence (formerly SilverSky)
WHITE PAPER: This white paper analyzes the problem of increased cyber-fraud and discusses how you can take back control of your organization's finances.
Posted: 06 Jul 2015 | Published: 31 Dec 2013

BAE Systems Applied Intelligence (formerly SilverSky)

Considerations For Developing Big Data Security Analytics
sponsored by BAE Systems Applied Intelligence (formerly SilverSky)
WHITE PAPER: This guide can teach you how to design, plan and implement a big data solution that will give you the most security benefits.
Posted: 06 Jul 2015 | Published: 31 Dec 2014

BAE Systems Applied Intelligence (formerly SilverSky)

Best Practices for Mobile Application Lifecycle Management
sponsored by IBM
WHITE PAPER: Access this white paper to learn the best practices for secure MALM. Don't leave your enterprise app store vulnerable to attacks.
Posted: 06 Jul 2015 | Published: 26 Dec 2014

IBM

A Secure Transition to iOS
sponsored by IBM
WHITE PAPER: Read this white paper to learn about a security solution that has a clean and intuitive interface with easy reporting and usage tracking for expense management.
Posted: 06 Jul 2015 | Published: 22 Jul 2014

IBM

Mobile Device Management Policy Best Practices
sponsored by IBM
WHITE PAPER: Managing smartphones and tablets is only half the Mobile Device Management (MDM) story. Securing the data and access points between corporate systems and your workers' variety of mobile devices requires just as much consideration and planning as protecting the devices themselves.
Posted: 06 Jul 2015 | Published: 01 Aug 2014

IBM

Determining the Right Mobile Security Solution for Your Organization
sponsored by IBM
WHITE PAPER: This helpful white paper presents the steps every organization should take before committing to a mobile security solution, and examines the pros and cons of different potential security strategies.
Posted: 06 Jul 2015 | Published: 07 Aug 2014

IBM

Insider Threat Patterns and Ways of Prevention
sponsored by Varonis
EGUIDE: This expert guide addresses the danger of accidental insider threats, giving you insight into how to prevent these threats from happening and how you can analyze network activity to stop unusual actions.
Posted: 02 Jul 2015 | Published: 02 Jul 2015

Varonis

Don’t Let Your DDoS Defense Fall Behind
sponsored by Neustar®
WHITE PAPER: This white paper examines the pros and cons of several different DDoS mitigation approaches. Access now to learn how to evaluate and choose the ideal strategy based on your risk assessment.
Posted: 01 Jul 2015 | Published: 13 May 2015

Neustar®

Manage Threats with Governance and a DLP Suite
sponsored by Varonis
EGUIDE: This expert guide discusses the benefits of both governance and data loss prevention (DLP) solutions, and it gives advice for being smart when implementing these systems.
Posted: 01 Jul 2015 | Published: 01 Jul 2015

Varonis

The Day after Tomorrow: Cyber-Crisis Management at the Speed of Twitter
sponsored by Hewlett-Packard Limited
WEBCAST: In this video, security expert Andrzej Kawalec explores how to create an efficient cybercrime response plan for fast threat mitigation and for protection of your company's reputation.
Posted: 01 Jul 2015 | Premiered: Jun 4, 2015

Hewlett-Packard Limited

Network Forensics for Attack Mitigation
sponsored by Global Knowledge
WHITE PAPER: This white paper explains how network forensics are emerging as a key solution to limiting the damage of network malware attacks.
Posted: 01 Jul 2015 | Published: 01 Jul 2015

Global Knowledge

Security Predictions for 2015
sponsored by BAE Systems Applied Intelligence (formerly SilverSky)
WEBCAST: This webcast takes a look at the top security incidents and breaches over the past year and predicts how the cybersecurity landscape will develop for 2015.
Posted: 30 Jun 2015 | Premiered: Dec 11, 2014

BAE Systems Applied Intelligence (formerly SilverSky)

Secure Access between Endpoints and Corporate Resources
sponsored by HID
WHITE PAPER: This white paper explores how securing corporate data through mobile devices is possible by transforming it into a two-factor authentication token. Read on to learn how to manage your authentication methods, protect your data, maximize your productivity, and more.
Posted: 30 Jun 2015 | Published: 20 Feb 2013

HID

Analyzing Consumer IT Security Bad Habits that are Coming into the Office
sponsored by WinMagic
WHITE PAPER: This analytical white paper delves into the false sense of security employees live within as well as the facts and truths about the lack of data security measures in place to mitigate risks. View now to learn how to eliminate user bad habits.
Posted: 29 Jun 2015 | Published: 24 Feb 2014

WinMagic

Best Practices for Securing Your Cloud Email Service
sponsored by McAfee, Inc.
EGUIDE: This exclusive e-guide compares on-premises and cloud-based email security tools.
Posted: 29 Jun 2015 | Published: 24 Jun 2015

McAfee, Inc.

Data Protection in the Cloud: Are you Protecting Customers and Employees
sponsored by BAE Systems Applied Intelligence (formerly SilverSky)
WEBCAST: In this webcast, you will learn the 7 questions to ask vendors to know the level of data protection to expect before migrating to the cloud.
Posted: 29 Jun 2015 | Premiered: Nov 20, 2014

BAE Systems Applied Intelligence (formerly SilverSky)

What We Can Learn from Recent Data Breaches and the ShellShock Vulnerability
sponsored by BAE Systems Applied Intelligence (formerly SilverSky)
WEBCAST: In this webcast, some of the most well-known data breaches are analyzed to reveal how they occurred and what lessons they can teach us.
Posted: 29 Jun 2015 | Premiered: Oct 16, 2014

BAE Systems Applied Intelligence (formerly SilverSky)

Identify, Mitigate Shadow IT with a Cloud Risk Assessment
sponsored by IBM
WHITE PAPER: This 50-attribute evaluation offers a snapshot of your data with insights on your organization's usage of cloud services and the risks associated with each service.
Posted: 29 Jun 2015 | Published: 31 Dec 2014

IBM

Five Pillars of Transparent Data Security
sponsored by WinMagic
WHITE PAPER: This white paper outlines the 5 essential pillars of transparent data security to remove workflow and performance burdens.
Posted: 26 Jun 2015 | Published: 19 Dec 2012

WinMagic

6 Steps for Preventing Insider Threats
sponsored by Varonis
WEBCAST: This webcast outlines six ways you can stay safe from the ever-present threat of insider attacks.
Posted: 26 Jun 2015 | Premiered: Jun 26, 2015

Varonis

The True Cost of Cloud Security
sponsored by FireHost Inc.
WHITE PAPER: This white paper explores how higher security in the cloud is the ultimate cost savings measure, even if it appears costly up front.
Posted: 26 Jun 2015 | Published: 26 Jun 2015

FireHost Inc.

Insider Threats: The Unexpected Risk
sponsored by Varonis
WHITE PAPER: This white paper reveals just how prevalent insider threats are and gives you advice on stopping them.
Posted: 26 Jun 2015 | Published: 26 Jun 2015

Varonis
51 - 75 of 1221 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement