Business of Information Technology  >   Business Management  >   Best Practices  >  

Security Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Security Best PracticesReports
51 - 75 of 1099 Matches Previous Page  | Next Page
How Resellers Can Become the Trusted Advisors on Security Issues
sponsored by Webroot
WHITE PAPER: This white paper introduces an innovative endpoint security solution with a completely cloud-based architecture rather than the outdated, signature-based methods of the past.
Posted: 11 Jul 2014 | Published: 31 May 2014

Webroot

Fundamentals of the PKI Infrastructure
sponsored by Global Knowledge
WHITE PAPER: This article reviews the basics of PKI, which increases data security through the use of advanced access methods and ensures that the authenticity of the data flow is preserved.
Posted: 11 Jul 2014 | Published: 11 Jul 2014

Global Knowledge

Deliver Secure Service without Sacrificing Mobility or Collaboration
sponsored by Citrix and Microsoft
WHITE PAPER: This document gives technical overview of a secure and robust enterprise solution that enables mobility and collaboration without sacrificing IT control. Unlike consumer-style file sync and sharing tools, this enterprise approach delivers secure service and store enterprise data in the optimal location to meet polices and compliance requirements.
Posted: 10 Jul 2014 | Published: 31 Jan 2014

Citrix and Microsoft

Clabby Analytics: When Failures and Breaches Are NOT Options
sponsored by IBM
WHITE PAPER: The following research report describes how and why mainframes are different and preferred over different server architectures in the areas of microprocessor characteristics, systems design and related software. Click and learn why the mainframe is the "go-to" architecture when it comes to securing data and avoiding breaches.
Posted: 10 Jul 2014 | Published: 31 Mar 2014

IBM

Dragonfly: Cyberespionage Attacks Against Energy Suppliers
sponsored by Symantec Corporation
WHITE PAPER: The following security response provides an overview of the tools and tactics used by the attackers and a timeline of their attacks. Read on to inform your company of possible malware threats.
Posted: 09 Jul 2014 | Published: 30 Jun 2014

Symantec Corporation

Top 5 "Must-Haves" for MSPs Adding IT Monitoring and Security Services
sponsored by AccelOps Inc.
WHITE PAPER: This helpful white paper provides MSPs with guidelines for deciding which security solutions to offer and which suppliers to work with.
Posted: 09 Jul 2014 | Published: 09 Jul 2014

AccelOps Inc.

Mitigating the OWASP Top 10 2013 with Imperva SecureSphere
sponsored by Imperva
WHITE PAPER: This informative guide outlines an effective tool designed to help mitigate the OWASP top 10 and how it can greatly enhance your enterprise security.
Posted: 08 Jul 2014 | Published: 31 Dec 2013

Imperva

Web Attack Survival Guide Infographic
sponsored by Imperva
WHITE PAPER: This brief infographic provides 7 essential steps for Web attack survival.
Posted: 08 Jul 2014 | Published: 08 Jul 2014

Imperva

Protecting Your Roaming Workforce With Cloud-Based Security
sponsored by Sophos, Inc.
WHITE PAPER: This exclusive resource examines how transitioning to a cloud-based security service can help you meet the challenges met by employees working beyond your organization's secure perimeter.
Posted: 08 Jul 2014 | Published: 16 Dec 2013

Sophos, Inc.

Hexis Webinar: Cyber Attack Strategies with Research Analyst Rick Holland
sponsored by Hexis Cyber Solutions Inc
WEBCAST: In this helpful webinar, Forrester research analyst Rick Holland helps you to reformulate a security strategy for your company that stands up against adversaries.
Posted: 07 Jul 2014 | Premiered: Jun 10, 2014

Hexis Cyber Solutions Inc

FTP VS MFT Why it’s time to make the change
sponsored by IBM
WHITE PAPER: Access this white paper to discover a managed file transfer (MFT) solution that has the power to upgrade, replace, consolidate or outsource your FTP processes.
Posted: 07 Jul 2014 | Published: 07 Jul 2012

IBM

Web Attack Survival Guide
sponsored by Imperva
WHITE PAPER: This informative whitepaper explores survival tactics in the event of a web attack.
Posted: 07 Jul 2014 | Published: 07 Jul 2014

Imperva

Compliance - Protecting Payment Information with PCI DSS
sponsored by GlobalScape
WHITE PAPER: This informative whitepaper outlines strategies for protecting your customer data, remaining compliant and explains why complying with regulations won't ensure security.
Posted: 07 Jul 2014 | Published: 31 Dec 2013

GlobalScape

Symantec Intelligence Report: Internet Security Threats - May 2014
sponsored by Symantec Corporation
WHITE PAPER: Read this Symantec Intelligence Report for an in-depth analysis of the trends in internet security that we have seen in the past year, including data on targeted attacks and data breaches; malware tactics; social media and mobile threats; and more.
Posted: 07 Jul 2014 | Published: 31 May 2014

Symantec Corporation

Advanced Persistent Threats: Detection, Protection and Prevention
sponsored by Sophos, Inc.
WHITE PAPER: Download this paper to get an overview of the common characteristics of APTs, how they typically work, and how Sophos complete security solution can protect your network, servers and end user clients.
Posted: 06 Jul 2014 | Published: 02 Jul 2014

Sophos, Inc.

Three Ways to Harden the Security of your Campus Network
sponsored by Brocade
WHITE PAPER: This informative white paper examines why security for your campus network is critical, and discusses the simple ways that you can significantly strengthen it.
Posted: 03 Jul 2014 | Published: 03 Jul 2014

Brocade

BYOD Risks and Rewards How to keep employee smartphones, laptops and tablets secure
sponsored by Sophos, Inc.
WHITE PAPER: This informative resource takes a look at the risks and rewards of BYOD from a security perspective and details what your organization can do to embrace the brand while ensuring that your sensitive data is protected.
Posted: 03 Jul 2014 | Published: 25 Feb 2014

Sophos, Inc.

Mobile Device Management Buyers Guide
sponsored by Sophos, Inc.
WHITE PAPER: This informative paper takes an in-depth look at the mobile device management (MDM) solutions that are on the market today, comparing features and discussing the benefits and drawbacks of each tool.
Posted: 03 Jul 2014 | Published: 25 Feb 2014

Sophos, Inc.

Buyers Guide: Choosing an Endpoint Protection Solution for Your Enterprise
sponsored by Sophos, Inc.
WHITE PAPER: This buyers guide provides helpful charts to assist you in choosing the endpoint protection solution that will best fit the needs of your enterprise.
Posted: 03 Jul 2014 | Published: 01 Jul 2014

Sophos, Inc.

Unified Threat Management Guide
sponsored by Sophos, Inc.
WHITE PAPER: This guide looks at two of the most popular threat management platforms on the market and explores the benefits of each.
Posted: 02 Jul 2014 | Published: 31 Dec 2013

Sophos, Inc.

Facilitating Enterprise Compliance With Globalscape® EFT™ and the High-Security Module
sponsored by GlobalScape
WHITE PAPER: In this white paper, discover how Enhanced File Transfer (EFT™) High Security module (HSM) combined with the Auditing and Reporting module (ARM) remains compliant to a variety of standards including PCI DSS.
Posted: 01 Jul 2014 | Published: 01 Jul 2014

GlobalScape

Exposing the Cybersecurity Cracks: A Global Perspective
sponsored by Websense, Inc.
WHITE PAPER: This eye-opening reviews data collected from nearly 5000 experienced IT workers regarding deficiencies in the ways that their companies attempt to think about, fight, and detect security breaches.
Posted: 01 Jul 2014 | Published: 30 Apr 2014

Websense, Inc.

Managing Mobility: Balancing the Risks and Rewards
sponsored by Accellion, Inc.
WHITE PAPER: This research report will outline the importance of balancing the advantages and risk of increasing enterprise mobility.
Posted: 01 Jul 2014 | Published: 21 Feb 2014

Accellion, Inc.

Secure Your Mobile Content While Increasing Productivity
sponsored by Accellion, Inc.
WHITE PAPER: This report provides key survey findings indicating how important mobile access is to users, how likely they are to bypass authorized systems, how compliant current collaboration practices are, and what collaboration functionality user expect on their mobile devices.
Posted: 01 Jul 2014 | Published: 31 Dec 2013

Accellion, Inc.

Mitigate the Risks of File Sharing and BYOD with Private Clouds
sponsored by Accellion, Inc.
WHITE PAPER: This informative white paper examines private cloud solutions for file sharing and synchronization, discussing how a private cloud can help you realize the benefits that BYOD provides without having to expose your sensitive information to potential risks.
Posted: 01 Jul 2014 | Published: 28 Jun 2013

Accellion, Inc.
51 - 75 of 1099 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement