Business of Information Technology  >   Business Management  >   Best Practices  >  

Security Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Security Best Practices Reports
51 - 75 of 1658 Matches Previous Page  |  Next Page
Cloud Computing Security Considerations and Requirements
sponsored by Palo Alto Networks
WHITE PAPER: In an era where the cloud is considered nontraditional, securing it shouldn't be either. Learn how to segment your applications and data, centrally manage and automate security deployments, and more.
Posted: 22 Sep 2016 | Published: 22 Sep 2016

Palo Alto Networks

Analysts Reveal how to Secure SaaS
sponsored by Palo Alto Networks
WHITE PAPER: This report illustrates the explosive growth of SaaS applications, and their role in creating significant security challenges for IT teams. Learn how CASB products can help deliver the visibility and granular control you need to protect and secure these apps.
Posted: 22 Sep 2016 | Published: 22 Sep 2016

Palo Alto Networks

Digital Identity Insights: Dangerous Access, IoT Security, and Compliance
sponsored by Certified Security Solutions (CSS)
WEBCAST: Join digital identity expert Chris Hickman for a review of the current state of the Internet of Things (IoT) from a security perspective and the critical role that digital identity authentication has in helping companies secure consumer-facing technology.
Posted: 22 Sep 2016 | Premiered: Sep 16, 2015

Certified Security Solutions (CSS)

TAG Cyber Report: 2017 Security Annual – Vol. 1
sponsored by Digital Guardian
WHITE PAPER: This report provides CISO team members with detailed technical and architectural guidance based on fifty specific controls that support the reduction of cyber risk. It's a practical handbook and reference guide for the cyber security professional.
Posted: 22 Sep 2016 | Published: 31 Aug 2016

Digital Guardian

New Tools Lead to Refined GRC Practices
sponsored by Proofpoint, Inc.
EGUIDE: See why most enterprises still struggle with governance, risk and compliance processes in the digital age. In this e-guide, learn the history of tried and failed document sorting methods and discover new tools, like text analytics and auto-classification that can help compliance practices in the future.
Posted: 22 Sep 2016 | Published: 20 Sep 2016

Proofpoint, Inc.

How to Conquer Security on the Public, Private, and Hybrid Clouds
sponsored by Fortinet, Inc.
WHITE PAPER: Learn about the key security considerations for all cloud environments, enforcing the value of agile and elastic cloud security. Discover the ingredients of a solid cloud security approach, including: scalability, underlying cloud infrastructure, micro-and internal segmentation, SIEM, and more.
Posted: 22 Sep 2016 | Published: 22 Sep 2016

Fortinet, Inc.

The Power of Precise Threat Intelligence: Which SecureWorks service is right for me?
sponsored by SecureWorks
WHITE PAPER: Creating meaningful threat intelligence requires specialized tools and expertise that go well beyond simple alerts and content searches. Discover hot to achieve this level of expertise within this short white paper. You'll gain a greater visibility into the deepest part of your network and better understand malware and the actors behind it.
Posted: 22 Sep 2016 | Published: 31 Aug 2016

SecureWorks

Companies, Digital Transformation and Information Privacy: The Next Steps
sponsored by Hewlett Packard Enterprise
WHITE PAPER: The following resource features in-depth interviews with legal, technical, and regulatory subject-matter experts on the digital data privacy debate. Explore challenges and strategies global businesses must face regarding this complex, fluctuating policy environment.
Posted: 22 Sep 2016 | Published: 22 Sep 2016

Hewlett Packard Enterprise

The Security Fabric of The Cloud
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper explores the 5 traits every cloud environment has to have to ensure its safety. The first three things you need to be are: scalable, to meet volume and performance demands, aware, for deep visibility of the traffic traveling your network, and actionable, in order to be able to adapt to any discovered threat.
Posted: 22 Sep 2016 | Published: 22 Apr 2016

Fortinet, Inc.

How to Secure Data Access Within the Healthcare Industry
sponsored by VASCO Data Security International
WHITE PAPER: Access this white paper to learn the changing role of technology within the health sector and why healthcare organizations continue to experience major data breaches. Discover best practices to help your organization integrate and adopt security without compromising the patient experience.
Posted: 22 Sep 2016 | Published: 31 Aug 2016

VASCO Data Security International

Get Smarter Control of Your Certificates and User Keys Right Now
sponsored by Certified Security Solutions (CSS)
WEBCAST: In this webinar IT experts Ted Shorter and Matthew McKenna join forces to outline common enterprise challenges, risks, and best practices related to controlling digital certificates and SSH user keys. Learn how to reduce risk, meet and exceed audit requirements, and streamline disparate complex IT and security workflows.
Posted: 22 Sep 2016 | Premiered: Jun 22, 2016

Certified Security Solutions (CSS)

Penetration Testing Services Data Sheet
sponsored by IBM
DATA SHEET: Since high-profile data breaches have become routine, a programmatic approach to security testing and vulnerability management is required. This resource details a security service that will document your unique set of requirements for determining risk and create a custom tool to recommend a testing profile for each of your targets.
Posted: 22 Sep 2016 | Published: 29 Jul 2016

IBM

Rx for Embedding Security into Vulnerable Healthcare Systems
sponsored by Certified Security Solutions (CSS)
WEBCAST: Learn how organizations have to revisit considerations for products and services already in use to protect data. Discover how they are satisfying regulatory or compliance requirements, remediating issues, preserve reputations and promoting a competitive advantage.
Posted: 21 Sep 2016 | Premiered: Sep 21, 2016

Certified Security Solutions (CSS)

Deriving Value from the Technical Security Test
sponsored by SecureWorks
WHITE PAPER: Uncover a guide for your questions as you get into the process of choosing the right provider to meet your specific security testing needs. Learn key considerations that must be implemented in the selection process for technical testing providers.
Posted: 21 Sep 2016 | Published: 31 Aug 2016

SecureWorks

Who Will CAVE First: Likely Targets of Ransomware
sponsored by Radware
WHITE PAPER: The following resource lists an acronym that highlights four key areas criminals will assess in their decision to target people and companies. Learn how to avoid being a victim by getting inside the mind of a ransomware attacker.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

Radware

The Changing Workforce: Automation & the Role of Ex-Hackers
sponsored by Radware
WHITE PAPER: The wave of automation is forcing companies to think differently about how they structure their security resources. Learn what your peers are doing to keep the network impermeable, including employing ex-hackers, automating security models, and more.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

Radware

Best Practices for Writing Secure iOS and Android Apps
sponsored by Proofpoint, Inc.
WHITE PAPER: As mobile applications grow to reach wider audiences, they become larger targets for cyberattackers. Access this list of 21 mobile security guidelines for developers and security pros when developing Android and iOS mobile apps. Learn how to provide security at every step of the mobile application development and management processes.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

Proofpoint, Inc.

Advancing Endpoint Security: The Importance of Threat Intelligence, Visibility
sponsored by SecureWorks
WHITE PAPER: Discover how to mix anti-malware capabilities with high-level visibility and behavioral based detection to eliminate endpoint threats. By arming yourself with these weapons, your organization can not only detect threat actors and their tradecraft, but also slash time of response, minimizing the damage they cause.
Posted: 21 Sep 2016 | Published: 31 Aug 2016

SecureWorks

Best Practices for Dealing With Phishing and Ransomware
sponsored by Trustwave
WHITE PAPER: There are steps you can take to address phishing and ransomware. Discover how to best mitigate these tremendous threats to decrease the likelihood of infection and the subsequent consequences that come from them.
Posted: 21 Sep 2016 | Published: 30 Sep 2016

Trustwave

Public Key Infrastructure: The New Best Practices
sponsored by Certified Security Solutions (CSS)
WHITE PAPER: This white paper outlines how Public Key Infrastructure (PKI) has evolved and highlights some common PKI weaknesses of today. Access now to uncover best practices on how to identify challenges, address questions, and manage issues to reduce risk and meet audit and compliance requirements for PKI operations.
Posted: 20 Sep 2016 | Published: 20 Sep 2016

Certified Security Solutions (CSS)

Building Natural Active Immunity against Advanced Threats
sponsored by Fortinet, Inc.
WHITE PAPER: Through the collaborative, proactive and coordinated actions of prevention, detection, and mitigation, companies can strengthen their defenses against advanced and unknown threats. Discover how you can build this natural active immunity with Fortinet.
Posted: 20 Sep 2016 | Published: 20 Sep 2016

Fortinet, Inc.

Public Key Infrastructure: Traditional Deployments vs. IoT PKI
sponsored by Certified Security Solutions (CSS)
WHITE PAPER: This white paper explores the differences between a typical enterprise Public Key Infrastructure (PKI) and an Internet of Things (IoT) PKI. Gain access to a current assessment of the state of IoT security risks and explore the unique design, deployment, and management considerations of an IoT PKI.
Posted: 20 Sep 2016 | Published: 20 Sep 2016

Certified Security Solutions (CSS)

How Can Internet Hijacking be Prevented or Mitigated?
sponsored by Dimension Data
EGUIDE: In this e-guide learn the benefits of basic cyberhygiene in combating persistent attacks and become more effective in protecting your enterprise's data.
Posted: 23 Sep 2016 | Published: 21 Sep 2016

Dimension Data

Is FDE Enough to Thwart "Evil Maid" Attacks?
sponsored by Dimension Data
EGUIDE: In this e-guide learn why the traditionally accepted full disk encryption (FDE) isn't enough to protect enterprise data in case an attacker steals your device.
Posted: 23 Sep 2016 | Published: 21 Sep 2016

Dimension Data

Beyond Certificate Management for Enterprises
sponsored by Certified Security Solutions (CSS)
WEBCAST: Discover how to manage PKI, why handling just the digital certificates might not be enough, and some best practices for controlling PKI operations to help reduce risk and improve efficiency. Learn the value of centralizing certificate sources, being able to prevent outages, and more.
Posted: 21 Sep 2016 | Premiered: Sep 21, 2016

Certified Security Solutions (CSS)
51 - 75 of 1658 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement