Business of Information Technology  >   Business Management  >   Best Practices  >  

Security Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Security Best Practices Reports
51 - 75 of 1156 Matches Previous Page  |  Next Page
Applying the Top 20 Critical Security Controls to the Cloud
sponsored by CloudPassage
WEBCAST: This webcast discusses how enterprises can apply the 20 Critical Security Controls for Effective Cyber Defense, a list of best practices for IT security, to the new reality of cloud-based or virtualized infrastructures.
Posted: 06 Feb 2015 | Premiered: Feb 6, 2015

CloudPassage

The 2014 Bitglass Healthcare Breach Report
sponsored by BitGlass
WHITE PAPER: This informative report takes a close look at reported healthcare data breaches over the past 3 years and discusses what they mean for consumers, healthcare organizations, and the future of digital healthcare records.
Posted: 05 Feb 2015 | Published: 05 Feb 2015

BitGlass

Profiling an Enigma: The Mystery of North Korea’s Cyber Threat Landscape
sponsored by Hewlett-Packard Company
WHITE PAPER: This highly interesting resource delves into North Korea's cyber threat landscape, deeply analyzing what is known about the regime's capabilities and motives, which are largely shrouded in secrecy.
Posted: 05 Feb 2015 | Published: 29 Aug 2014

Hewlett-Packard Company

Why Outsourcing CRM Doesn't Mean That You Can Outsource Data Protection
sponsored by BitGlass
WHITE PAPER: This white paper explains why enterprises utilizing cloud applications like Salesforce should consider investing in a cloud access security broker, which restores data protection and visibility to your IT team while respecting user privacy.
Posted: 05 Feb 2015 | Published: 05 Feb 2015

BitGlass

How to Bolster Office 365's Built-In Security Functionality
sponsored by BitGlass
WHITE PAPER: This white paper explains how you can bolster Office 365's built-in security functionality with a comprehensive, in-house security plan, and lists the key areas that your enterprise has to address.
Posted: 04 Feb 2015 | Published: 31 Dec 2014

BitGlass

Increase Security and Reduce Costs By Managing Administrator Rights
sponsored by Viewfinity
WHITE PAPER: Access this resource for an exclusive interview with a user that deployed various internet security technologies into their company.
Posted: 04 Feb 2015 | Published: 04 Feb 2015

Viewfinity

Critical Security Controls: From Adoption to Implementation
sponsored by Qualys
WHITE PAPER: This white paper reveals the results of a survey on CSC implementation, including the barriers businesses face and suggestions for overcoming them.
Posted: 04 Feb 2015 | Published: 30 Sep 2014

Qualys

Case Study: Public School Implements Identity Solution to Centralize Management and Increase Security
sponsored by Centrify Corporation
WHITE PAPER: This case study details how the Grand Island school district in Nebraska implemented the Centrify for Mac and Mobile solution for integration into a centralized IAM framework to handle authorization and authentication district-wide.
Posted: 04 Feb 2015 | Published: 30 Aug 2013

Centrify Corporation

Top Security & Compliance Trends in Innovative Electronic Payments
sponsored by Hewlett-Packard Company
WHITE PAPER: The following research report focuses on the use of electronic payment systems, perceptions about the risk to organizations and trends in the adoption as well as support for virtual currency solutions. Read on to learn more.
Posted: 04 Feb 2015 | Published: 04 Feb 2015

Hewlett-Packard Company

Survey Shows Organizations Have Plenty of Room for Improvement with IT Security
sponsored by Hewlett-Packard Company
WHITE PAPER: The following white paper explores what far too many organizations are leaving out of their IT security practices and explains what can be done to improve their overall effectiveness. Read on to learn if your own IT security protocols are leaving you open to a malicious attack.
Posted: 04 Feb 2015 | Published: 04 Feb 2015

Hewlett-Packard Company

Preventing Data Breaches Made Possible with Data Breach Discovery
sponsored by BitGlass
WHITE PAPER: Consult the following white paper to learn how by using proprietary risk intelligence and Big Data analytics, the Data Breach Discovery system by Bitglass can offer a formidable defense against new age data breaches.
Posted: 04 Feb 2015 | Published: 04 Feb 2015

BitGlass

Few Businesses Feel Fully Prepared for Software Security Risks
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper reveals the results of a recent survey that explored enterprises' confidence in the security of the software that runs their businesses.
Posted: 04 Feb 2015 | Published: 04 Feb 2015

Hewlett-Packard Company

The Definitive Guide to Cloud Access Security Brokers
sponsored by BitGlass
WHITE PAPER: This white paper discusses Cloud Access Security Brokers (CASBs) as a potential solution for enterprises looking to safely enable cloud apps and mobile devices.
Posted: 04 Feb 2015 | Published: 29 Aug 2014

BitGlass

Why Every CIO Should Consider Vulnerability Assessment a Necessity
sponsored by IBM
WHITE PAPER: In this resource, CIOs will learn why vulnerability assessment is so essential to enterprise security, and can discover a leading vulnerability assessment platform that scans targeted systems on a scheduled basis in order to increase your understanding of your organization's overall security posture.
Posted: 03 Feb 2015 | Published: 30 Apr 2014

IBM

Office 365: How Bitglass Restores Visibility and Data Protection to IT
sponsored by BitGlass
WHITE PAPER: This white paper presents a potential solution for the security and compliance issues raised by Office 365, enabling enterprises to secure their data outside of the firewall while maintaining user privacy.
Posted: 03 Feb 2015 | Published: 03 Feb 2015

BitGlass

IBM InfoSphere Guardium: Manage the Entire Data Security and Compliance Lifecycle
sponsored by IBM
WHITE PAPER: This white paper introduces a robust solution from IBM capable of safeguarding your enterprise's data across all enterprise systems and data center environments.
Posted: 03 Feb 2015 | Published: 31 Oct 2013

IBM

Trial Download: InfoSphere Guardium Vulnerability Evaluation Edition
sponsored by IBM
SOFTWARE DEMO: This resource provides a free trial of a leading vulnerability assessment platform that you can set up easily and use to explore the benefits of database vulnerability assessment without the overhead of an enterprise deployment.
Posted: 02 Feb 2015 | Premiered: 02 Feb 2015

IBM

Vulnerability Assessment: Discover Holes in Your Database Security With This Easy-to-Configure Trial
sponsored by IBM
VIDEO: This video provides a simple explanation of how to deploy a 30-day trial of a leading vulnerability assessment platform, giving you critical insight into your enterprise's security vulnerabilities in no time.
Posted: 02 Feb 2015 | Premiered: 06 Nov 2014

IBM

Why Fighting Cybercrime Requires Thinking Like the Bad Guys
sponsored by Hewlett-Packard Company
WHITE PAPER: In this infographic, you'll find out how to safeguard your business by changing the way you invest in and think about security – from the perspective of the cyberthreats targeting you.
Posted: 02 Feb 2015 | Published: 02 Feb 2015

Hewlett-Packard Company

Can Your Organization Brave The New World of Advanced Cyber Attacks?
sponsored by Websense
WHITE PAPER: This white paper discusses three key factors that your enterprise needs to watch in order to fend off cyberattackers: Rapidly evolving attacks, enterprise mobility, and a shortage of security personnel.
Posted: 02 Feb 2015 | Published: 08 Jan 2015

Websense

8 Ways to Better Monitor Network Security Threats in the Age of BYOD
sponsored by Hewlett-Packard Company
WHITE PAPER: This helpful white paper takes a look at a number of ways in which security professionals can gain better control of the BYOD explosion and mitigate risk factors before they impact the enterprise.
Posted: 01 Feb 2015 | Published: 14 Jan 2014

Hewlett-Packard Company

Know the Big Three: Top three mobile application threats
sponsored by Hewlett-Packard Company
WHITE PAPER: This exclusive paper examines how to prevent sensitive data leakage over insecure channels or stolen devices. Read on to discover the top three threats to mobile applications and how to mitigate their potential impact.
Posted: 01 Feb 2015 | Published: 26 Aug 2014

Hewlett-Packard Company

Does App Security Pay? The Business Impact of Security Tools
sponsored by Hewlett-Packard Company
WHITE PAPER: This exclusive resource discusses how your organization can dramatically reduce applications vulnerabilities, speed recovery time and minimize delays. Read on to learn more.
Posted: 01 Feb 2015 | Published: 20 Jan 2014

Hewlett-Packard Company

Next Generation Network Security: Incorporating Vulnerability Intelligence
sponsored by Hewlett-Packard Company
WHITE PAPER: This crucial paper surveys today's network security threat landscape, discussing available tools, best practices, and the critical role that vulnerability intelligence must play in your security strategy.
Posted: 01 Feb 2015 | Published: 25 Feb 2014

Hewlett-Packard Company

Building a Better Network Security Strategy
sponsored by Hewlett-Packard Company
WHITE PAPER: This informative resource discusses what features a network security strategy should cover in order to ensure success in today's business world.
Posted: 01 Feb 2015 | Published: 03 Mar 2014

Hewlett-Packard Company
51 - 75 of 1156 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement