IT Management  >   Systems Operations  >   Security  >  

Security Breaches

RSS Feed    Add to Google    Add to My Yahoo!
Security Breaches Reports
 
Multifactor Authentication Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: In this virtual security classroom, Michael Cobb, a renowned security author with over 20 years of experience in the IT industry, surveys the latest authentication methods and technologies coming onto the market.
Posted: 16 Dec 2014 | Premiered: 15 Dec 2014

SearchSecurity.com

Allgress Vulnerabilty Analysis Module
sponsored by Allgress
WHITE PAPER: Check out this important white paper now to learn about a vulnerability management program that can automate your entire workflow.
Posted: 22 Jan 2015 | Published: 22 Jan 2015

Allgress

Protect Your Sensitive Data Without Weighting Down Your Networks
sponsored by SafeNet, Inc.
PRODUCT OVERVIEW: This white paper introduces SafeNet's Network Encryption and Isolation solutions, which ensure data confidentiality and infrastructure isolation for your networks without impacting day-to-day operations, whether in traditional data centers or in the cloud.
Posted: 15 Dec 2014 | Published: 15 Dec 2014

SafeNet, Inc.

Why IT Leaders Should Take Strategic Action in Mobile and Endpoint Computing in 2015
sponsored by Absolute Software
WHITE PAPER: This white paper explains why enterprises should develop a broader-based, long-term endpoint strategy that connects to business goals, processes, and practices.
Posted: 19 Jan 2015 | Published: 25 Apr 2014

Absolute Software

How Organizations Are Responding to Mobile and Cloud Threats
sponsored by SafeNet, Inc.
WHITE PAPER: This white paper explores the results of a recent survey that sought to elucidate how organizations are adapting their approach to authentication to protect their sensitive assets as they adopt cloud-based services and BYOD.
Posted: 10 Dec 2014 | Published: 15 May 2014

SafeNet, Inc.

Collaborative Defense – HP Security Research
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper from HP Security Research demonstrates why collaboration is essential in defending businesses from cyber attacks and how it can work.
Posted: 11 Dec 2014 | Published: 30 Sep 2013

Hewlett-Packard Company

Sleeping Through the Alarm: What Breaches Should be Telling Us, and Why the Message is Missed
sponsored by SafeNet, Inc.
WHITE PAPER: This white paper reports the findings of an extensive SafeNet survey of security professionals around the world, offering insights into current market realities and their implications for security executives.
Posted: 12 Dec 2014 | Published: 11 Nov 2013

SafeNet, Inc.

Cloud-Based Content Filtering Drives Productivity and Protects Against Threats
sponsored by AVG Technologies
SOFTWARE DEMO: This complimentary IT download will allow you to experience a reliable, automated, company-wide backup solution that will protect your customer's data while driving greater productivity.
Posted: 18 Dec 2014 | Premiered: 18 Dec 2014

AVG Technologies

How Security Practitioners Can Use Data to Make Intelligent Decisions that Minimize Risk
sponsored by Risk IO
WHITE PAPER: This exclusive white paper explores how an organization can utilize their data to make intelligent decisions that minimize your risk.
Posted: 20 Jan 2015 | Published: 02 Jan 2014

Risk IO

Research Finds More Organizations Use Big Data Analytics for Security
sponsored by RSA
EGUIDE: This expert e-guide explores the rise of Big Data security analytics.
Posted: 02 Jan 2015 | Published: 02 Jan 2015

RSA
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement