Business of Information Technology  >   Business Management  >   Financial Management  >   Budgeting  >   IT Spending  >  

Security Budgets

RSS Feed    Add to Google    Add to My Yahoo!
Security BudgetsReports
 
The Global State of Information Security Survey 2013: Key Findings
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This global study examines the state of cyber-security and the impact of cyber crime and offers advice to businesses on reducing the risks.
Posted: 09 Nov 2012 | Published: 02 Nov 2012

ComputerWeekly.com

2012 Cost of Cyber Crime Study: UK
sponsored by ComputerWeekly.com
RESEARCH CONTENT: The 2012 Cost of Cyber Crime Study: United Kingdom is independently conducted by Ponemon Institute. The benchmark study, sponsored by HP Enterprise Security is based on a representative sample of 38 organisations in various industry sectors.
Posted: 25 Oct 2012 | Published: 25 Oct 2012

ComputerWeekly.com

Improving Windows Client Performance and Security: An Impact Comparison of AC and Traditional AV
sponsored by Lumension
WHITE PAPER: This Tolly Test report compares the effectiveness of both anti-virus and application control solutions to help you decide which would work best for your enterprise. View now to uncover which approach provides greater performance across diverse workloads and protects against more threats to keep your endpoints safe and secure.
Posted: 24 Jul 2013 | Published: 03 May 2013

Lumension

Mitigating Risks of Cloud Computing with SSL Certificates
sponsored by Symantec Corporation
WHITE PAPER: This white paper examines an overview of cloud computing, highlighting its advantages as well as its concerns.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

Symantec Corporation

6 Point SIEM Solution Evaluation Checklist
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchSecurity.com explores the top six evaluation criteria you should keep in mind when investing in a security information and event management (SIEM) solution. View now to learn more!
Posted: 24 Apr 2013 | Published: 24 Apr 2013

SearchSecurity.com

Web Security – Virtual Appliance
sponsored by Cisco Systems, Inc.
WEBCAST: Watch this webcast to see how you can best protect your Web-accessible assets with a strong protection solution that ensures security wherever your data goes.
Posted: 22 Apr 2014 | Premiered: Apr 22, 2014

Cisco Systems, Inc.

Identity & Access Management Summit 2014
sponsored by Gartner
BROCHURE: This brochure is for the Gartner Summit, occurring March 17th – 18th, 2014, where attendees can gain 2 days' worth of valuable content regarding identity and access management (IAM). Click now to learn about the global IT leaders who will discuss strategic trends that will keep businesses protected for years to come.
Posted: 16 Jan 2014 | Published: 16 Jan 2014

Gartner

Hardware and Software Authentication: Choosing the Right Approach
sponsored by SafeNet Asia Ltd
WHITE PAPER: In this resource, uncover the top 5 considerations for choosing between hardware- or software-based authentication tools to ensure that assets remain protected even when remote users access corporate networks.
Posted: 09 Jan 2014 | Published: 09 Sep 2010

SafeNet Asia Ltd

It’s Time Businesses Wake up to Mobile Security Reality
sponsored by Threat Track Security
WHITE PAPER: This resource underlines the importance of Mobile Device Management (MDM) in ensuring the security of your enterprise in the face of BYOD. Read now to learn how you can alleviate the pressure to account for, manage, and secure the wide range of new endpoints within your organization.
Posted: 29 Apr 2013 | Published: 29 Apr 2013

Threat Track Security

How to take Advantage of Security Ops that go Beyond the OS
sponsored by Intel and McAfee
WEBCAST: In this webcast, get security advice from Ed Metcalf, Director of Product and Solution Marketing at McAfee and his colleague, Deepak Kolingivadi, Senior Product Manager, and discover how to gain full value from one security system solution that will reduce costs and increase business productivity.
Posted: 21 Oct 2013 | Premiered: Oct 15, 2013

Intel and McAfee
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement