Vertical Industries  >  

Security Industry

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Security Equipment Industry, Security Products Industry
DEFINITION: Companies that design, manufacture, and provide security products or services.
Security IndustryReports
26 - 50 of 223 Matches Previous Page  | Next Page
Data Security is Stormy in the Cloud
sponsored by SafeNet, Inc.
WHITE PAPER: This infographic presents a variety of informative statistics on the widespread struggle to keep data safe in the cloud.
Posted: 11 Dec 2014 | Published: 11 Dec 2014

SafeNet, Inc.

Securing the Path to Consolidation in Today's Data Center
sponsored by SafeNet, Inc.
WHITE PAPER: This white paper explores how multi-layer encryption and centralized key management can enable enterprises to accelerate cloud, virtualization, and data center consolidation initiatives, while retaining the controls they need to protect sensitive data and adhere to internal and external compliance regulations.
Posted: 11 Dec 2014 | Published: 11 Dec 2014

SafeNet, Inc.

Incident Response: How to Fight Back, A SANS Survey
sponsored by Hewlett-Packard Company
WHITE PAPER: This SANS survey on incident response taps into the collective knowledge of 259 security professionals in 19 industries and 13 countries to help you to understand how other companies respond to cyber incidents and how you can improve your own response.
Posted: 11 Dec 2014 | Published: 30 Dec 2013

Hewlett-Packard Company

Quantifying the Business Value of HP TippingPoint
sponsored by Hewlett-Packard Company
WHITE PAPER: This HP white paper applies the experience of real HP TippingPoint customers to quantify its savings and demonstrate pay back in the first year.
Posted: 11 Dec 2014 | Published: 30 Dec 2013

Hewlett-Packard Company

Next-Generation Firewalls and IPS: Why You Need Both
sponsored by Hewlett-Packard Company
WHITE PAPER: This HP white paper shows how next-generation firewalls and next-generation intrusion prevention systems are complementary security solutions that work together to secure your network.
Posted: 11 Dec 2014 | Published: 11 Dec 2014

Hewlett-Packard Company

FierceIT eBook Network Security Now
sponsored by Hewlett-Packard Company
WHITE PAPER: In this FierceITSecurity eBook, IT and networking professionals will find practical, real-world advice on how to handle network security now.
Posted: 11 Dec 2014 | Published: 31 Jan 2014

Hewlett-Packard Company

Collaborative Defense-- HP Security Research
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper from HP Security Research demonstrates why collaboration is essential in defending businesses from cyber attacks and how it can work.
Posted: 11 Dec 2014 | Published: 30 Sep 2013

Hewlett-Packard Company

How Organizations Are Responding to Mobile and Cloud Threats
sponsored by SafeNet, Inc.
WHITE PAPER: This white paper explores the results of a recent survey that sought to elucidate how organizations are adapting their approach to authentication to protect their sensitive assets as they adopt cloud-based services and BYOD.
Posted: 10 Dec 2014 | Published: 15 May 2014

SafeNet, Inc.

How Would Self-Reset Password Solutions Impact Enterprises Around the World?
sponsored by Tools4ever
WHITE PAPER: This white paper explores the results of a survey on self-reset password solutions and the impact that they could have on IT helpdesks.
Posted: 08 Dec 2014 | Published: 08 Dec 2014


The Self-Service Password Reset Checklist
sponsored by Tools4ever
WHITE PAPER: This white paper will help your organization to determine whether investing in a self-service password reset solution is worth it, providing a checklist of issues that your company may encounter along the way and a number of solutions to save you time and money.
Posted: 08 Dec 2014 | Published: 08 Dec 2014


The Relationship Between Identity Management and Compliance
sponsored by ObserveIT
EGUIDE: This expert guide asks whether anomaly-based user activity monitoring is the only way to stop data breaches, and also explains how IAM should and shouldn't be used to support enterprise compliance processes.
Posted: 08 Dec 2014 | Published: 08 Dec 2014

ObserveIT

Gartner Evaluates 12 Web Access Management Solutions
sponsored by IBM
WHITE PAPER: This white paper from Gartner evaluates 12 leading Web access management solutions on criteria like customer experience, core goods and services, and pricing.
Posted: 05 Dec 2014 | Published: 15 Nov 2013

IBM

Protection for Every Enterprise: How BlackBerry® Security Works
sponsored by BlackBerry
WHITE PAPER: This white paper examines how the BlackBerry® platform aims to resolve the security issues inherent in accessing sensitive enterprise data on consumer devices.
Posted: 04 Dec 2014 | Published: 04 Dec 2014

BlackBerry

Vectra X-Series Deployment Guide
sponsored by Vectra Networks
WHITE PAPER: This deployment guide gives a brief overview of the deployment preparation, installation, and configuration of a Vectra X-series platform, which detects malware and cyber attacks at any phase.
Posted: 04 Dec 2014 | Published: 04 Dec 2014

Vectra Networks

Identity and Access Management Guidelines
sponsored by ObserveIT
EGUIDE: In this expert guide, Forrester Principal Analyst Andras Cser introduces an effective, easy-to-use maturity model that will enable you to evaluate your enterprise's IAM strategy and infrastructure, and Nilesh Shirke lists a number of best practices for IAM solution implementation.
Posted: 04 Dec 2014 | Published: 04 Dec 2014

ObserveIT

How to Build Defense in Depth Against Advanced Cyber Attacks with Vectra and Sandbox Security
sponsored by Vectra Networks
WHITE PAPER: This white paper introduces Vectra, a leading innovator in real-time detection of in-progress cyber attacks that complements sandbox security solutions to create an in-depth defense against advanced persistent threats.
Posted: 03 Dec 2014 | Published: 03 Dec 2014

Vectra Networks

Understanding the Cyber Attack "Kill Chain" and Attack Model
sponsored by Websense
WHITE PAPER: This white paper describes the seven stages of advanced threats that comprise "kill chains" and explains how cybercriminals use them in attacks.
Posted: 03 Dec 2014 | Published: 16 Oct 2013

Websense

Prevent Fraud and Improve the User Experience with Mobile Access Management
sponsored by IBM
WHITE PAPER: This white paper examines the challenges of providing secure access in the mobile world and explores new security models, policies, and controls that can help to protect your critical assets and data.
Posted: 03 Dec 2014 | Published: 30 Sep 2013

IBM

Cool Vendors in Application and Endpoint Security, 2014
sponsored by Digital Guardian
WHITE PAPER: This resource from Gartner evaluates 5 cutting-edge security vendors that are not necessarily market-proven, but are producing technologically sophisticated application and endpoint security products that early adopters may find highly promising.
Posted: 02 Dec 2014 | Published: 02 May 2014

Digital Guardian

The Top 8 Mobile Security Risks: How to Protect Your Organization
sponsored by BlackBerry
WHITE PAPER: This helpful resource presents the top 8 mobile security risks that you need to be on top of right now in order to protect your business, and also provides a questionnaire designed to elucidate and resolve the gaps in your approach to mobile security.
Posted: 02 Dec 2014 | Published: 02 Dec 2014

BlackBerry

Magic Quadrant for Mobile Data Protection
sponsored by Digital Guardian
WHITE PAPER: This informative resource from Gartner compares mobile data protection solutions from a number of reputable companies, which defend access to secure data on storage systems in notebooks, removable media, desktops, and servers.
Posted: 02 Dec 2014 | Published: 08 Sep 2014

Digital Guardian

Websense® Security Labs™: 8 Security Predictions for 2015
sponsored by Websense
WHITE PAPER: This must-read resource from Websense presents the top 8 security predictions for 2015.
Posted: 01 Dec 2014 | Published: 18 Nov 2014

Websense

Security Best Practices for a Cloud-Enabled World
sponsored by IBM
WHITE PAPER: This white paper presents a straightforward approach to cloud security that enables your enterprise to mitigate the risks associated with cloud deployment and usage; improve and standardize your security posture and practices across all environments; and more.
Posted: 01 Dec 2014 | Published: 31 Jul 2014

IBM

Getting IT Security Wrong Can Be Costly—How to Balance Investment with Risk
sponsored by Clearswift
WHITE PAPER: This white paper examines why so many executives take little interest in information security; why compliance needs to be combined with a more risk-based approach to security; the importance of creating a security-aware culture; and more.
Posted: 26 Nov 2014 | Published: 26 Nov 2014

Clearswift

Mobile Cloud Security: What CXOs Need to Know
sponsored by Cisco Systems, Inc.
RESOURCE: This blog post discusses the need for end-to-end security in a mobile cloud environment.
Posted: 27 Nov 2014 | Published: 28 Nov 2014

Cisco Systems, Inc.
26 - 50 of 223 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement