IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Information Management

RSS Feed    Add to Google    Add to My Yahoo!
Security Information Management Reports
 
The 10 Step Action Plan: Meeting Your Shared Security Responsibility with Microsoft Azure
sponsored by TrendMicro
WHITE PAPER: This white paper gives you a solution that addresses cloud security with comprehensive administrative, physical and logical controls.
Posted: 03 Feb 2016 | Published: 31 Dec 2015


Making Sense of the Shared Responsibility Model
sponsored by Palerra Inc.
WHITE PAPER: In this white paper, take a closer look at the Shared Responsibility Model and the misconceptions of the cloud service security infrastructure.
Posted: 21 Jan 2016 | Published: 16 Dec 2015

Palerra Inc.

5 Ways to Extend Your Security Beyond Box
sponsored by Vera
WHITE PAPER: Read this white paper to discover how you can improve your collaboration and data security by automatically securing files in Box, extending those permissions when files are downloaded or shared outside your organization, and tracking every access to your data.
Posted: 21 Jan 2016 | Published: 16 Dec 2015

Vera

Complexity and Data Growth Driving Small and Medium-Sized Environments Toward a New Generation of Data Protection
sponsored by Acronis
WHITE PAPER: Continue reading this white paper to learn how different businesses are utilizing a variety of strategies to manage their cloud, virtual and physical servers. Discover how to manage your hybrid IT environment efficiently.
Posted: 25 Jan 2016 | Published: 18 Jun 2014

Acronis

Digital Guardian Data Loss Prevention
sponsored by Digital Guardian
WHITE PAPER: Continue reading this white paper to discover how you can gain the deepest visibility, fine-grained control and the industry's broadest data protection coverage
Posted: 02 Feb 2016 | Published: 31 Dec 2015

Digital Guardian

40 Questions You Should Have in Your Vendor Security Assessment
sponsored by BitSight
WHITE PAPER: In this white paper, you will learn how to get started with your VRM security program and by accessing the most important questions to ask third-party businesses.
Posted: 02 Feb 2016 | Published: 30 Apr 2014

BitSight

Prioritizing Security at management and board levels
sponsored by Cisco
WHITE PAPER: This white paper analyzes the IT security capabilities in the UK.
Posted: 08 Feb 2016 | Published: 31 Dec 2015

Cisco

The ISO 27001 Information Security Framework
sponsored by Coalfire
WEBCAST: This webcast introduces the ISO 27001 standard and how businesses can benefit from its framework to manage security.
Posted: 27 Jan 2016 | Premiered: Oct 27, 2015

Coalfire

Network protection: The untold story
sponsored by IBM
WHITE PAPER: This white paper explores the growing need for next-generation network protection, focusing on the advances that can help combat today’s advanced threats. It introduces how you can gain the critical insight, visibility and control you need to protect the network against emerging threats and targeted attacks.
Posted: 25 Jan 2016 | Published: 16 Sep 2015

IBM

Gartner: Magic Quadrant for Mobile Data Protection
sponsored by Digital Guardian
WHITE PAPER: Continue reading this white paper to discover treat data encryption protection as a standard for all workstations.
Posted: 01 Feb 2016 | Published: 19 Oct 2015

Digital Guardian
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement