IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Information Management

RSS Feed    Add to Google    Add to My Yahoo!
Security Information Management Reports
 
Virtual Patching in Mixed Environments: How It Works to Protect You
sponsored by TrendMicro
WHITE PAPER: This white paper discusses virtual patching which provides the same functionality as software patches by implementing protective network controls that can shield vulnerable servers from attack.
Posted: 03 Feb 2016 | Published: 31 Dec 2015


AMP in 4 Minutes
sponsored by Cisco
VIDEO: This video shows you a new advanced malware protection system that provides protection before, during and after an attack. Go beyond point-in-time capabilities and monitor traffic on endpoints, mobile devices and in your network.
Posted: 09 Feb 2016 | Premiered: 12 Jan 2015

Cisco

Gartner Report: Best Practices for Detecting and Mitigating Advanced Persistent threats
sponsored by Digital Guardian
WHITE PAPER: In this white paper, you will learn how to implement specific strategic best practices to detect and mitigate persistent threats and target malware.
Posted: 01 Feb 2016 | Published: 04 May 2015

Digital Guardian

Advanced Endpoint Protection for Dummies (EBook)
sponsored by Palo Alto Networks
EBOOK: In this eBook, you will read an in-depth examination of today's cyber threat landscape.
Posted: 10 Feb 2016 | Published: 31 Dec 2015

Palo Alto Networks

Secure the data that powers your business with IBM Security Guardium
sponsored by IBM
WHITE PAPER: This white paper will show you how to adpot a proactive, holisitc approach to protecting sensitive data across all platforms.
Posted: 25 Jan 2016 | Published: 12 Aug 2015

IBM

5 Ways to Extend Security Beyond Dropbox
sponsored by Vera
WHITE PAPER: Access this white paper to discover how you can better protect your files in Dropbox. Learn to protect, secure and track all you confidential and sensitive content.
Posted: 25 Jan 2016 | Published: 09 Dec 2015

Vera

Big Data Security for Dummies
sponsored by Blue Coat Systems
WHITE PAPER: This white paper defines Big Data Security and its underlining security analytics and malware analysis technology.
Posted: 04 Feb 2016 | Published: 31 Dec 2015

Blue Coat Systems

Addressing the Full Attack Continuum Before, During, and After an Attack
sponsored by Cisco
WHITE PAPER: In this white paper, you will discover a new threat-centric security model that delivers visibility and control your business needs across its extended network.
Posted: 04 Feb 2016 | Published: 31 Dec 2014

Cisco

Factoring the Human Element into Your Data Breach Response
sponsored by AllClear ID
WHITE PAPER: Access this white paper to see how emotional reactions to a security breach can affect your crisis management.
Posted: 25 Jan 2016 | Published: 09 Dec 2015

AllClear ID

Ponemon Study Finds IT Security Not Prepared for Advanced Attacks
sponsored by Prelert
WHITE PAPER: This white paper examines how security vulnerabilities compile when you ignore your organization's threat intelligence strategy. View now to learn the top network threats and how to detect them faster by enhancing threat intelligence.
Posted: 04 Feb 2016 | Published: 28 Oct 2015

Prelert
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement