IT Agents  >   IT Workforce  >   Information Technology Professionals  >   IT Managers  >  

Security Managers

RSS Feed    Add to Google    Add to My Yahoo!
Security Managers Reports
226 - 250 of 604 Matches Previous Page  |  Next Page
Web Security: Advanced Malware Protection
sponsored by Cisco Systems, Inc.
WHITE PAPER: This guide explores one company's unique advanced malware protection system and how it can provide you with cost-effective threat prevention.
Posted: 21 Apr 2014 | Published: 21 Apr 2014

Cisco Systems, Inc.

How to Consolidate Identities for Office 365 and Cloud Access
sponsored by Radiant Logic, Inc.
WEBCAST: This informative webcast discusses how you can ensure that your identity and access management (IAM) environment is prepared for Office 365, including handling authentication and managing directory requirements.
Posted: 18 Apr 2014 | Premiered: Apr 18, 2014

Radiant Logic, Inc.

Taking Managed Security Services To The Next Level
sponsored by Webroot
WHITE PAPER: This white paper discusses the changing IT security landscape, how MSPs will be impacted, and what they can do for their customers in the face of these security challenges.
Posted: 18 Apr 2014 | Published: 31 Oct 2013

Webroot

Policy Based Encryption: Protecting your Business Against Email Risks
sponsored by Apptix
WHITE PAPER: This white paper features a cloud-based gateway service offering policy-based encryption to protect your business email exchanges.
Posted: 18 Apr 2014 | Published: 31 Dec 2013

Apptix

Data Privacy: Where Should I House My Data?
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper offers 6 top recommendations on how to keep your data protected in the cloud and compliant with varying regulatory mandates across country borders.
Posted: 17 Apr 2014 | Published: 17 Apr 2014

IntraLinks, Inc

Cut through complexity: The key to IAM success
sponsored by RSA
ANALYST REPORT: This Ponemon Institute report sheds light on your organization's level of complexity and how to best reduce it for an effective, yet easy-to-manage identity and access management (IAM) program.
Posted: 17 Apr 2014 | Published: 31 Aug 2013

RSA

The Critical Incident Response Maturity Journey
sponsored by RSA
WHITE PAPER: This paper focuses on defining levels of critical incident response maturity and how organizations can continually improve their incident response capabilities to help reduce the risk of experiencing a damaging incident.
Posted: 16 Apr 2014 | Published: 31 Dec 2013

RSA

Next Generation Authentication for the Mobile Ready Enterprise
sponsored by RSA
WHITE PAPER: This white paper explores a multi-factor authentication solution that allows organizations to leverage existing security services to better manage the identities accessing IT services from mobile devices.
Posted: 16 Apr 2014 | Published: 16 Apr 2014

RSA

NSS Labs 2013 Network IPS Comparative Analysis
sponsored by IBM
WHITE PAPER: This resource explores the necessary elements to focus on when deploying a successful intrusion prevention system (IPS).
Posted: 14 Apr 2014 | Published: 31 Dec 2013

IBM

The Critical Incident Response Maturity Journey
sponsored by EMC Corporation
WHITE PAPER: This paper focuses on defining levels of critical incident response maturity and how organizations can continually improve their incident response capabilities to help reduce the risk of experiencing a damaging incident.
Posted: 14 Apr 2014 | Published: 31 Dec 2013

EMC Corporation

Eagle Bank Keeps Deposits and Customer Data Safe
sponsored by Imprivata
WHITE PAPER: This case study highlights one bank's successful enforcement of a strong password policy by implementing a single sign-on (SSO) solution. Read on to learn how you can maintain GLBA compliance, and reduce IT's access management.
Posted: 11 Apr 2014 | Published: 28 Feb 2010

Imprivata

Verity Credit Union Streamlines Application Access, Reduces Helpdesk Costs and Improves Customer Service
sponsored by Imprivata
WHITE PAPER: This case study shares one credit union's experience with an authentication solution that helped it efficiently manage user access across all applications without hindering productivity or adding costs.
Posted: 11 Apr 2014 | Published: 28 Feb 2010

Imprivata

A Roadmap for Big Data in Security Analytics
sponsored by EMC Corporation
WHITE PAPER: Starting with a foundational set of data management and analytic capabilities enables organizations to effectively build and scale security management as the enterprise evolves to meet Big Data challenges.
Posted: 11 Apr 2014 | Published: 31 Dec 2012

EMC Corporation

Transforming Traditional Security Strategies into an Early Warning System for Advanced Threats
sponsored by EMC Corporation
WHITE PAPER: To develop the visibility, agility and speed to deal with advanced threats, security information and event management (SIEM) systems need to evolve into a central nervous system for large-scale security analytics.
Posted: 11 Apr 2014 | Published: 30 Sep 2012

EMC Corporation

The Big Data Security Analytics Era is Here
sponsored by EMC Corporation
WHITE PAPER: Big data security analytics is no longer a visionary idea -- leading enterprises recognize that their immediate security requirements demand this type of solution.
Posted: 11 Apr 2014 | Published: 31 Jan 2014

EMC Corporation

Stock Yards Bank and Trust Makes Employees Productive and Keeps Data Secure
sponsored by Imprivata
WHITE PAPER: This case study features one large, trusted U.S. bank's experience with a simplified authentication solution that enabled increased productivity, compliance, and security levels.
Posted: 10 Apr 2014 | Published: 28 Feb 2010

Imprivata

Unique Capabilities for Protecting Data in Enterprise Hospital Environments
sponsored by BridgeHead Software
WEBCAST: This white paper explains 8 ways this data management solution exceeds other vendors' protection capabilities.
Posted: 10 Apr 2014 | Premiered: Dec 31, 2013

BridgeHead Software

The CIO’s Guide to HIPAA Compliant Text Messaging
sponsored by Imprivata
WHITE PAPER: This resource is a guide to ensuring secure texting policies while maintaining compliance with HIPAA and HITECH, and includes best practices and a vendor comparison checklist to use during product evaluation.
Posted: 10 Apr 2014 | Published: 31 Dec 2013

Imprivata

The Key to Seamless SSO: Building a Federated Identity Service
sponsored by Radiant Logic, Inc.
WHITE PAPER: This white paper explains why it's so difficult to deliver single sign-on that covers your entire portal, and also introduces a federated identity service that offers access to all sources of identity within your organization.
Posted: 10 Apr 2014 | Published: 10 Apr 2014

Radiant Logic, Inc.

Evaluating the True Impact of Fraud on Financial Institution
sponsored by IBM
WHITE PAPER: This guide makes an effective business case for fraud-prevention technology and evaluates the true impact of fraud on various financial institutions.
Posted: 09 Apr 2014 | Published: 31 Dec 2013

IBM

A UK Security Provider Fortifies its Systems for Greater Resiliency
sponsored by IBM
CASE STUDY: This informative case study explores one company's success with a disaster recovery plan and how it sought business continuity while ensuring security.
Posted: 08 Apr 2014 | Published: 31 Dec 2012

IBM

Real Time Endpoint Compliance for Continuous Diagnostics and Mitigation
sponsored by IBM
WHITE PAPER: Access this white paper to explore an endpoint management solution that will help federal agencies continuously monitor, manage, and detect vulnerabilities across their critical networks.
Posted: 08 Apr 2014 | Published: 31 Oct 2013

IBM

RSA Web Threat Detection - Innovative and Effective Online Threat Detection
sponsored by RSA
WHITE PAPER: This white paper features a Web threat detection solution that uses business intelligence to better pinpoint and predict the anomalies, improving investigation and analysis of malicious behavior.
Posted: 08 Apr 2014 | Published: 31 Jan 2014

RSA

No Silver Bullet: Eight Ways Malware Defeats Strong Security Controls
sponsored by IBM
WHITE PAPER: This whitepaper explores 8 ways malware can defeat your security strategy and outlines some key techniques for preventing these intrusions.
Posted: 08 Apr 2014 | Published: 31 Dec 2013

IBM

How to Leverage Free Tools to Secure Web Apps
sponsored by Imperva
EGUIDE: Expert Michael Cobb sheds light on the true benefits of a zero-cost, open source Web application security scanning tool.
Posted: 07 Apr 2014 | Published: 07 Apr 2014

Imperva
226 - 250 of 604 Matches Previous Page    8 9 10 11 12 13    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement