IT Management  >   Systems Operations  >   Security  >  

Security Network

RSS Feed    Add to Google    Add to My Yahoo!
Security NetworkReports
 
Addressing NIST and DOD Requirements for Mobile Device Management (MDM)
sponsored by IBM
WHITE PAPER: Read this exclusive white paper to gain key insights on the security risks associated with mobile device policies, as well as an in-depth look at one solution that was able to drive rock-solid security without risking network performance and end-user satisfaction. Read on to learn more.
Posted: 11 Nov 2014 | Published: 11 Nov 2014

IBM

The Top 5 Security Challenges of Higher Education
sponsored by Tenable Network Security
WHITE PAPER: This informative white paper discusses how in addition to the same IT security challenges as commercial enterprises, universities face a number of difficulties that are entirely unique to higher education.
Posted: 24 Oct 2014 | Published: 24 Oct 2014

Tenable Network Security

Website Security Threat Report 2014
sponsored by Symantec Corporation
WHITE PAPER: In 2013, attention was focused on threats to privacy and acts of malicious insiders.  However, the end of the year provideded a painful remind that cybercime remains prevalent today.
Posted: 26 Sep 2014 | Published: 30 Jun 2014

Symantec Corporation

Enable Secure Access to Apps
sponsored by IBM
DATA SHEET: The BYOD era has left IT with less control over the network, creating security and network integrity problems.  IT professionals are constantly striving to secure sensitive enterprise data and discover vulnerabilities.
Posted: 28 Aug 2014 | Published: 28 Aug 2014

IBM

How a service city improved their SMS alert system
sponsored by TalariaX
CASE STUDY: Access this case study to learn about an SMS alert system that was deployed in a California service city that was complementary to the existing fire department infrastructure but also enhanced communication capabilities for a more efficient and reliable notification system, while maintaining a low capital investment.
Posted: 17 Sep 2014 | Published: 31 Dec 2012

TalariaX

Putting Network Security Into Context
sponsored by SearchNetworking.com
EBOOK: Today's advanced threats demand a network security strategy that can adjust policies based on contextual data about users and apps.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

SearchNetworking.com

Application Delivery Optimization Tools: Evaluating Solutions and the Market
sponsored by F5 Networks
EGUIDE: This expert e-guide highlights 18 questions that will help you pinpoint the best fit tools for your application delivery optimization needs. Additionally, read on to learn how the application delivery controller (ADC) market is changing as enterprises adopt cloud services.
Posted: 05 Aug 2014 | Published: 05 Aug 2014

F5 Networks

A Consolidated Platform for Next-Generation Firewall and Secure Web Gateway Services
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper first defines next-generation firewalls, secure web gateways, and their capabilities, and then specifically discusses the Fortinet FortiGate NGFW and the results of ESG Lab's evaluation and testing of the device.
Posted: 16 Oct 2014 | Published: 30 Sep 2014

Fortinet, Inc.

Manage Identities & Access for Continuous Compliance & Reduced Risk
sponsored by IBM
WHITE PAPER: Learn how identity and access management solutions from IBM Security can help organizations protect critical assets.
Posted: 04 Sep 2014 | Published: 01 Apr 2014

IBM

Securing the Internet of Things
sponsored by SearchSecurity.com
EBOOK: In this Insider Edition, InfoSec pros will learn all about securing the Internet of Things, from determining the nature of the threats to creating an effective IoT security policy.
Posted: 13 Aug 2014 | Published: 12 Aug 2014

SearchSecurity.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement