Vertical Industries  >  

Security Products Industry

RSS Feed    Add to Google    Add to My Yahoo!
Security Products Industry Reports
 
Log Management and Analytics: Your Guide
sponsored by Logentries
WEBCAST: Discover a demonstration on exactly how to successfully manage logs, server data, and analytics.
Posted: 19 Apr 2017 | Premiered: Apr 13, 2017

Logentries

The Future of DLP is Automation
sponsored by Ghangor Cloud
WHITE PAPER: Discover the evolution of data loss prevention from its origins to today and shine a light on the future of DLP and the role of automation as a driving factor in its effectiveness.
Posted: 03 Apr 2017 | Published: 30 Mar 2017

Ghangor Cloud

Effective Information Governance Strategies
sponsored by Iron Mountain
EGUIDE: In this e-guide, experts uncover how organizations are struggling to create effective information governance strategies and the increasing effects BYOD, Big Data, and hybrid storage environments are having on this process.
Posted: 07 Apr 2017 | Published: 03 Apr 2017

Iron Mountain

Mobile Security: The 6 Questions Modern Organizations are Asking
sponsored by Lookout
WHITE PAPER: As Gartner says, "It is becoming increasingly important that security leaders look at the anti-malware, mobile threat defense solutions market, the products available and how they should be used." Learn about six vital mobility areas that enterprises are concerned about, including the lack of visibility, protection, vulnerabilities, and more.
Posted: 30 Mar 2017 | Published: 30 Mar 2017

Lookout

Top 6 Best Practices For Workload Security In Public & Private Cloud
sponsored by Cloudvisory
WHITE PAPER: Learn 6 best practices that your organization can utilize to improve workload security on the cloud.
Posted: 12 Apr 2017 | Published: 12 Apr 2017

Cloudvisory

Why Your Organization Needs to be Cyber Resilent
sponsored by IBM
WHITE PAPER: 51% of companies believe that cyber resiliency is essential to achieving a strong security posture. Learn what it takes to be a cyber resilient organization, what barriers might be in your way, what threats you'll face, and more in this 2016 Ponemon study.
Posted: 12 Apr 2017 | Published: 30 Nov 2016

IBM

Learn How You can Provide UEM Across Desktops, Laptops, Tablets, Smartphones, and IoT
sponsored by IBM
DATA SHEET: Managing the security of all your organization's devices is a tall order, but it isn't impossible. In this data sheet, learn about a system that takes a smarter approach to unified endpoint management to help you consolidate your security.
Posted: 27 Apr 2017 | Published: 31 Mar 2017

IBM

Incident Response Tools Can Help Automate Your Security
sponsored by ModoModo
WHITE PAPER: A major security incident happening isn't a matter of "if", it's simply a matter of "when" for the modern business. This expert e-guide will lead you through the pillars of a solid incident response plan, how to automate your policy with incident response tools, and more.
Posted: 05 Apr 2017 | Published: 30 Mar 2017

ModoModo

Security: Making a Better Case for Technology in the Classroom
sponsored by Absolute
WHITE PAPER: Explore how educators can ensure the security and efficacy of desktop and mobile devices used by students and staff in K–12 schools while reducing IT administration and management demands and remaining compliant.
Posted: 03 Apr 2017 | Published: 03 Apr 2017

Absolute

Debunking the Top Four Myths About DDOS Attacks
sponsored by F5 Networks
WHITE PAPER: If you think you're ready for a DDoS attack—or that you don't need to worry about one—make sure you're not buying into some of these popular myths.
Posted: 21 Apr 2017 | Published: 30 Dec 2016

F5 Networks
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement