Standards  >  

Security Protocols

RSS Feed    Add to Google    Add to My Yahoo!
Security Protocols Reports
 
Five-Step Guide to Implementing Encrypted Traffic Management (ETM)
sponsored by Blue Coat Systems
RESOURCE: Discover a step-by-step guide on how to implement encrypted traffic management. Learn how to assess your network security tools, collaborate with multiple departments to ensure privacy compliance, and more.
Posted: 22 Jul 2016 | Published: 22 Jul 2016

Blue Coat Systems

Protect and Distribute BYOD documents
sponsored by IBM MaaS360
WHITE PAPER: Discover a scalable solution to mobile document protection that provides a secure way for users to collaborate on smartphones and tablets. Read on to learn how it can protect corporate documents from data leaks with containerization, centrally manage document distribution, selectively wipe managed documents, and more.
Posted: 17 Jun 2016 | Published: 17 Jun 2016

IBM MaaS360

Facing up to Mobile Security Challenges
sponsored by IBM MaaS360
WEBCAST: Expectations for mobile access to corporate data have never been greater. But, how do you enable your company with mobility and ensure security? View this webcast that details mobile security challenges and how to best prepare for them with a complete mobile strategy.
Posted: 09 Aug 2016 | Premiered: May 31, 2016

IBM MaaS360

Six Steps to SIEM Success
sponsored by AlienVault
WEBCAST: Discover a six-step methodology that helps you operationalize the detection of a security incident using your existing SIEM.
Posted: 26 Jul 2016 | Premiered: Jul 26, 2016

AlienVault

ESG Lab Review: User Behavior Analytics
sponsored by Exabeam
ANALYST REPORT: Discover the results of hands-on testing of a User Behavior Analytics (UBA) platform. Learn not only what such a platform should provide, but also how it tracks its users, identifies anomalous behaviors, and more.
Posted: 26 Jul 2016 | Published: 31 Mar 2016

Exabeam

Firewalls Revamping Your Policy and Dynamics
sponsored by Barracuda Networks
EGUIDE: In this e-guide, discover not only how to add the capabilities of next-gen firewalls to your security portfolio, but also the options an enterprise needs for their management. Uncover 3 management considerations to build out your firewall strategy.
Posted: 03 Aug 2016 | Published: 28 Jul 2016

Barracuda Networks

A New Guide to Critical Capabilities for Mobile Data Protection Solutions
sponsored by Digital Guardian
WHITE PAPER: In this white paper you will discover solutions for MDP to defend access to storage systems found in laptops, removable media and cloud environments. You will learn how to enforce secure policies across multiple platforms at minimal costs.
Posted: 28 Jan 2016 | Published: 08 Sep 2014

Digital Guardian

Samsung Research America Secures Intellectual Property from Advanced Mobile Threats
sponsored by Check Point Software Technologies Ltd.
CASE STUDY: Discover how Samsung Research America handled the security of their mobile devices with a single, sweeping threat prevention strategy. Discover how they gained an in-depth threat defense, peace of mind, and more.
Posted: 11 Jul 2016 | Published: 11 Apr 2016

Check Point Software Technologies Ltd.

A Technology Brief on SSL/TLS Traffic
sponsored by Blue Coat Systems
RESOURCE: In this resource, get a detailed breakdown of SSL/TLS traffic and not only its importance to enterprises but also the grave threat it can pose if malware hides in it. Discover the skills necessary to effectively utilize encrypted traffic and combat the malware threat.
Posted: 27 Jul 2016 | Published: 27 Jul 2016

Blue Coat Systems

Don't Let The Cloud Cast A Shadow On Security
sponsored by Cisco Systems, Inc.
RESOURCE: Discover how cloud adoption is exploding, how risks to enterprise data on the cloud are equally exploding, and how to protect your organization's livelihood after it migrates. Most importantly, learn how to turn your network into a sensor for enhanced security across your entire cloud infrastructure.
Posted: 17 Aug 2016 | Published: 17 Aug 2016

Cisco Systems, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement