Business of Information Technology  >   Business Management  >   Financial Management  >   Budgeting  >   IT Spending  >  

Security Spending

RSS Feed    Add to Google    Add to My Yahoo!
Security SpendingReports
101 - 125 of 151 Matches Previous Page  | Next Page
The State of Privacy and Data Security Compliance
sponsored by Sophos, Inc.
ANALYST REPORT: The purpose of the study is to determine if various international, federal and state data security laws improve an organization’s security posture. What is the value of compliance and does it correlate with the value of the compliance effort? Read on to find out.
Posted: 25 Jun 2010 | Published: 30 Nov 2009

Sophos, Inc.

Information Security Magazine – June 2010: Laptop Lockdown
sponsored by Information Security Magazine
EZINE: This month’s cover story is on useful and affordable encryption options for preventing data loss in your organization’s riskiest endpoints. Other articles in this issue cover cloud security, Symantec’s recent acquisitions, compliance management, and a debate over hiring convicted hackers. Read these great articles and more in this month’s issue.
Posted: 16 Jun 2010 | Published: 16 Jun 2010

Information Security Magazine

Approaches to Distributed Denial of Service (DDoS) Protection: A Cost Analysis
sponsored by VeriSign, Inc
WHITE PAPER: Do you know what a Distributed Denial of Service (DDoS) attack might cost your organization? This white paper defines DDoS, examines the elements that make up a DDoS protection solution, and compares three different approaches to DDoS protection. Read this paper to learn how to ramp up protection and reduce costs.
Posted: 07 Jun 2010 | Published: 03 Jun 2010

VeriSign, Inc

E-Book: Technical Guide on Network Security Monitoring
sponsored by SearchMidMarketSecurity
EBOOK: SearchMidmarketSecurity.com presents a comprehensive guide to network security monitoring. Our experts cover all the angles with authoritative technical advice on: network security management; integrity monitoring; security device testing; intrusion prevention buying criteria; and how to prepare for your annual network audit.
Posted: 17 May 2010 | Published: 17 May 2010

SearchMidMarketSecurity

Protecting the Dynamic Datacenter
sponsored by Trend Micro
WHITE PAPER: Trend Micro server and application protection addresses the challenging operational security and compliance needs of today’s dynamic datacenter. We provide comprehensive protection, greater operational efficiency, superior platform support, and tighter integration with existing investments. Read this paper to learn more!
Posted: 17 Mar 2010 | Published: 01 Aug 2009

Trend Micro

Server and Application Protection - Behind the Lines
sponsored by Trend Micro
WHITE PAPER: For organizations evaluating the benefits of server and application protection systems and making a case for incorporating them into the IT infrastructure, Trend Micro recommends examining nine different areas of business interest. This white paper details these topics and examines Trend Micro server and application protection software.
Posted: 17 Mar 2010 | Published: 01 Feb 2009

Trend Micro

Information Security Magazine - February 2010: Under Control
sponsored by Information Security Magazine
EZINE: Feature articles this month cover bringing data loss prevention coverage to mobile endpoints, readers’ security priorities and top investments for 2010, and new compliance mandates in Massachusetts and Nevada that signal a new generation of data protection laws. Read on for these great articles and more.
Posted: 03 Feb 2010 | Published: 03 Feb 2010

Information Security Magazine

CORE IMPACT Pro V10
sponsored by Core Security Technologies
PRODUCT DEMO: Please join Core Security for a live demonstration of CORE IMPACT Pro, the most comprehensive product for performing security assurance testing on an organization’s network systems, endpoint systems, end users and web applications.
Posted: 30 Dec 2009 | Premiered: 30 Dec 2009

Core Security Technologies

The Total Economic Impact Of McAfee’s Network Security Platform’s Intrusion Prevention System: Multicompany Analysis
sponsored by McAfee, Inc.
ANALYST REPORT: This June 2009 study examines the financial impact and potential return on investment (ROI) for McAfee Network Security Platform intrusion prevention system (formerly McAfee IntruShield®), using Adena Health System as a case study.
Posted: 23 Nov 2009 | Published: 29 Aug 2009

McAfee, Inc.

Buyer’s Guide to Antimalware
sponsored by AVG Technologies USA, Inc.
EGUIDE: Companies face complicated buying decisions when it comes to buying host-based antimalware. Should you purchase a protection suite? What should you include in that all-in-one package? Read this guide for helpful information about purchasing antimalware products.
Posted: 20 Nov 2009 | Published: 20 Nov 2009

AVG Technologies USA, Inc.

Securing Web Applications and Databases for PCI Compliance
sponsored by Imperva
WHITE PAPER: This paper, designed for security and compliance professionals, illustrates how to achieve compliance on three of the most costly and complex sections: requirements 3, 6, and 10 of PCI DSS. This paper also highlights how Web application and database appliances can deliver resource effective compliance while maintaining cost efficiency.
Posted: 12 Nov 2009 | Published: 12 Jul 2009

Imperva

The Shortcut Guide to Prioritizing Security Spending Chapter 4: Best Practices for Prioritizing Security Spending
sponsored by IBM
EBOOK: Read this chapter for an exploration of best practices and topics to consider in security spending by framing them around four stages of IT management: assessing, designing, deploying, and monitoring/managing.
Posted: 27 Oct 2009 | Published: 25 Jun 2009

IBM

Practical Advantages of Fireware® XTM for Hands-On IT Administrators
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: Take a look at the new XTM (extensible threat management) network security from WatchGuard. See the tangible benefits this new generation of security solutions offers. No hype -- just concrete examples of XTM features and the advantages they deliver for you to evaluate against your current security.
Posted: 26 Oct 2009 | Published: 26 Jul 2009

WatchGuard Technologies, Inc.

NERC: What You Need to Know
sponsored by SearchSecurity.com & SearchCompliance.com
EBOOK: The North American Electric Reliability Corporation's regulations aim to protect the nation's vulnerable critical infrastructure. Read this E-Book to find out what responsible entities need to do to comply with the NERC.
Posted: 16 Oct 2009 | Published: 16 Oct 2009

SearchSecurity.com & SearchCompliance.com

Presentation Transcript: State of New York Government Case Study
sponsored by McAfee, Inc.
PRESENTATION TRANSCRIPT: Read this presentation transcript to see how the State of New York saved millions of dollars, reduced management time, and improved compliance by standardizing on McAfee for complete system protection.
Posted: 14 Oct 2009 | Published: 14 Oct 2009

McAfee, Inc.

Information Security Magazine - October 2009: Security 7 Awards
sponsored by Information Security Magazine
EZINE: The big news in this month's issue is the announcement of the winners of the fifth annual Security 7 Award. Other featured articles present tips for preventing future incidents and also explain how SOX compliance is hitting smaller public companies harder than the big guys. Read on for these great articles and more.
Posted: 13 Oct 2009 | Published: 13 Oct 2009

Information Security Magazine

Pocket E-Guide: Data Breach Dangers -- Learn to How to Protect Data and Lower Security Spending
sponsored by IBM
EGUIDE: Information security is important, but justifying increased security spending isn't. Even though important factors such as stock performance and customer loyalty are directly affected by security breaches. This E-Guide outlines three specific actions for your company to take in order to protect and promote brand trust by preventing data breaches.
Posted: 08 Oct 2009 | Published: 08 Oct 2009

IBM

Presentation Transcript: Beyond the PCI "Check list" -- A Path to Achieve Higher Levels of IT Security and Compliance
sponsored by Skybox Security
PRESENTATION TRANSCRIPT: PCI DSS is an opportunity for security professionals to leverage compliance initiatives to improve security and risk management. This presentation transcript illustrates how organizations must go beyond “checklist” compliance to improve security and IT efficiency -- through automation, prioritization, and focused attention on the critical issues.
Posted: 02 Oct 2009 | Published: 02 Oct 2009

Skybox Security

Presentation Transcript: Executive Roundtable - Optimizing Your Security Architecture
sponsored by McAfee, Inc.
PRESENTATION TRANSCRIPT: In this executive roundtable discussion, Representatives from McAfee, Qualcomm, and HP discuss what keeps security pros up at night. New sophisticated attacks in the threat landscape are changing security needs. Read this presentation transcript to learn more about an integrated approach to handling these new needs.
Posted: 01 Oct 2009 | Published: 01 Oct 2009

McAfee, Inc.

The New Face of Intrusion Prevention
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Check Point IPS Software Blade gives breakthrough performance and protection at a breakthrough price. For more details, check out this paper, which highlights the numerous benefits of Check Point intrusion prevention protection solutions.
Posted: 29 Sep 2009 | Published: 12 Jun 2009

Check Point Software Technologies Ltd.

Websense Security Labs: Data Loss Prevention
sponsored by Websense, Inc.
PRESENTATION TRANSCRIPT: Rich Mogull of Securosis answers the question, "What is Data Loss Prevention (DLP)?" In this presentation transcript he explains how DLP provides benefits for business and shows examples of DLP usage in the real world. Read on to learn more.
Posted: 29 Sep 2009 | Published: 28 Sep 2009

Websense, Inc.

Information Security Magazine - September 2009: Readers’ Choice Awards
sponsored by Information Security Magazine
EZINE: This issue of Security Information Magazine features the 2009 Readers’ Choice Awards. For the fourth consecutive year, our readers voted to determine the best security products. A record 1,721 voters participated this year, rating products in 17 different categories. There’s also a great article on the facts and myths about encryption and more.
Posted: 15 Sep 2009 | Published: 15 Sep 2009

Information Security Magazine

10 Common Pitfalls to Avoid When Evaluating Security Information Management (SIM) Solutions
sponsored by netForensics
WHITE PAPER: This paper was created to help companies searching for a SIM solution narrow their options and determine which technology is the right one for their IT environment and security objectives.
Posted: 10 Sep 2009 | Published: 10 Sep 2009

netForensics

McAfee Email and Web Security Appliance Trial
sponsored by McAfee, Inc.
PRODUCT DEMO: Email--Turn on the best filters, and walk away. Better malware detection rate and better spam and phishing catch rate--simply more effective than other filters. If that sounds like something you need, install a free trial of McAfee Email and Web Security Virtual Appliance behind your existing spam filter and see what real protection offers.
Posted: 02 Sep 2009 | Premiered: 02 Sep 2009

McAfee, Inc.

Solution Brief: Total Protection for Secure Business
sponsored by McAfee, Inc.
PRODUCT OVERVIEW: Total Protection for Secure Business. Secure your business across systems, email, web, and data—all with one affordable solution created for the midsize organization.
Posted: 01 Sep 2009 | Published: 01 Sep 2009

McAfee, Inc.
101 - 125 of 151 Matches Previous Page    3 4 5 6 7    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement