IT Systems  >   Business Systems  >  

Security Systems

RSS Feed    Add to Google    Add to My Yahoo!
Security Systems Reports
1 - 25 of 954 Matches Previous Page  |  Next Page
Endpoint Security is Changing – How Will You Keep Up?
sponsored by Webroot
WEBCAST: This research report uses statistics gathered from security professionals to examine the state of endpoint security today and where it is going in the future.
Posted: 31 Aug 2015 | Premiered: Dec 31, 2014

Webroot

Special Report: Which SIEM Platform is Best for You?
sponsored by IBM
WHITE PAPER: This Gartner report examines thirteen of the leading SIEM vendors, giving a detailed analysis of each one's strengths and weaknesses.
Posted: 31 Aug 2015 | Published: 20 Jul 2015

IBM

Partnering Up to Meet Your Clients' Security Needs
sponsored by Webroot
WHITE PAPER: This white paper discusses the opportunity that today's cybersecurity challenges present to solution providers and explains why finding the right security partner is essential for capitalizing on it.
Posted: 28 Aug 2015 | Published: 28 Aug 2015

Webroot

Time to Rebuild Your IT Infrastructure Security Policy
sponsored by VMware
EGUIDE: Access this exclusive e-guide to learn from the experts why IT security has taken a backseat to other IT initiatives and why you shouldn't wait to address security policy issues.
Posted: 28 Aug 2015 | Published: 28 Aug 2015

VMware

Eight Essential Elements for Effective Threat Intelligence Management
sponsored by BrightPoint Security
WHITE PAPER: This white paper contains eight techniques you can adopt to keep up with the ever-shifting threat intelligence landscape.
Posted: 27 Aug 2015 | Published: 27 Aug 2015

BrightPoint Security

Antivirus and Antimalware Solutions for VARs
sponsored by Webroot
WHITE PAPER: This white paper discusses the challenges VARs face when providing endpoint security and suggests offering cloud-based endpoint security as an alternative.
Posted: 27 Aug 2015 | Published: 27 Aug 2015

Webroot

Security Essentials for CIO's: Establishing a Department of Yes
sponsored by IBM
WHITE PAPER: This white paper presents a five-step process for enterprise security that allows you to encourage business innovation without putting your business at risk.
Posted: 26 Aug 2015 | Published: 31 Mar 2012

IBM

A Smarter Solution to Malware Prevention
sponsored by Webroot
WHITE PAPER: This white paper looks at how cloud-driven malware prevention can offer smarter endpoint protection in the face of advanced threats.
Posted: 26 Aug 2015 | Published: 30 Nov 2014

Webroot

Keep Data Secure in Today's High-Risk Environment
sponsored by Hewlett-Packard Limited
VIDEO: This video discusses how you can adopt data protection that provides the security you need in today's high-risk environment.
Posted: 25 Aug 2015 | Premiered: 31 Dec 2014

Hewlett-Packard Limited

Auditing Your Data for Insider Threats
sponsored by Splunk
WEBCAST: This webcast discusses how, with good network monitoring tools, you can find and detect even the subtlest insider threats.
Posted: 24 Aug 2015 | Premiered: May 14, 2015

Splunk

Case Study: A SIEM Effective Enough for a Government Contractor
sponsored by Splunk
WHITE PAPER: This white paper describes how a technology integration business found a SEIM solution strong enough to protect the sensitive government information it manages.
Posted: 24 Aug 2015 | Published: 24 Aug 2015

Splunk

Why Your Layered Security is Filled with Holes – And What You Can Do About It
sponsored by Malwarebytes Corporation
TRANSCRIPT: In this webinar transcript, security experts discuss why your layered security may not be as effective as you think, and what you can do instead.
Posted: 21 Aug 2015 | Published: 21 Aug 2015


Strong Authentication for Secure Employee Access
sponsored by SafeNet, Inc.
WHITE PAPER: This white paper describes how to enable two-factor authentication to all users and resources using a single automated backend—either from the cloud or on-premises. Download now to see how your organization could benefit from strong authentication.
Posted: 20 Aug 2015 | Published: 20 Aug 2015

SafeNet, Inc.

Strong Authentication: Securing Identities and Enabling Productivity
sponsored by SafeNet, Inc.
WHITE PAPER: Access this informative white paper to learn how strong authentication methods like USB tokens and smart cards are helping organizations to stay ahead of the security curve.
Posted: 20 Aug 2015 | Published: 20 Aug 2015

SafeNet, Inc.

A Faster, More Effective Way to Manage Authentication Deployments
sponsored by SafeNet, Inc.
WHITE PAPER: Next generation authentication services can make accessing virtualized and cloud-based services less of a struggle. Read on to see more of what a next generation authentication service can do for your organization.
Posted: 20 Aug 2015 | Published: 20 Aug 2015

SafeNet, Inc.

IAM and Authentication Trends in 2015
sponsored by SafeNet, Inc.
WEBCAST: This webcast takes into consideration the forces of the cloud, mobility, and user identity, and the way these forces are impacting IAM. The complex challenges created by these trends and what steps can be taken to overcome them are discussed.
Posted: 20 Aug 2015 | Premiered: Mar 24, 2015

SafeNet, Inc.

Understanding Zero-Day Attacks and Gaining Control
sponsored by Malwarebytes Corporation
WHITE PAPER: This webinar transcript discusses how you can better manage your vulnerabilities and effectively detect zero-day malware.
Posted: 20 Aug 2015 | Published: 20 Aug 2015


Growing the Security Analyst
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper coaches IT leaders on how to develop and retain the security analysts they need to keep their business safe.
Posted: 20 Aug 2015 | Published: 13 Nov 2014

Hewlett-Packard Company

How One Ukrainian Bank Secures High-Risk Online Transactions
sponsored by SafeNet, Inc.
CASE STUDY: This case study reveals the solution that enabled Prominvestbank, one of the largest banks in Ukraine, to securely authenticate their online banking customers and accept transaction signatures online. Read on to learn about the benefits that these security services could bring to your organization.
Posted: 19 Aug 2015 | Published: 19 Aug 2015

SafeNet, Inc.

Holistic Security for the Modern Threat
sponsored by Splunk
VIDEO: This video discusses the capabilities of a security platform that incorporates big data analytics, security investigating, and reporting, all of which can give you a holistic view of your network security.
Posted: 19 Aug 2015 | Premiered: 24 Jan 2014

Splunk

Understanding Zero-Day Attacks and Gaining Control
sponsored by Malwarebytes Corporation
PODCAST: This podcast discusses ways to mitigate zero-day vulnerabilities and to detect subtle zero-day attacks.
Posted: 19 Aug 2015 | Premiered: Jul 30, 2015


Case Study: Strong Authentication Provides Intellectual Property Security
sponsored by SafeNet, Inc.
WHITE PAPER: This case study describes how outerwear company O'Neill adopted a new authentication solution to heighten the security of its valuable intellectual property.
Posted: 18 Aug 2015 | Published: 18 Aug 2015

SafeNet, Inc.

Authentication That Keeps Your Mobile Devices Secure
sponsored by HID
WHITE PAPER: This white paper introduces a way for you to boost mobile security by enhancing your authentication practices.
Posted: 18 Aug 2015 | Published: 20 Feb 2013

HID

A guide to multi-layered web security
sponsored by Akamai
ESSENTIAL GUIDE: This essential guide details threats common to websites and web applications and what you can do to mitigate them. Read on to learn more.
Posted: 18 Aug 2015 | Published: 31 Dec 2014

Akamai

Protect Your Business Critical Apps from Compromise
sponsored by Onapsis
WHITE PAPER: This white paper describes how, with technologies ranging from vulnerability management to advanced threat protection, you can make sure your SAP applications stay secure.
Posted: 18 Aug 2015 | Published: 31 May 2015

Onapsis
1 - 25 of 954 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement