IT Systems  >   Business Systems  >  

Security Systems

RSS Feed    Add to Google    Add to My Yahoo!
Security SystemsReports
126 - 150 of 919 Matches Previous Page  | Next Page
Strengthening Security, Compliance, and Control in Microsoft® Office 365®
sponsored by Actiance
WHITE PAPER: There are some missing features in Office 365 that will prompt some customers to consider the use of third-party, cloud-based or on-premises tools to enhance Office 365's native capabilities.
Posted: 22 Sep 2014 | Published: 22 Sep 2014

Actiance

Effectively Spot Security Threats with New SSL Visibilty Solutions
sponsored by Blue Coat Systems
WHITE PAPER: In this in-depth guide, discover new SSL visibility solutions that can help organization effectively monitor encrypted traffic and detect malicious content.
Posted: 22 Sep 2014 | Published: 31 Dec 2013

Blue Coat Systems

Expose Hidden Threats with new SSL Decryption Solutions
sponsored by Blue Coat Systems
WHITE PAPER: In this informative white paper, discover how crucial new SSL decryption and inspection solutions can help organizations manage threats and sensitive data on their network.
Posted: 22 Sep 2014 | Published: 30 Nov 2013

Blue Coat Systems

Eliminate Security Blindspots with New Encrypted Traffic Management Solutions
sponsored by Blue Coat Systems
RESOURCE: In this interactive guide, discover new encrypted traffic management solutions that can expose security blind spots without compromising privacy or regulatory compliance.
Posted: 19 Sep 2014 | Published: 19 Sep 2014

Blue Coat Systems

Get Unprecedented Visibility, Control, and Policy Creation Options with Encrypted Traffic Management
sponsored by Blue Coat Systems
RESOURCE: This concise info graphic presents a new encrypted traffic management solution that provides organizations with unprecedented visibility, control, and policy creation options.
Posted: 16 Sep 2014 | Published: 09 Dec 2013

Blue Coat Systems

Vendor Landscape: Intrusion Detection & Prevention Systems
sponsored by IBM
WHITE PAPER: Check out this helpful resource to get an inside evaluation of today's IDPS vendors and products, and uncover which are the best fit for your enterprise needs.
Posted: 12 Sep 2014 | Published: 31 Dec 2012

IBM

A Provactive New Approach to Integrated Security Intelligence
sponsored by IBM
WHITE PAPER: In this informative white paper, discover a new integrated vulnerability assessment and security intelligence solution that can enhance vulnerability insights and improve security efficiency.
Posted: 12 Sep 2014 | Published: 31 Jul 2013

IBM

Taming the Mobile File Sharing Beast
sponsored by Novell, Inc.
WHITE PAPER: In this in-depth white paper, uncover a solution for mobile file access that gives users unfettered access while keeping the process totally under IT control.
Posted: 10 Sep 2014 | Published: 31 Dec 2013

Novell, Inc.

Carving a path through IaaS security with CloudPassage
sponsored by CloudPassage
WHITE PAPER: Access this white paper to find out about one comprehensive solution that employs threat intelligence within the cloud and uses behavioral analysis to detect anomalies. Don't leave your cloud infrastructure at risk.
Posted: 05 Sep 2014 | Published: 21 Apr 2014

CloudPassage

451 Research Report: AlienVault USM - A Security Operations Center for the SMB
sponsored by AlienVault
WHITE PAPER: This in-depth 451 Research analysis examines AlienVault, a security vendor tailored for small and midsize businesses.
Posted: 05 Sep 2014 | Published: 05 Sep 2014

AlienVault

How to Reverse Engineer Domain Ownership in a Cyber Investigation
sponsored by DomainTools
WHITE PAPER: In this in-depth resource, discover the top security strategies that can help security uncover vital insights into the true identify of cyber attackers.
Posted: 04 Sep 2014 | Published: 04 Sep 2014

DomainTools

Piercing the Veil of Masked Cyber Criminals
sponsored by DomainTools
WHITE PAPER: In this helpful white paper, discover a new security solution that can help you identify cyber criminals, build a cyber-attack profile, and more effectively protect your valuable data and assets.
Posted: 04 Sep 2014 | Published: 04 Sep 2014

DomainTools

Managing IT Risk: Trends in Global Information Security
sponsored by Hewlett-Packard Limited
WEBCAST: Tune in to this informative webcast to hear industry veterans explore the top strategies for dealing with cyber threats, meeting compliance, and adapting to the newest developments in the security world, such as mobile device management. Click
Posted: 04 Sep 2014 | Premiered: Jun 30, 2014

Hewlett-Packard Limited

Inform e-Book Summer 2014
sponsored by Hewlett-Packard Company
WHITE PAPER: This extensive resource examines the latest and greatest in the world of IT security, including in-depth reports on advanced malware, security case studies, industry insider interviews, and more.
Posted: 26 Aug 2014 | Published: 31 Jul 2014

Hewlett-Packard Company

Guarding Against a Data Breach
sponsored by Hewlett-Packard Company
WHITE PAPER: In this informative white paper, discover how modern enterprises should respond to growing security threats while balancing economic and organizational concerns.
Posted: 22 Aug 2014 | Published: 31 Jan 2012

Hewlett-Packard Company

How Midsize Businesses Can Defend Against Enterprise-Caliber Threats
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper examines the security posture of midsize companies and how effective they are, as well as the four most important industry insights into midsize company security.
Posted: 21 Aug 2014 | Published: 21 Aug 2014

Hewlett-Packard Company

Today's IT Risks: Trends in Global Information Security
sponsored by Hewlett-Packard Limited
PRESENTATION TRANSCRIPT: In this helpful resource, industry veterans explore the biggest security challenges and trends facing IT professionals today, and explore the best practices for efficiently approaching these issues.
Posted: 21 Aug 2014 | Published: 21 Aug 2014

Hewlett-Packard Limited

Rising Cyber Crime Mandates More Effective Security Measures
sponsored by Hewlett-Packard Limited
WHITE PAPER: In this in-depth white paper, get the facts from industry veterans on how to best prevent data breaches and implement effective risk management.
Posted: 21 Aug 2014 | Published: 21 Aug 2014

Hewlett-Packard Limited

The Importance of Reputation
sponsored by Hewlett-Packard Company
WHITE PAPER: This guide explores the inexplicable link between data and security, and lays out the current threat landscape in today's ever-changing IT world.
Posted: 19 Aug 2014 | Published: 31 Dec 2013

Hewlett-Packard Company

SANS Security Analytics Survey
sponsored by Hewlett-Packard Company
ANALYST REPORT: In this analyst report by SANS, survey results indicate the need for security teams to detect and react more quickly to today's advanced threats. Learn why it's essential to invest in better security information and event management tools that offer advanced analytics and big data processing to accommodate data growth.
Posted: 19 Aug 2014 | Published: 30 Sep 2013

Hewlett-Packard Company

A Universal Log Management Solution
sponsored by Hewlett-Packard Company
WHITE PAPER: In this white paper, explore a universal log management solution that consolidates log data from security, compliance audit, IT operations, and application development teams to provide clear visibility to improve troubleshooting abilities.
Posted: 19 Aug 2014 | Published: 31 May 2012

Hewlett-Packard Company

The Wild World of Malware: Keeping Your Company Safe from Advanced Threats
sponsored by Icomm Technologies
WHITE PAPER: In this in-depth resource, gain essential knowledge on today's advanced malware threats, and discover how new next-generation firewalls (NGFW) can prevent them from gaining access to your valuable data.
Posted: 17 Sep 2014 | Published: 31 Jul 2012

Icomm Technologies

Vendor Landscape: Intrusion Detection and Prevention Systems
sponsored by IBM
WHITE PAPER: This comprehensive resource compares 12 competitors in the Intrusion Detection and Prevention Systems (IDPS) market, providing a number of tools for comparing and evaluating each vendor's solution in order to determine the best fit for your enterprise's needs.
Posted: 28 Aug 2014 | Published: 31 Dec 2013

IBM

Security for a Faster World
sponsored by Hewlett-Packard Company
WHITE PAPER: This eBook presents a maturity model that will help you determine how secure you really are, explores five questions every CIO should be able to answer, and outlines a new approach based on intelligence gathering and research that can keep you ahead of the cybercriminals.
Posted: 19 Aug 2014 | Published: 13 Jun 2013

Hewlett-Packard Company

Advanced identity tracking for social networking sites: Using HP ArcSight ESM to identify online predators
sponsored by Hewlett-Packard Company
WHITE PAPER: This critical resource exposes the truth behind online predators using social networking sites to stalk intended victims without being detected by authorities. Click now to see how a correlation engine can help pinpoint these criminals before their next attack.
Posted: 19 Aug 2014 | Published: 31 May 2012

Hewlett-Packard Company
126 - 150 of 919 Matches Previous Page    4 5 6 7 8 9    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement