IT Systems  >   Business Systems  >  

Security Systems

RSS Feed    Add to Google    Add to My Yahoo!
Security SystemsReports
151 - 175 of 889 Matches Previous Page  | Next Page
A Manager’s Guide to Unified Threat Management and Next-Gen Firewalls
sponsored by Sophos, Inc.
WHITE PAPER: Unified Threat Management (UTM) is a common tool for most security professionals because of its ability to integrate multiple security technologies onto one platform. This brief guide explores the various questions you should ask when deciding your UTM systems.
Posted: 02 Jul 2014 | Published: 30 Nov 2013

Sophos, Inc.

2014 Gartner Magic Quadrant for SIEM
sponsored by AlienVault
ANALYST BRIEF: Download the 2014 SIEM Gartner Magic Quadrant now to learn more about what makes AlienVault a SIEM Visionary.
Posted: 30 Jun 2014 | Published: 30 Jun 2014

AlienVault

IPS/IDS: Innovations, Changes and How to Solve Your Problems
sponsored by IBM
EGUIDE: This expert e-guide explores recent innovations to IDS/IPS technologies and outlines strategies for solving breach-detection issues.
Posted: 25 Jun 2014 | Published: 25 Jun 2014

IBM

Benefits of Threat Intelligence
sponsored by IBM
EGUIDE: This expert e-guide explores new technology that technology integrates threat intelligence and evaluates it against known system vulnerabilities for better prioritization of security controls.
Posted: 25 Jun 2014 | Published: 25 Jun 2014

IBM

Defending Against Advanced Persistent Threats: Strategies for a New Era of Attacks
sponsored by CA Technologies.
WHITE PAPER: This guide takes a look at the growing risk of advanced persistent threats and what you can to prevent them.
Posted: 25 Jun 2014 | Published: 31 Dec 2013

CA Technologies.

Closing the Biggest Hole in Web Application Delivery
sponsored by CA Technologies.
WHITE PAPER: This informative whitepaper explores a strategy for closing the biggest hole in web application delivery.
Posted: 24 Jun 2014 | Published: 24 Jun 2014

CA Technologies.

Advanced Persistent Threats: Defending from the Inside Out
sponsored by CA Technologies.
WHITE PAPER: This white paper explains why reinvigorating your privileged identity management solutions, paired with data intelligence-driven content-awareness, can improve outsider and insider threat prevention.
Posted: 20 Jun 2014 | Published: 31 Jul 2012

CA Technologies.

Respect User Privacy While Securing the Cloud and Mobile Devices
sponsored by BitGlass
WHITE PAPER: This white paper offers a security solution that improves visibility and analytics capabilities across disparate mobile devices and cloud applications.
Posted: 20 Jun 2014 | Published: 20 Jun 2014


Secure Your Virtual and Cloud-Based Data Against Today's Security Threats
sponsored by Fortinet, Inc.
WHITE PAPER: This IDC report shares critical tips on how to secure a blended IT environment featuring physical data centers and cloud computing.
Posted: 20 Jun 2014 | Published: 28 Feb 2014

Fortinet, Inc.

Secure the Open Enterprise
sponsored by CA Technologies.
WHITE PAPER: This informative resource details the need for SaaS security and how to stop insider threats and external threats with the right SIEM solution.
Posted: 20 Jun 2014 | Published: 20 Jun 2014

CA Technologies.

The Changing Face Of Cyber-Attacks: Preventing Both External and Insider Threats
sponsored by CA Technologies.
WHITE PAPER: This resource highlights where organizations fall short in security and offers critical solutions to help improve data security, reduce costs, and maintain compliance via privileged identity management.
Posted: 19 Jun 2014 | Published: 30 Jun 2013

CA Technologies.

Privileged Identity Management Trends from Q1 2014
sponsored by CA Technologies.
WHITE PAPER: This Forrester Research, Inc. report highlights key trends that point to privileged identity management as a must-have security strategy, and highlights the top vendors who met an 18-item requirements list.
Posted: 19 Jun 2014 | Published: 28 Feb 2014

CA Technologies.

Protecting Your APIs Against Attack and Hijack with CA Layer 7
sponsored by CA Technologies.
WHITE PAPER: This white paper offers 5 best practices to help thwart API threats, which require different strategies than traditional Web infrastructures.
Posted: 19 Jun 2014 | Published: 28 Feb 2014

CA Technologies.

Secure Mobile and Cloud Technologies Within the Enterprise
sponsored by BitGlass
WHITE PAPER: This resource highlights 5 critical characteristics to have in a unified security solution that will protect mobility and cloud initiatives.
Posted: 19 Jun 2014 | Published: 19 Jun 2014


Best Practices for Facing Today's Log Management Challenges
sponsored by Alert Logic
WHITE PAPER: This whitepaper discusses key best practices to consider when evaluating automated log management solutions.
Posted: 19 Jun 2014 | Published: 31 May 2012

Alert Logic

Leading the Charge in Emerging MSSPs
sponsored by Alert Logic
WHITE PAPER: In this paper Forrester shares the results of their 15-criteria evaluation of the top ten emerging players in the MSSP market.
Posted: 19 Jun 2014 | Published: 08 Jan 2013

Alert Logic

Information Security in the E-Commerce Sector
sponsored by Alert Logic
WHITE PAPER: This resource looks at information security in the e-commerce sector, and how standards like PCI enforce the strong need to protect consumer personal information.
Posted: 18 Jun 2014 | Published: 28 Feb 2014

Alert Logic

Facilitating Enterprise Compliance With Globalscape® EFT™ and the High-Security Module
sponsored by GlobalScape
WHITE PAPER: In this white paper, discover how Enhanced File Transfer (EFT™) High Security module (HSM) combined with the Auditing and Reporting module (ARM) remains compliant to a variety of standards including PCI DSS.
Posted: 01 Jul 2014 | Published: 01 Jul 2014

GlobalScape

Exposing the Cybersecurity Cracks: A Global Perspective
sponsored by Websense, Inc.
WHITE PAPER: This eye-opening reviews data collected from nearly 5000 experienced IT workers regarding deficiencies in the ways that their companies attempt to think about, fight, and detect security breaches.
Posted: 01 Jul 2014 | Published: 30 Apr 2014

Websense, Inc.

Data Security for Mobile Users: One Size Does Not Fit All
sponsored by Accellion, Inc.
WHITE PAPER: Read this whitepaper to learn the 3 key criteria for customizing a mobile security policy for your users.
Posted: 01 Jul 2014 | Published: 30 Apr 2014

Accellion, Inc.

Accellion vs Box: 5 Key Reasons Enterprises Select Accellion
sponsored by Accellion, Inc.
WHITE PAPER: Read this whitepaper to learn how Accellion's private cloud answers the need for a mobile, scalable, flexible file sharing solution that extends and reinforces enterprise security policies and controls.
Posted: 01 Jul 2014 | Published: 30 Apr 2014

Accellion, Inc.

Best Practices for a Secure Mobile Workforce
sponsored by Accellion, Inc.
WHITE PAPER: Read this white paper to learn how to reduce the risk of mobile data breaches while keeping mobile workers productive.
Posted: 01 Jul 2014 | Published: 29 Apr 2014

Accellion, Inc.

A Manifesto for Cyber Resilience
sponsored by Symantec Corporation
WHITE PAPER: In this white paper, find out what it takes to become cyber resilient in this age of escalating threats.
Posted: 26 Jun 2014 | Published: 26 Jun 2014

Symantec Corporation

What's New in Symantec Data Loss Prevention
sponsored by Symantec Corporation
DATA SHEET: This data sheet gives you access to over 9 reasons why you should upgrade your software that focuses on data loss prevention.
Posted: 25 Jun 2014 | Published: 30 Apr 2014

Symantec Corporation

Operationalizing Information Security: Top 10 SIEM Implementer’s Checklist
sponsored by AccelOps Inc.
WHITE PAPER: This informative whitepaper outlines 10 best practices for successful SIEM implementation.
Posted: 23 Jun 2014 | Published: 23 Jun 2014

AccelOps Inc.
151 - 175 of 889 Matches Previous Page    5 6 7 8 9 10    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement