IT Systems  >   Business Systems  >  

Security Systems

RSS Feed    Add to Google    Add to My Yahoo!
Security SystemsReports
226 - 250 of 734 Matches Previous Page  | Next Page
Retailers Relying on Mobile Solutions for ROI: The Big Picture
sponsored by Fiberlink
WHITE PAPER: This informative white paper discusses what functionalities and protections and MDM solution should offer, providing helpful tips and guidance for picking a solution that can empower you mobile workforce while keeping your data secure.
Posted: 28 Feb 2014 | Published: 28 Feb 2014

Fiberlink

From Target to Aggressor: How Data Centers are Becoming Unwitting Accomplices in Advanced Cyber Attacks
sponsored by FireEye
WHITE PAPER: This guide explores the widening gap between sophisticated cyber-attacks and the weak traditional defensive deployments in most data centers.
Posted: 28 Feb 2014 | Published: 31 Dec 2013

FireEye

The FireEye Advantage: A New Security Approach for Today’s Advanced Attacks
sponsored by FireEye
WHITE PAPER: The rapidly evolving threat landscape has rendered many traditional security tools obsolete and IT departments are left with questions on what to do next. This guide explores several security architectures and helps you decide which one is best for your organization.
Posted: 28 Feb 2014 | Published: 31 Dec 2013

FireEye

Dell Networking Support for Payment Card Industry Data Security Standard
sponsored by Dell, Inc.
WHITE PAPER: This white paper guides you through a series of deployments that help you achieve PCI compliance, thus improving overall network security practices.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

Dell, Inc.

Return to Sender: Improving Email Security with DMARC
sponsored by Imperva
EGUIDE: Learn how domain-based messaging authentication, reporting and conformance, or DMARC, can enhance your email security in this expert e-guide.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

Imperva

The 10 “Must-Haves” for Secure Enterprise Mobility
sponsored by Citrix
WHITE PAPER: This informative paper examines the common security issues surrounding BYOD and provides ten helpful "must-haves" for ensuring that your mobile initiatives are safe and secure.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

Citrix

Advanced Attacks Require Federal Agencies to Reimagine IT Security
sponsored by FireEye
WHITE PAPER: This guide outlines the malware "kill-chain" model used in many of today's cyber-attacks and how these can overwhelm traditional security tools.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

FireEye

Supply Chain Analysis: From Quartermaster to Sunshop
sponsored by FireEye
WHITE PAPER: This in-depth guide explores the current threat landscape and the role of APTs. Read now for more information on how APTs are being used for wide-scale cybercrime campaigns.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

FireEye

IAM for the Real World – Privileged Account Management
sponsored by Dell Software
WHITE PAPER: Read this e-book for essential information on common security issues with privileged account management – and how you can minimize or eliminate them.
Posted: 27 Feb 2014 | Published: 31 Dec 2012

Dell Software

Behavioral Analytics Applied to Security
sponsored by FileTrek
WHITE PAPER: This white paper details a new approach to threat detection that leverages big data and behavioral analytics technology to improve data protection and risk prevention.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

FileTrek

The CIO Guide to Virtual Server Data Protection
sponsored by CommVault Systems, Inc.
WHITE PAPER: This white paper takes on the data protection concerns that many organizations face when they virtualize and offers some insight into how these challenges can be met.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

CommVault Systems, Inc.

Unified Threat Management: RFP Technology Decisions
sponsored by SearchSecurity.com
EBOOK: To properly evaluate unified threat management (UTM) products, you must understand what each vendor offers and how well it fits with your organization.
Posted: 26 Feb 2014 | Published: 26 Feb 2014

SearchSecurity.com

Unified Threat Management: Decision Time
sponsored by SearchSecurity.com
EBOOK: Learn how to evaluate your potential vendor's UTM product and its ability to meet your specific business requirements.
Posted: 26 Feb 2014 | Published: 26 Feb 2014

SearchSecurity.com

12 Things Effective Intrusion Prevention Systems Should Do
sponsored by Dell, Inc.
WHITE PAPER: Uncover the top 12 features and functions that your intrusion prevention system (IPS) needs in order to defend against today's stealthy threats. Read on now to see if your organization is at risk.
Posted: 26 Feb 2014 | Published: 31 Dec 2013

Dell, Inc.

Why You Need A Next-Generation Firewall
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper explains how next-generation firewalls protect security systems from advanced attacks, and how they fit in with your business strategy.
Posted: 26 Feb 2014 | Published: 31 Dec 2013

Hewlett-Packard Company

Inspiring disruption: Tech Trends 2014
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This in depth study from Deloitte assesses the top 10 business technology trends in 2014 ranging from the role of the CIO to the impact pf wearable technology.
Posted: 26 Feb 2014 | Published: 26 Feb 2014

ComputerWeekly.com

Building a Better Network Security Strategy
sponsored by Hewlett-Packard Company
WHITE PAPER: This resource highlights results of a 4-question survey about network security, and what IT managers are looking for in a solution to address their top problems.
Posted: 25 Feb 2014 | Published: 25 Feb 2014

Hewlett-Packard Company

Unified Threat Management: From Business Problem to Technical Solution
sponsored by SearchSecurity.com
EBOOK: Learn how unified threat management (UTM) systems can help you achieve a layered security defense.
Posted: 25 Feb 2014 | Published: 25 Feb 2014

SearchSecurity.com

2013 Critical Capabilities for SIEM
sponsored by IBM
ANALYST REPORT: In this Gartner report, unveil a vendor comparison of the top 13 security information and event management (SIEM) offerings in the market today, and learn which capabilities are drawing businesses' attention.
Posted: 24 Feb 2014 | Published: 07 May 2013

IBM

2013 Magic Quadrant for SIEM
sponsored by IBM
ANALYST REPORT: This Gartner Magic Quadrant highlights the top 16 SIEM vendors in the market today, and why many are offering threat intelligence and security analytics with their services.
Posted: 24 Feb 2014 | Published: 07 May 2013

IBM

Henan Mobile Achieves Information Security with Centralized, Automated Platform
sponsored by Hewlett-Packard Company
WHITE PAPER: This case study features one telecommunications company's experience implementing a centralized, automated network security management platform. Read through to see how the business is benefiting from improved information security and simplified management.
Posted: 24 Feb 2014 | Published: 31 Jan 2013

Hewlett-Packard Company

Case Study: SEEK Protects Sites with Web Application Security Firewall
sponsored by Imperva
WEBCAST: This case study features one organization's experience with a Web application security solution that tackled technical, logic, denial-of-service, and fraud attacks to reduce risk and save its reputation.
Posted: 21 Feb 2014 | Premiered: Mar 19, 2013

Imperva

What Next Gen Firewalls Miss: 6 Requirements to Protect Web Applications
sponsored by Imperva
WHITE PAPER: Read this white paper to unveil the top 6 recommended features for Web application security that next-generation firewalls and an intrusion prevention system (IPS) often miss.
Posted: 21 Feb 2014 | Published: 31 Dec 2013

Imperva

Security in the Skies
sponsored by (ISC)2 UK Ltd
WHITE PAPER: This white paper highlights the major cloud security concerns and threats, and offers a list of controls to include in your security strategy to prevent these inherent risks.
Posted: 26 Feb 2014 | Published: 26 Feb 2014

(ISC)2 UK Ltd

Securing  Android, iOS and Windows Tablets and Smartphones
sponsored by Citrix
WHITE PAPER: This exclusive resource examines the common security challenges that managing various mobile platforms can pose, and discusses a solution that can allow you to deliver enterprise information securely to mobile devices regardless of platform.
Posted: 24 Feb 2014 | Published: 24 Feb 2014

Citrix
226 - 250 of 734 Matches Previous Page    8 9 10 11 12 13    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement