IT Systems  >   Business Systems  >  

Security Systems

RSS Feed    Add to Google    Add to My Yahoo!
Security Systems Reports
26 - 50 of 855 Matches Previous Page  |  Next Page
Demystifying Mobile Security Attacks
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Discover the most common types of mobile attacks – Android malware apps, iOS surveillance, MITM, and more – and what you can do in order to detect and prevent them from causing damage.
Posted: 11 Jul 2016 | Published: 30 Mar 2015

Check Point Software Technologies Ltd.

Can a CASB Protect You from the 2016 Treacherous 12? Infographic
sponsored by Palerra Inc.
RESOURCE: Uncover if a Cloud Access Security Broker (CASB) is ideal for your enterprise's cloud security needs. Consult this infographic to see how CASBs measure up against the "Treacherous 12" threats identified by the Cloud Security Alliance, find detailed examples of cloud security issues and strategies relevant to your enterprise, and more.
Posted: 11 Jul 2016 | Published: 11 Jul 2016

Palerra Inc.

Mobility In Financial Services: A Regulatory Compliance Checklist
sponsored by BlackBerry
WHITE PAPER: Discover a checklist towards regulatory compliance on achieving regulatory compliance for mobility/EMM initiatives. Uncover key considerations, such as: what questions you should be asking your RFP/RFQ to EMM vendors, understanding who the key regulators are and their areas of interest, and more.
Posted: 11 Jul 2016 | Published: 11 Jul 2016

BlackBerry

Samsung Research America Secures Intellectual Property from Advanced Mobile Threats
sponsored by Check Point Software Technologies Ltd.
CASE STUDY: Discover how Samsung Research America handled the security of their mobile devices with a single, sweeping threat prevention strategy. Discover how they gained an in-depth threat defense, peace of mind, and more.
Posted: 11 Jul 2016 | Published: 11 Apr 2016

Check Point Software Technologies Ltd.

Can a CASB Protect You from the 2016 Treacherous 12?
sponsored by Palerra Inc.
WHITE PAPER: Is a Cloud Access Security Broker (CASB) solution ideal for your enterprise's cloud security needs? Discover how CASBs provide a variety of advantages, uncover a step-by-step comparison of a CASB solution to the "Treacherous 12" threats identified by the Cloud Security Alliance, and more.
Posted: 11 Jul 2016 | Published: 11 Jul 2016

Palerra Inc.

IT Compliance and Security: Reduce Security Exposure from Months to Minutes
sponsored by BMC
VIDEO: Learn how security and operations teams can more readily embrace key business initiatives by maintaining a posture of "audit ready all the time," using analytics for a stronger security stature, and mitigating risks.
Posted: 08 Jul 2016 | Premiered: 08 Jul 2016

BMC

Top 10 Values of Video Surveillance
sponsored by Pivot3
RESOURCE: Discover 10 reasons why video surveillance should be integrated into your enterprise's security policy, providing such benefits as incident deterrence, regulatory compliance, enhancement of other security systems, and more.
Posted: 08 Jul 2016 | Published: 08 Jul 2016

Pivot3

Reduce the Threat Attack Surface with Prescriptive and Actionable Data
sponsored by BMC
WHITE PAPER: What disconnected security and operations teams need is unprecedented visibility into their environment's threat stature. Learn how to bridge the so-called "SecOps gap" by prioritizing risks and reducing your overall attack surface.
Posted: 07 Jul 2016 | Published: 07 Jul 2016

BMC

Breakthrough Security and Compliance Practices for the Digital Enterprise
sponsored by BMC
WHITE PAPER: A comprehensive, aggressive automation strategy helps to sustain a high level of security and compliance. Discover ways to make automation a strategic asset in the fight against cyberthreats.
Posted: 05 Jul 2016 | Published: 05 Jul 2016

BMC

Amp Up Your Endpoint Data Security
sponsored by Dell and Microsoft
WHITE PAPER: More and more organizations are finding that effective security starts with endpoints. Discover ways to dramatically reduce the risk of harmful data breaches with proactive data protection, and advanced threat prevention designed for the mobile era.
Posted: 30 Jun 2016 | Published: 30 Jun 2016

Dell and Microsoft

A letter from the CEO: Connected Health Cloud Release
sponsored by CloudMine
WHITE PAPER: If you've been struggling to derive meaningful data insights, now you can with a HIPAA-compliant cloud solution that won't break the bank. It connects with big-data analytics platforms to help you gain a better understanding of patient data and take action to improve outcomes (all with impeccable threat detection capabilities).
Posted: 28 Jun 2016 | Published: 01 Mar 2016


HITRUST CSF Certification – Frequently Asked Questions
sponsored by Coalfire
WHITE PAPER: What do you know about the HITRUST Common Security Framework (CSF) Assurance Program? Access this resource now to obtain answers to 20 FAQs about HITRUST CSF – including its relationship with HIPAA – and bolster the security posture of your healthcare organization.
Posted: 28 Jun 2016 | Published: 28 Jun 2016

Coalfire

5 Security Best Practices Every Developer Needs to Know
sponsored by CloudMine
WEBCAST: Arm yourself with 5 security best practices that have been derived from the last three years of encountering, identifying, and neutralizing threats to mobile applications.
Posted: 28 Jun 2016 | Premiered: Jun 22, 2016


Taking a Decisive Stand against Fraud
sponsored by CyberSource
CASE STUDY: Learn how MetroDeal secured its site against a steadily growing level of fraud risk, and freed up staff time as an ancillary benefit. Access now to learn about the value they gained by taking a comprehensive stand against fraud.
Posted: 23 Jun 2016 | Published: 30 Aug 2013

CyberSource

Your Guide to Secure Access Architecture
sponsored by Fortinet, Inc.
WHITE PAPER: Evolving changes in usage, devices, and applications create an enormous challenge for IT organizations to protect the network from threat vectors. Explore ways to enable a secure network access architecture that helps keep internal enterprise assets safe, and protects users from cyber-attacks.
Posted: 23 Jun 2016 | Published: 23 Jun 2016

Fortinet, Inc.

Survey Results: Wireless Security Trends
sponsored by Fortinet, Inc.
WHITE PAPER: Over half of 1,300 surveyed IT decision-makers revealed their preference for cloud-based wireless network management. Explore how to enable the segmentation of devices and access layers across wired/wireless networks.
Posted: 23 Jun 2016 | Published: 23 Jun 2016

Fortinet, Inc.

Sandbox Technology: Building an Effective Breach Detection and Response Strategy
sponsored by Fortinet, Inc.
WHITE PAPER: Security professionals need to detect threats and manage risks to avoid data breaches. Discover why sandboxing is an essential component of a comprehensive prevention, detection, and response strategy to mitigate future attacks.
Posted: 23 Jun 2016 | Published: 30 Oct 2015

Fortinet, Inc.

The Advanced Threat Protection Buyer’s Checklist
sponsored by Fortinet, Inc.
WHITE PAPER: Use the following checklist to help determine the strength of your security strategy. Access now and explore ways to make informed choices to move towards an integrated system of prevention, detection, and mitigation against advanced threats.
Posted: 22 Jun 2016 | Published: 22 Jun 2016

Fortinet, Inc.

Advanced Threat Protection Buyer’s Guide
sponsored by Fortinet, Inc.
WHITE PAPER: To improve your network security, you must do more than augment the latest technology to your security repertoire. Discover 3 strategies for combating threats of varying sophistication.
Posted: 22 Jun 2016 | Published: 22 Jun 2016

Fortinet, Inc.

DX.com Achieves Immediate Results in Fraud Control
sponsored by CyberSource
WHITE PAPER: Discover how the popular online retailer DealeXtreme was able to automate and streamline fraud management operations. What could you learn to help reduce your fraud rate and save thousands in fraud avoidance?
Posted: 22 Jun 2016 | Published: 22 Jun 2016

CyberSource

A Look Behind the Firewall
sponsored by Fortinet, Inc.
RESOURCE: Discover in this infographic how to diagnose your network performance based on traffic devoted to social media, audio, and video—and determine how this media may compromise your security. Read on to discover how to run a cyber-threat assessment to ensure your core business assets are well protected.
Posted: 21 Jun 2016 | Published: 21 Jun 2016

Fortinet, Inc.

Easily Access Behind-the-Firewall Resources
sponsored by IBM
WHITE PAPER: Discover a solution to facilitate mobile collaboration with authorization, encryption, and containerization policies. Read on to find how it provides protected mobile access to corporate data without device VPN, uses in-app VPN tunnels to existing enterprise systems, protects sensitive corporate data with robust security policies, and more.
Posted: 17 Jun 2016 | Published: 17 Jun 2016

IBM

Secure Browser for Mobile Enterprise Devices
sponsored by IBM
WHITE PAPER: Discover how to address and reduce vulnerabilities from risky websites with a mobile browser solution. Read on to find how it uses a centralized management platform to deploy protected access to intranet and internet sites, controls the mobile internet experience though granular security policies, prevents attacks and malware, and more.
Posted: 17 Jun 2016 | Published: 17 Jun 2016

IBM

Protect and Distribute BYOD documents
sponsored by IBM
WHITE PAPER: Discover a scalable solution to mobile document protection that provides a secure way for users to collaborate on smartphones and tablets. Read on to learn how it can protect corporate documents from data leaks with containerization, centrally manage document distribution, selectively wipe managed documents, and more.
Posted: 17 Jun 2016 | Published: 17 Jun 2016

IBM

When to Adopt the Lift-and-Shift Cloud Migration Model
sponsored by New Relic
EGUIDE: This e-guide looks at the different ways of migrating apps to the cloud: re-architecting and "lift and shift" and which path an individual apps should take. Not all apps are created the same, and figuring out the correct approach could save an enterprise time and money.
Posted: 22 Jun 2016 | Published: 21 Jun 2016

New Relic
26 - 50 of 855 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement