IT Systems  >   Business Systems  >  

Security Systems

RSS Feed    Add to Google    Add to My Yahoo!
Security Systems Reports
26 - 50 of 817 Matches Previous Page  |  Next Page
Defense Contractor Resolves Breach, Saves Thousands in IR Costs with Carbon Black
sponsored by Bit9 + Carbon Black
CASE STUDY: This exclusive case study looks at the security solution one system administrator for a major defense contractor turned to with their job on the line.
Posted: 14 Jan 2015 | Published: 15 Jan 2014

Bit9 + Carbon Black

Leading Department Store Discounts Traditional AV and Purchases Bit9 to Protect Against Advanced Threats and Targeted Attacks
sponsored by Bit9 + Carbon Black
WHITE PAPER: This valuable case study reveals the security platform one regional retailer chose to better protect themselves after national chains were attacked by advanced threats.
Posted: 14 Jan 2015 | Published: 15 Jan 2014

Bit9 + Carbon Black

Securing Microsoft Exchange 2010 with Symantec™ SSL Certificates
sponsored by Symantec Corporation
WHITE PAPER: This guide will help you take the guesswork out of implementing SSL for Exchange 2010, making it easier than ever to get the SSL certificate you need for a successful and secure Exchange implementation, and to take advantage of powerful capabilities such as Subject Alternative Names (SANs).
Posted: 12 Jan 2015 | Published: 02 Jul 2014

Symantec Corporation

A Smarter Approach to Network Encryption
sponsored by Certes Networks
WHITE PAPER: This white paper explores how enterprises can make network encryption easier to set up and manage, as well as transparent to network and application performance and behavior.
Posted: 09 Jan 2015 | Published: 16 Dec 2014

Certes Networks

Control the Flow of Content and Keep Your Organization Safe
sponsored by Box
WHITE PAPER: This important white paper dives into an admin console that will allow you to secure, manage, and report on all of your employees and their content.
Posted: 09 Jan 2015 | Published: 09 Jan 2015

Box

Regin: Top-Tier Espionage Tool Enables Stealthy Surveillance
sponsored by Symantec Corporation
WHITE PAPER: This exclusive white paper explores the stages of Regin, breaking down its complex architecture.
Posted: 08 Jan 2015 | Published: 22 Nov 2014

Symantec Corporation

Keep Your Data Safe in the Era of Distributed Computing
sponsored by Box
RESOURCE: Download this exclusive infographic now to learn about protecting your business content in the era of distributed computing.
Posted: 08 Jan 2015 | Published: 08 Jan 2015

Box

Improve Enterprise Security in the Age of Cloud and Mobile Computing
sponsored by Box
WHITE PAPER: This exclusive white paper offers up a security approach that can protect your data in the age of the cloud and mobile computing.
Posted: 07 Jan 2015 | Published: 06 Mar 2014

Box

The insider threat – solved with DRM
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Bob Tarzey and Bernt Østergaard look at the challenges faced by organisations when it comes to the insider threat and the protection of sensitive information.
Posted: 06 Jan 2015 | Published: 06 Jan 2015

ComputerWeekly.com

Securing the Modern Data Center: Building Proper Security Controls, Policies, and Processes to Address and Mitigate New Risks
sponsored by Cisco
WHITE PAPER: This paper reviews three data center trends and their risks.
Posted: 31 Dec 2014 | Published: 19 Nov 2014

Cisco

Move on From your Ineffective Static Security Approach
sponsored by Cisco
WHITE PAPER: In this paper, learn how Cisco FireSIGHT® Management Center (Management Center) supports the Cisco®suite of anti-malware, intrusion prevention system (IPS), and next-generation firewall security products.
Posted: 31 Dec 2014 | Published: 18 Nov 2014

Cisco

3 Essential Aspects of an Integrated Threat Defense Strategy
sponsored by Sourcefire
WHITE PAPER: This exclusive infographic explores the three key aspects of creating an integrated threat defense strategy that gives you the visibility to discover and protect against socially engineered exploits.
Posted: 31 Dec 2014 | Published: 31 Dec 2014

Sourcefire

Addressing the Full Attack Continuum: A New Threat-Centric Security Model for Before, During, and After an Attack
sponsored by Cisco
WHITE PAPER: This important white paper explores a security solution that spans the entire attack continuum.
Posted: 31 Dec 2014 | Published: 18 Nov 2014

Cisco

What to Look for in an Advanced Malware Protection Vendor
sponsored by Cisco
WHITE PAPER: This exclusive white paper explores the capabilities you must look for in your advanced malware protection vendor.
Posted: 31 Dec 2014 | Published: 26 Nov 2014

Cisco

The Cisco 2014 Midyear Security Report Identifying the Weak Links
sponsored by Sourcefire
WHITE PAPER: Download this extensive white paper now to learn about how to fight back with threat intelligence. Also uncover details on current industry trends and find out where things will go from here.
Posted: 29 Dec 2014 | Published: 29 Dec 2014

Sourcefire

5 New Laws of Antimalware Protection Keep Up with Evolving Threats
sponsored by Cisco
WHITE PAPER: Continue on to this essential white paper now to uncover five laws of anti-malware protection that can keep you safe.
Posted: 29 Dec 2014 | Published: 29 Dec 2014

Cisco

What's Behind a Cyber Attack?
sponsored by Avnet
WHITE PAPER: The what, when, and how of an enterprise security incident
Posted: 24 Dec 2014 | Published: 15 Apr 2014

Avnet

Get over 33% OFF AVG CloudCare with Their Limited Time "3 for 2 Offer"
sponsored by AVG Technologies
RESEARCH CONTENT: Download this brief resource today to find out about a solution that will allow you to proactively deliver profitable cloud-based IT services, support mobile working, and protect your customers, devices, and data.
Posted: 24 Dec 2014 | Published: 24 Dec 2014

AVG Technologies

The Cisco 2014 Midyear Security Report Identifying the Weak Links
sponsored by Sourcefire
WHITE PAPER: Download this infographic for a mid-year security report. Cyber-threats are evolving at an alarming rate. Heartbleed, Java vulnerabilities, and POS weaknesses are just a few of the key areas of concern.Download this infographic for a mid-year security report.
Posted: 24 Dec 2014 | Published: 24 Dec 2014

Sourcefire

Managing Security Risks and Vulnerabilities
sponsored by Avnet
WHITE PAPER: Access this valuable white paper now to learn how to protect high-value assets and provide scalable, cost-effective, integrated security across the entire IT environment and much more.
Posted: 22 Dec 2014 | Published: 08 Jan 2014

Avnet

AVG Content Filtering - Now Get 50% Off on Any 12- or 24-Month Subscription
sponsored by AVG Technologies
PRODUCT DEMO: This complimentary IT downloads lets you try a cloud content filtering solution for yourself.
Posted: 22 Dec 2014 | Premiered: 22 Dec 2014

AVG Technologies

Multifactor Authentication Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: In this virtual security classroom, Michael Cobb, a renowned security author with over 20 years of experience in the IT industry, surveys the latest authentication methods and technologies coming onto the market.
Posted: 16 Dec 2014 | Premiered: 15 Dec 2014

SearchSecurity.com

Hardware Security Module (HSM) Product Brief
sponsored by SafeNet, Inc.
PRODUCT OVERVIEW: This white paper introduces SafeNet's Luna SA, made for enterprises requiring strong cryptographic security for paper-to-digital initiatives, digital signatures, DNSSEC, hardware key storage, transactional acceleration, certificate signing, code or document signing, bulk key generation, data encryption, and more.
Posted: 15 Dec 2014 | Published: 09 Apr 2013

SafeNet, Inc.

A Centralized Key Management Solution for Your Enterprise's Security Needs
sponsored by SafeNet, Inc.
PRODUCT OVERVIEW: This white paper introduces SafeNet KeySecure: A single, centralized platform for managing cryptographic content (keys and related data) and applications, capable of running in on premise, cloud, or hybrid environments.
Posted: 15 Dec 2014 | Published: 18 Jul 2014

SafeNet, Inc.

Research Finds More Organizations Use Big Data Analytics for Security
sponsored by RSA
EGUIDE: This expert e-guide explores the rise of Big Data security analytics.
Posted: 02 Jan 2015 | Published: 02 Jan 2015

RSA
26 - 50 of 817 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement