Software  >   Systems Software  >  

Security Tools

RSS Feed    Add to Google    Add to My Yahoo!
Security ToolsReports
 
IT Security Case Studies
sponsored by ComputerWeekly.com
CASE STUDY: Warwick Ashford presents 4 critical IT security case-studies selected from the winners of Computer Weekly's European User Awards.
Posted: 21 Jun 2013 | Published: 21 Jun 2013

ComputerWeekly.com

Securely Accelerate Your Mobile Business
sponsored by CA Technologies.
WHITE PAPER: This exclusive paper discusses how you can take an application- and data-centric approach to mobile security so you can balance business enablement with protection, all the while maintaining user privacy.
Posted: 11 Dec 2013 | Published: 11 Dec 2013

CA Technologies.

Rethink Defense-In-Depth Security Model For BYOD
sponsored by SearchSecurity.com
EGUIDE: This e-guide from SearchSecurity.com explores why the endpoint security model is failing and explains why defense-in-depth controls must assume endpoints are always vulnerable – and always compromised.
Posted: 03 Jul 2013 | Published: 03 Jul 2013

SearchSecurity.com

How Threat Intelligence Can Give Enterprise Security the Upper Hand
sponsored by SearchSecurity.com
EGUIDE: Attackers and threats on security are advancing at an alarming rate and many enterprises are not able to keep up. Take a look at this guide to learn more about threat intelligence and how it can be incorporating into your current security program.
Posted: 03 Dec 2013 | Published: 03 Dec 2013

SearchSecurity.com

Securosis Report: Replacing Your SIEM with Security Management 2.5 Yet?
sponsored by IBM
WHITE PAPER: This white paper offers insight on the needs and requirements that security information and event management (SIEM) solutions should address. Read on to learn if your current SIEM vendor is enough, or if you should consider a replacement that better fits today's IT environment.
Posted: 06 Mar 2014 | Published: 01 Feb 2014

IBM

Security Think Tank: Bring your own device
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: With the growth of BYOD, what measures can IT take to ensure the security of enterprise data and does Mobile Device Management (MDM) really have a role? Leading security specialists offer their advice.
Posted: 21 Jun 2013 | Published: 21 Jun 2013

ComputerWeekly.com

Essential enterprise mobile device security controls
sponsored by SearchSecurity.com
WHITE PAPER: This expert paper discusses the key challenges for improving your mobile security and what tools you can leverage in order to overcome them. Access this resource now and find out which security control solutions are critical to secure your mobile environment.
Posted: 26 Nov 2013 | Published: 26 Nov 2013

SearchSecurity.com

Panda Cloud Systems Management: Management Datasheet
sponsored by Panda Security
WHITE PAPER: Access this informative resource to learn about a cloud-based IT management solution that can automate maintenance tasks centrally, saving time and money while improving security, efficiency and productivity.
Posted: 15 Jul 2013 | Published: 15 Jul 2013

Panda Security

eBook: Data Security in the E-discovery Process
sponsored by Dell and VMware
EBOOK: In this e-book from SearchCompliance.com, find expert advice that will help you ease the pain – and the cost – of e-discovery, as well as tips and tactics for bridging the gap between e-discovery and data security.
Posted: 27 Aug 2013 | Published: 31 Dec 2011

Dell and VMware

Defending Against APTs: Do You Have the Complete Picture?
sponsored by Hexis Cyber Solutions Inc
WHITE PAPER: Uncover the ins and outs of APTs and learn why current defenses lack the ability to protect your organization. In addition, learn about a pioneering security management approach that provides the features you need to combat these troublesome threats.
Posted: 17 Jul 2013 | Published: 17 Jul 2013

Hexis Cyber Solutions Inc
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement