Software  >   Systems Software  >  

Security Tools

RSS Feed    Add to Google    Add to My Yahoo!
Security Tools Reports
 
Expert Tips to Keep Your Mobile App Secure
sponsored by CA Technologies.
WHITE PAPER: This white paper explores how enterprises can address the security problems in their app development.
Posted: 12 Jun 2015 | Published: 31 Dec 2014

CA Technologies.

Unified Security Management vs. SIEM: A Technical Comparison
sponsored by AlienVault
WHITE PAPER: This white paper explores why SIEM solutions have been proven to be less effective than their vendors claim.
Posted: 10 Jul 2015 | Published: 10 Jul 2015

AlienVault

5 Key Design Principles for Security Professionals
sponsored by Gigamon
WHITE PAPER: You know that the loss of a single device or power source could jeopardize network connectivity and your business. In this white paper, you will discover one powerful solution that can leverage traffic visibility and an intrusion protection system for continuous monitoring of the network.
Posted: 14 Apr 2015 | Published: 26 Sep 2014

Gigamon

Why Every IT Security Team Needs Anomaly Detection Software
sponsored by Prelert
WHITE PAPER: This white paper gives you the ins and outs of anomaly detection, including how it works and what its benefits are.
Posted: 25 Mar 2015 | Published: 31 Dec 2014

Prelert

The insider threat – solved with DRM
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Bob Tarzey and Bernt Østergaard look at the challenges faced by organisations when it comes to the insider threat and the protection of sensitive information.
Posted: 06 Jan 2015 | Published: 06 Jan 2015

ComputerWeekly.com

How to Sync, Share & Control Data Securely
sponsored by Commvault
WHITE PAPER: Access this resource to learn about a solution to data security in the world of cloud file sharing.
Posted: 03 Jun 2015 | Published: 03 Jun 2015

Commvault

Forrester: Use Actionable Threat Intelligence to Protect Your Digital Business
sponsored by Symantec Corporation
WHITE PAPER: Download this report from Forrester to figure out the key characteristic of actionable threat intelligence and learn how to maximize threat intelligence to protect your digital business from targeted cyber-attacks.
Posted: 14 Aug 2015 | Published: 14 Aug 2014

Symantec Corporation

Detecting Web App Vulnerabilities Before Hackers Do
sponsored by IBM
SOFTWARE DOWNLOAD: View now to learn how a web application analysis tool detects your web app vulnerabilities and compiles them in an easy to read security report to help you remediate faster. View now to learn more.
Posted: 24 Feb 2015 | Premiered: 18 Feb 2015

IBM

Manage Your Enterprise Apps Securely
sponsored by IBM
WHITE PAPER: Access this brief white paper to learn how you can ensure mobile app security with a mobile application management (MAM) solution.
Posted: 06 Jul 2015 | Published: 13 May 2015

IBM

Test Data Management for Security and Compliance
sponsored by EMC Corporation
WHITE PAPER: As big data continuously gets bigger, your IT organization must develop scalable new strategies to mitigate the increased risk of losing control of it. This white paper examines how test data management can play a vital role in safeguarding data privacy and ensuring regulatory compliance.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

EMC Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement