Software  >   Systems Software  >  

Security Tools

RSS Feed    Add to Google    Add to My Yahoo!
Security ToolsReports
 
Preventing Security Risks in Real Time
sponsored by IBM
WHITE PAPER: This resource investigates why developing security intelligence – the ability to predict, identify, and react to potential threats – is a key priority in today's evolving threat landscape.
Posted: 16 Oct 2013 | Published: 31 Jul 2012

IBM

Are your DNS Servers as Secure and Available as the Rest of Your Network?
sponsored by Infoblox
WHITE PAPER: Did you know that DNS is probably a hole in your security? Fortunately, this white paper gives you information about how to protect your servers. Read on to learn what you can do to protect your organization.
Posted: 03 Dec 2013 | Published: 30 Sep 2013

Infoblox

Six Steps to SIEM Success
sponsored by AlienVault
WEBCAST: In this webinar, we cover the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment.
Posted: 16 Oct 2013 | Premiered: Oct 16, 2013

AlienVault

Manage data security and application threats with a muli-tiered approach
sponsored by IBM
WHITE PAPER: This resource introduces a portfolio of security tools that work together to provide the layered, multi-tier data and application protection that you're looking for.
Posted: 05 Mar 2014 | Published: 31 Jan 2014

IBM

Secure Managed File Transfers: How They Can Help Meet Compliance Regulations And Secure Your Data
sponsored by OpenText
WHITE PAPER: In this technical guide, gain expert insight on managed file transfer (MFT) systems, which help in meeting increased demands for security, compliance, and other operations, and why it should be your sole means for transmitting data within and outside of your organization.
Posted: 30 Oct 2013 | Published: 30 Oct 2013

OpenText

MDM for a Secure Mobile Workforce
sponsored by BlackBerry
EGUIDE: This expert guide from SearchSecurity.com provides an in-depth and highly topical review of current and near-future technologies, and deployment-tested implementation procedures that can help your organization secure your mobile workforce. Read on to learn more.
Posted: 18 Nov 2013 | Published: 18 Nov 2013

BlackBerry

Five security considerations in the mobile age - Strengthen security in mobile environments with WebSphere DataPower appliances
sponsored by IBM
WHITE PAPER: While mobility presents today's organizations with new business opportunities, it also introduces alarming security risks. This guide counts down five key security issues you need to consider in order to drive mobile success.
Posted: 17 May 2013 | Published: 31 Dec 2012

IBM

How Citrix ShareFile Enables Secure Data Sharing in the Enterprise
sponsored by Citrix Systems, Inc.
WHITE PAPER: This white paper will guide even the most experienced of IT professionals on how to share data securely in the face of IT trends like BYOD and mobile workforces.
Posted: 26 Aug 2013 | Published: 26 Aug 2013

Citrix Systems, Inc.

Pay-as-you-Grow Data Protection
sponsored by IBM
WHITE PAPER: This resource examines the data protection requirements of small to midsize businesses (SMBs), and introduces a strategy that enables your organization meet the challenges of explosive data growth.
Posted: 07 Nov 2013 | Published: 28 Feb 2013

IBM

CA Technologies Strategy & Vision for Cloud Identity and Access Management
sponsored by CA Technologies.
WHITE PAPER: This resource details a cloud-based identity and access management (IAM) solution designed to secure access to cloud-based services and apps, simplify IAM both on-premises and in the cloud, and improve efficiency. View now to learn more!
Posted: 19 Jul 2013 | Published: 28 Feb 2013

CA Technologies.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement