Vertical Industries  >   Financial Services Industry  >  

Security and Commodity Brokers

RSS Feed    Add to Google    Add to My Yahoo!
Security and Commodity Brokers Reports
The Power of Cloud-Based Software-as-a-Service (SaaS)
sponsored by PR Television
WEBCAST: In this webcast, learn about the four major areas that all organizations should address to ensure mobile workforce security and learn about recent developments in the malware landscape and BYOD security.
Posted: 15 Oct 2015 | Premiered: Oct 15, 2015

PR Television

Evaluate and Evolve Your Network Security Program in 10 Steps
sponsored by FireEye
WHITE PAPER: This white paper serves as a comprehensive guide for IT professionals evaluating enterprise network security. Read this report now to access the 10-step process for proper security program evaluation, how to conduct a program assessment, and more.
Posted: 21 Sep 2015 | Published: 21 Sep 2015


Overcoming the Big Disconnect in Web Security
sponsored by Akamai
WHITE PAPER: This white paper explains why partnering with a security service provider is an effective way to tackle many of the security issues enterprises face. Learn how to adapt to the shifting threat landscape by locating a platform that provides cloud security solutions.
Posted: 20 Oct 2015 | Published: 20 Oct 2015


Device Fingerprinting – Low-Friction, BYOD Authentication
sponsored by SecureAuth
WHITE PAPER: This white paper introduces SecureAuth's Device Fingerprinting, which features the flexibility, security, and convenience required to increase layers of authentication without creating high friction for users.
Posted: 20 Oct 2014 | Published: 16 Mar 2015


Your Personal Web Attack Survival Guide
sponsored by Imperva
WHITE PAPER: This white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.
Posted: 20 Feb 2014 | Published: 31 Dec 2013


Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013


Evolving Security Technologies Present New Opportunities for Businesses
sponsored by Fortinet, Inc.
WHITE PAPER: This exclusive paper examines the technologies that are changing the enterprise and effects that they have on your security environment. Read on and also learn about emerging security trends and requirements that can help keep your organization safe as technologies evolve.
Posted: 14 Mar 2014 | Published: 14 Mar 2014

Fortinet, Inc.

The Evolution of Application Vulnerabilities, Spam Threats, and Incident Response
sponsored by IBM
WHITE PAPER: This report details the many breaches and security incidents that have plagued organizations in recent years; threats from past years that are currently showing signs of resurgence; and issues to be aware of in today's security landscape.
Posted: 24 Jul 2014 | Published: 30 Jun 2014


Application Deployment in the Securities Industry: Making Functional Test Automation Work
sponsored by Infosys Technologies Limited
WHITE PAPER: The securities industry is characterized by complex transaction processing systems that handle multiple processes and interface with numerous upstream and downstream applications.
Posted: 03 Jan 2005 | Published: 01 Sep 2004

Infosys Technologies Limited

Are You Ready for the Future of IT?
sponsored by Cisco Systems, Inc.
WHITE PAPER: The Internet of Everything is here: More people, processes, data and things are connecting. Learn why you should embrace this new model.
Posted: 21 Aug 2014 | Published: 14 Mar 2014

Cisco Systems, Inc.
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement