IT Management  >   Systems Operations  >  

System Security

RSS Feed    Add to Google    Add to My Yahoo!
System Security Reports
 
Trusted Identities: An Imperative for Digital Transformation
sponsored by Entrust, Inc.
WHITE PAPER: Learn how with a trusted identity, enterprises can be bold, but without it, they limit the business potential and the level of innovation through newly introduced risks.
Posted: 16 Mar 2017 | Published: 16 Mar 2017

Entrust, Inc.

Evaluating the Top Application Security Testing Vendors
sponsored by Veracode, Inc.
RESOURCE: This Gartner report focuses on top AST vendors' SAST, DAST and IAST offerings, maturity and features as tools or as a service. Learn all you need to know about top vendors' AST offerings to ensure you're picking the right tool for your business.
Posted: 10 Mar 2017 | Published: 28 Feb 2017

Veracode, Inc.

The Benefits of Public Cloud for Data Protection
sponsored by Quest
WHITE PAPER: Learn about another opportunity to use public cloud to make existing IT better. Uncover how to leverage the public cloud, or infrastructure-as-a-service (IaaS), for backup and recovery enabled data protection.
Posted: 10 Mar 2017 | Published: 10 Mar 2017

Quest

Case Study: Streamlining Security Without Creating Vulnerabilities
sponsored by Cisco and Dimension Data
CASE STUDY: Cuts to security in the name of "streamlining" can be more than just costly – they can leave an organization vulnerable. Learn how a large pharmaceutical company made an important change in its ICT strategy when it started considering cost effectiveness.
Posted: 24 Mar 2017 | Published: 24 Mar 2017

Cisco and Dimension Data

Encrypt Everything: How to Un-share and Secure Your Sensitive Data
sponsored by Gemalto
WHITE PAPER: Learn how to find a way to balance critical business needs and requirements, while protecting your data from malicious threats.
Posted: 15 Mar 2017 | Published: 15 Mar 2017

Gemalto

The 2016 Global Cloud Data Security Study
sponsored by Gemalto
WHITE PAPER: In this in-depth report conducted by the Ponemon Institute, uncover trends that are arising in cloud governance and security practices, how they can affect your organization, and recommendations on improving cloud governance.
Posted: 13 Mar 2017 | Published: 13 Mar 2017

Gemalto

Make Migration AWSome: Speed Up And De-Risk Your Migration To AWS
sponsored by Amazon Web Services
WHITE PAPER: Those moving to AWS face a substantial move that needs to be planned out ahead of time. Read on to learn about a service that helps you prepare for your AWS migration while minimizing the risk associated with such a move.
Posted: 22 Mar 2017 | Published: 22 Mar 2017

Amazon Web Services

Office 365: How to Deploy Truly Comprehensive Security
sponsored by Proofpoint, Inc.
RESOURCE: Find 10 tips for securing Office 365, including considerations for deploying effective email protection, blocking credential phishing, preventing business email compromise, and more.
Posted: 13 Mar 2017 | Published: 13 Mar 2017

Proofpoint, Inc.

Ensure the Right Solution for your RSA Data Protection Manager Migration
sponsored by Gemalto
WHITE PAPER: When looking to migrate your data protection manager (DPM), don't settle for re-packaged solutions that are not purpose built for your specific use case. This white paper details how to migrate your RSA DPM manager smoothly.
Posted: 15 Mar 2017 | Published: 15 Mar 2017

Gemalto

How to Use Log Management in Incident Response
sponsored by Logentries
WEBCAST: Learn the benefit of high synergy between IT incident response and log management systems. See as experts dive into 2 use cases for leveraging logs in incident response.
Posted: 15 Mar 2017 | Premiered: Mar 15, 2017

Logentries
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement