IT Management  >   Systems Operations  >  

System Security

RSS Feed    Add to Google    Add to My Yahoo!
System SecurityReports
 
The Story Behind The PCI Data Security Standard 3.0
sponsored by CDW Corporation
WEBCAST: This webcast reveals how PCI DSS has changed and several ways to manage compliance.
Posted: 29 Sep 2014 | Premiered: May 30, 2014

CDW Corporation

MobileIron Resource Booth
sponsored by SearchSecurity.com
VIRTUAL TRADESHOW: Almost every enterprise is now building out a mobile apps program. Many first generation mobile apps were not well designed, readily adopted by users, or built for supportability. This booth contains MobileIron assets that will cover lessons learned over the last two years of mobile app development as well as information on their MAM solutions.
Posted: 22 Sep 2014 | Premiered: Sep 22, 2014

TOPICS:  Security
SearchSecurity.com

It's 2014... Do You Know Where Your Data Is?
sponsored by CipherCloud
WEBCAST: This webcast takes a look at trends in the cloud that are seen across various types of industries, and specifically points out the growing importance of cloud security.
Posted: 25 Sep 2014 | Premiered: Sep 25, 2014

CipherCloud

IT Governance and Compliance Strategies for the CIO
sponsored by Box
EGUIDE: This expert e-guide offers advice for how CIO's can ensure their IT governance and compliance strategies are successful, and discover what technologies are available to mitigate compliance problems.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

Box

The Total Economic Impact of Verdasys Digital Guardian: Assigning Value to Information Protection
sponsored by Digital Guardian
WHITE PAPER: This resource examines the total economic impact and potential ROI enterprises may receive with Verdasys Digital Guardian.
Posted: 29 Sep 2014 | Published: 31 Oct 2013

Digital Guardian

5 Practical Tips To Protect Manufacturing Trade Secrets
sponsored by Digital Guardian
WHITE PAPER: In this white paper, discover the threats to manufacturing trade secrets—and chances are, your intellectual property is already under attack.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

Digital Guardian

Enabaling Secure Enterprise Mobility
sponsored by Aruba Networks
WHITE PAPER: This exclusive whitepaper explores four things you must focus on to ensure secure enterprise mobility for your organization.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Aruba Networks

Preventing Security Breaches by Eliminating the Need to Transmit and Store Passwords
sponsored by CA Technologies.
WHITE PAPER: In this in-depth report, explore new authentication security solutions that can eliminate weak password files and end the storage of passwords on the server – meaning there are no credentials for cyber criminals to steal.
Posted: 25 Sep 2014 | Published: 31 Aug 2014

CA Technologies.

Webcast: How Much Cybersecurity is Enough?
sponsored by CDW Corporation
WEBCAST: In this webcast, Kathleen Richards, the features editor of Information Security Magazine and searchSecurity.com, seeks to answer a key question: How much cybersecurity is enough?
Posted: 29 Sep 2014 | Premiered: Sep 16, 2014

CDW Corporation

Quantifying the Impact of Network-Based Attacks
sponsored by Icomm Technologies
WHITE PAPER: In this informative whitepaper, explore in-depth guidelines that will help assess the impact of attacks on your organization, and they can affect your bottom line.
Posted: 18 Sep 2014 | Published: 18 Sep 2014

Icomm Technologies
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement