IT Management  >   Systems Operations  >  

System Security

RSS Feed    Add to Google    Add to My Yahoo!
System Security Reports
 
Using Trend Micro’s Cloud & Data Center Security Solution to meet PCI DSS 3.0 Compliance
sponsored by TrendMicro
WHITE PAPER: This white paper examines a platform that delivers a comprehensive set of security controls optimized for modern data centered and the cloud.
Posted: 04 Feb 2016 | Published: 30 Apr 2015


Financial Sector Threats: 2015 Year in Review
sponsored by Digital Shadows
WHITE PAPER: In this white paper, you will read about threat activity in the financial sector as of 2015. It identifies new threats and includes public incidents of note such as extortion, malware and other sophisticated threats.
Posted: 02 Feb 2016 | Published: 31 Dec 2015

Digital Shadows

What Story Does Your IT Security Tell?
sponsored by Prelert
DATA SHEET: In this resource, you will discover how to analyze log data and locate anomalies in order to combat advanced cyberthreats with an anomaly detection application. Access this resource to apply behavioral analytics to any data resource—including Windows event logs, DNS logs, and firewall logs.
Posted: 28 Jan 2016 | Published: 31 Dec 2015

Prelert

The C-Suite & Cybersecurity: Six Reasons to Step up Your Security Game This Year
sponsored by AllClear ID
WHITE PAPER: In this white paper, Forrester Research describes the six most significant changes coming to security economics, government policy, the role of business in 2016 and what you should do about them.
Posted: 25 Jan 2016 | Published: 07 Dec 2015

AllClear ID

Making Risk Management More Effective with Security Ratings
sponsored by BitSight
WHITE PAPER: This white paper talks about some of the security risk management approaches organizations have taken as well as new approaches to othe growing problems.
Posted: 04 Feb 2016 | Published: 30 Apr 2014

BitSight

Get the Message: Why Secure Texting Matters
sponsored by SearchHealthIT.com
EBOOK: Texting is convenient -- but HIPAA regulations require organizations to consider the security of PHI. Get tips for instituting secure texting in healthcare.
Posted: 02 Feb 2016 | Published: 29 Jan 2016

SearchHealthIT.com

Multination Banking Company
sponsored by Digital Guardian
WHITE PAPER: This white paper shares the security story of a bank with over 50,000 employees and who serves over 50 million credit card customers.
Posted: 03 Feb 2016 | Published: 31 Dec 2014

Digital Guardian

5 Steps to Achieve Risk-based Application Security Management
sponsored by IBM
WHITE PAPER: This white paper will show you how to make applications security a strategically managed process.
Posted: 29 Jan 2016 | Published: 31 Jul 2015

IBM

Big Data Management: One Fast Query on All Your Data
sponsored by Oracle Corporation
VIDEO: Access this video to learn about a big data management strategy that can work seamlessly with Hadoop and NoSQL. Discover a way to gain access to a much bigger pool of data and maintain security, all for a lower TCO than building your own cluster.
Posted: 29 Jan 2016 | Premiered: 19 Nov 2014

Oracle Corporation

Cisco Advanced Malware Protection for Networks
sponsored by Cisco
WHITE PAPER: This white paper shows you an advanced malware protection solution that detects, blocks, tracks and contains malware threats across multiple threat vectors.
Posted: 05 Feb 2016 | Published: 31 Dec 2015

Cisco
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement