IT Management  >   Systems Operations  >  

System Security

RSS Feed    Add to Google    Add to My Yahoo!
System Security Reports
 
Maximize Data Security with Encryption and Key Management
sponsored by SafeNet, Inc.
WHITE PAPER: This white paper explores a comprehensive approach to protecting the digital and traditional information that your enterprise collects and utilizes, based on 5 best practices for data security laid out by IBM.
Posted: 29 Jan 2015 | Published: 30 Jun 2014

SafeNet, Inc.

Security at the Speed of DevOps
sponsored by Risk IO
WEBCAST: This exclusive webcast explores the role DevOps can play in helping IT security make the most of their time.
Posted: 23 Jan 2015 | Premiered: Jan 13, 2015

Risk IO

Protecting Users from Firesheep and other Sidejacking Attacks with SSL
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses the Firesheep Wi-Fi attack tool and other sidejacking attacks with SSL and explains how to avoid these attacks.
Posted: 15 Jan 2015 | Published: 28 Feb 2014

Symantec Corporation

5 Steps For Windows Server 2003 End of Life Success
sponsored by Bit9 + Carbon Black
WHITE PAPER: Access this white paper today to learn the 5 steps that your organization needs to take now to ensure that your enterprise is prepared for Microsoft Windows Server 2003's end-of-life in six short months.
Posted: 14 Jan 2015 | Published: 06 Nov 2014

Bit9 + Carbon Black

Point of Sale (POS) Systems and Security
sponsored by Bit9 + Carbon Black
WHITE PAPER: This white paper explains why organizations need more than the PCI DSS compliance stamp in order to truly secure their POS systems; describes how to secure your POS systems against common attacks; and discusses the Council on CyberSecurity's top 20 suggestions for protecting payment card information.
Posted: 16 Jan 2015 | Published: 31 Oct 2014

Bit9 + Carbon Black

How Remote Access Solutions Deliver Business Value in UNIX/Linux Environments
sponsored by OpenText
WHITE PAPER: Inside this white paper, explore reasons why organizations should adopt remote access solutions for UNIX and Linux environments. Discover what capabilities to look for in a remote access solution for UNIX/Linux environments to enable a reliable, secure, high-performing access to applications.
Posted: 23 Jan 2015 | Published: 23 Jan 2015

OpenText

Security Throughout the File Transfer Life-Cycle: A Managed File Transfer Imperative
sponsored by Ipswitch File Transfer
WHITE PAPER: Check out this informative white paper that highlights a new approach to secure your file transfers, and details the specific features included in a MFT system.
Posted: 16 Jan 2015 | Published: 31 Dec 2014

Ipswitch File Transfer

Executive’s Guide to Windows Server 2003 End of Life
sponsored by Bit9 + Carbon Black
WHITE PAPER: This white paper aims to help executives navigate the process of creating and implementing an End of Life plan for Windows Server 2003.
Posted: 15 Jan 2015 | Published: 07 Nov 2014

Bit9 + Carbon Black

A Holistic Approach to Data Privacy
sponsored by Hewlett-Packard Limited & Intel® (Procesor Intel® Xeon®)
WHITE PAPER: This white paper makes a case for a holistic approach to privacy within every enterprise, and explains the steps that your enterprise needs to take in order to maximize the privacy of your sensitive data.
Posted: 16 Jan 2015 | Published: 30 Sep 2013

Hewlett-Packard Limited & Intel® (Procesor  Intel® Xeon®)

Turning the Corporate Network Inside Out
sponsored by Zscaler
WHITE PAPER: This exclusive white paper looks at how attacks have shifted from the data center to the web.
Posted: 27 Jan 2015 | Published: 27 Jan 2015

Zscaler
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement