IT Management  >   Systems Operations  >  

System Security

RSS Feed    Add to Google    Add to My Yahoo!
System Security Reports
 
3 Common Password Policy Mistakes
sponsored by Specops Software
RESOURCE: Most organizations don't have adequate password policy requirements. Take a look at the 3 common password policy mistakes that your organization might be making.
Posted: 17 Apr 2017 | Published: 29 Jul 2016

Specops Software

Over 50% of Data is Mismanaged: Are You at Risk?
sponsored by Veritas
RESOURCE: Access this resource to see how to deploy information governance strategies to reduce storage, costs
Posted: 26 Apr 2017 | Published: 26 Apr 2017

Veritas

How to Find the Best DDoS Attack Prevention and Detection Tools
sponsored by SearchSecurity.com
EBOOK: In this handbook, one expert reveals how to select tools that will best strengthen your defense against DDoS attacks. Uncover 4 key questions to ask as you begin your DDoS defense strategy.
Posted: 10 Apr 2017 | Published: 05 Apr 2017

SearchSecurity.com

Actionable Threat Intelligence: Your Guide to the OilRig Malware Campaign
sponsored by LogRhythm, Inc.
WHITE PAPER: The OilRig campaign of cyberattacks have cut a bloody, digital swath through banks and governmental entities in Middle Eastern countries and the U.S. Provide your organization with actionable intelligence regarding threat actors and the tools, techniques, and procedures the OilRig malware campaign uses.
Posted: 12 Apr 2017 | Published: 31 Mar 2017

LogRhythm, Inc.

Keeping Up with the Evolution of Security Operations Centers
sponsored by McAfee, Inc.
WEBCAST: Your security operations center (SOC) is the backbone of what keeps both your data and your network safe with a centralized and consolidated cybersecurity incident prevention, detection and response capabilities. In this webcast, learn the pitfalls of a weak SOC, as well as how SOC infrastructure has changed and improved in recent years.
Posted: 19 Apr 2017 | Premiered: Apr 19, 2017, 01:13 EDT (05:13 GMT)

McAfee, Inc.

Identity Management: The Key to Stopping Breaches
sponsored by SailPoint Technologies
WHITE PAPER: With 43% of breaches caused by insiders, organizations need to find a better way to handle identity. Discover how to not only secure identities, but turn it into a business enabler, give your organization the power to build a modern security infrastructure that is centered around your users and their access to your data, and more.
Posted: 24 Apr 2017 | Published: 24 Apr 2017

SailPoint Technologies

Reduce End-to-End Encryption's Impact on Utilization and Response Time
sponsored by Oracle Corporation
RESOURCE: Discover how to reduce the effective impact of encryption on utilization and response time to be as close to zero as possible and allow the introduction of encryption integrated throughout the infrastructure stack, never allowing the data to be "clear" across the application, network and data ecosystem.
Posted: 26 Apr 2017 | Published: 15 Feb 2017

Oracle Corporation

Your In-Depth Guide to GDPR
sponsored by Oracle Corporation UK Ltd
WEBCAST: Gain an overview of what the key objectives of GDPR are, what it means for your organization, and what impact it will have on your business.
Posted: 13 Apr 2017 | Premiered: Apr 11, 2017

Oracle Corporation UK Ltd

Automation Isn't One-Size-Fits-All
sponsored by FireMon
WHITE PAPER: In this white paper, learn how intelligent policy automation can take the pressure off your firewall team by telling you which access to approve and which to deny, increasing speed and security of change management workflows.
Posted: 13 Apr 2017 | Published: 30 Dec 2016

FireMon

Safeguarding Healthcare Information and Leveraging Email Encryption in Your HIPAA Compliance Program
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Learn how to choose the right email encryption tool for your healthcare organization by keeping these 6 key differentiators in mind as you evaluate potential solutions.
Posted: 20 Apr 2017 | Published: 20 Apr 2017

Hewlett Packard Enterprise
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement