IT Management  >   Systems Operations  >  

Systems Security

RSS Feed    Add to Google    Add to My Yahoo!
Systems SecurityReports
 
Simplified Third-Party Patching for Microsoft System Center with Shavlik
sponsored by Shavlik Technologies
WEBCAST: This exclusive webcast explores a solution that expands Microsoft System Center Configuration Manager's patching capabilities to cover third-party applications.
Posted: 14 Oct 2014 | Premiered: Oct 14, 2014

Shavlik Technologies

Best Practices for Leveraging Security Threat Intelligence
sponsored by AlienVault
WEBCAST: This exclusive webcast explores how you can use threat intelligence to stop attacks before they ever happen.
Posted: 09 Oct 2014 | Premiered: Oct 9, 2014

AlienVault

Computer Weekly – 28 October 2014: Securing critical industrial systems
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine the security threats to the industrial control systems that power the UK's critical national infrastructure. We look at the key considerations when choosing an infrastructure as a service supplier. And we compare six of the top hybrid flash array products. Read the issue now.
Posted: 24 Oct 2014 | Published: 24 Oct 2014

ComputerWeekly.com

Disk Encryption + Endpoint Backup: Before You Lock it Down, Back it Up
sponsored by Code42
WHITE PAPER: Read this whitepaper for eight considerations for choosing an endpoint backup solution.
Posted: 14 Oct 2014 | Published: 14 Oct 2014

Code42

HIPAA Compliance and Data Security with BYOD
sponsored by BitGlass
WHITE PAPER: This white paper describes the push and pull between the productivity gains that BYOD offers modern healthcare organizations and the security and compliance risks that it presents. IT also explains how to devise a mobile security solution that will satisfy both IT departments and employees.
Posted: 14 Oct 2014 | Published: 14 Oct 2014


Device Fingerprinting – Low-Friction, BYOD Authentication
sponsored by SecureAuth
WHITE PAPER: This white paper introduces SecureAuth's Device Fingerprinting, which features the flexibility, security, and convenience required to increase layers of authentication without creating high friction for users.
Posted: 20 Oct 2014 | Published: 20 Oct 2014

SecureAuth

All the Unusual Suspects
sponsored by Software AG
WHITE PAPER: This exclusive whitepaper breaks down the who, what, where, when, and why of automated surveillance in the financial market.
Posted: 15 Oct 2014 | Published: 15 Oct 2014

Software AG

10 Things Every IT Manager Must Know About the Enemy Within
sponsored by Clearswift
WHITE PAPER: This white paper contains critical information on where insider threats originate and explores one company's innovative tools for preventing data breaches within your enterprise.
Posted: 16 Oct 2014 | Published: 16 Oct 2014

Clearswift

What is an Identity Provider (IdP) and Why Do I Need one?
sponsored by SecureAuth
WHITE PAPER: This white paper addresses the reasons enterprises should become Identity Providers (IdPs), what becoming an IdP involves, and why you should consider automating this process as much as possible.
Posted: 24 Oct 2014 | Published: 24 Oct 2014

SecureAuth

Secure Identity and Smart Employee ID Solutions
sponsored by HID
VIDEO: This short video introduces HID Global's innovative approach to access management, in which one single ID credential provides fast, convenient access to doors, data, and cloud applications.
Posted: 17 Oct 2014 | Premiered: 17 Oct 2014

HID
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement