IT Management  >   Systems Operations  >  

Systems Security

RSS Feed    Add to Google    Add to My Yahoo!
Systems SecurityReports
 
Why Next-Generation Firewalls Are Critical To Your Organization’s Network Security
sponsored by Icomm Technologies
WHITE PAPER: This in-depth white explores the next generation of firewalls, which can provide more effective advanced threat protection, enhanced application intelligence and control, and higher performance.
Posted: 18 Sep 2014 | Published: 18 Sep 2014

Icomm Technologies

Consolidating Remote Servers and Storage for Security, Efficiency
sponsored by Riverbed Technology, Inc.
WHITE PAPER: Access this white paper to find out how to decouple storage from its server over any distance and be available as if it were local to applications at the edge in remote offices.
Posted: 18 Sep 2014 | Published: 18 Sep 2014

Riverbed Technology, Inc.

How Data Breach Investigation Solutions Can Help You Prepare for Future Malware Attacks
sponsored by IBM
WHITE PAPER: This informative white paper introduces a fast, simple, and comprehensive breach investigation solution designed to help organizations defend against advanced persistent and internal threats, including fraud and abuse.
Posted: 16 Sep 2014 | Published: 16 Sep 2014

IBM

Best Practices for SIEM Advanced Attack Detection
sponsored by AlienVault
EGUIDE: In this expert eGuide, discover the best practices for today's SIEM solutions and how you can maximize their performance and effectiveness in your organization's IT security.
Posted: 23 Sep 2014 | Published: 23 Sep 2014

AlienVault

Expose Hidden Threats with new SSL Decryption Solutions
sponsored by Blue Coat Systems
WHITE PAPER: In this informative white paper, discover how crucial new SSL decryption and inspection solutions can help organizations manage threats and sensitive data on their network.
Posted: 22 Sep 2014 | Published: 30 Nov 2013

Blue Coat Systems

The Current State of Identity and Access Management
sponsored by RSA, The Security Division of EMC
VIDEO: This video explains the major shift with Identity and Access Management (IAM) in the past few years.
Posted: 08 Sep 2014 | Premiered: 13 Aug 2014

RSA, The Security Division of EMC

MobileIron Resource Booth
sponsored by SearchSecurity.com
VIRTUAL TRADESHOW: Almost every enterprise is now building out a mobile apps program. Many first generation mobile apps were not well designed, readily adopted by users, or built for supportability. This booth contains MobileIron assets that will cover lessons learned over the last two years of mobile app development as well as information on their MAM solutions.
Posted: 22 Sep 2014 | Premiered: Sep 22, 2014

TOPICS:  Security
SearchSecurity.com

Experts Addressing IT Challenges in Today's Mobile World
sponsored by CommVault Systems, Inc.
WEBCAST: The mobile workforce has different needs than your traditional workers.  You need to make sure you're protecting the data outside the company walls.
Posted: 09 Sep 2014 | Premiered: Feb 28, 2013

CommVault Systems, Inc.

Identity management compliance: How IAM systems support compliance
sponsored by IBM
EGUIDE: In this expert e-guide, learn about the identity management and compliance relationship, including how to ensure IAM technology and processes effectively support enterprise compliance.
Posted: 11 Sep 2014 | Published: 11 Sep 2014

IBM

The Wild World of Malware: Keeping Your Company Safe from Advanced Threats
sponsored by Icomm Technologies
WHITE PAPER: In this in-depth resource, gain essential knowledge on today's advanced malware threats, and discover how new next-generation firewalls (NGFW) can prevent them from gaining access to your valuable data.
Posted: 17 Sep 2014 | Published: 31 Jul 2012

Icomm Technologies
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement