IT Management  >   Systems Operations  >  

Systems Security

RSS Feed    Add to Google    Add to My Yahoo!
Systems Security Reports
 
Best Practices for Healthcare Data Breach Prevention
sponsored by Absolute
WHITE PAPER: As healthcare records grow in value and popularity in underground markets, it's more important than ever to have airtight data protection and breach prevention protocols in place to keep patients' information safe. Whether you're in healthcare or another industry, learn how to keep information secure with data breach protection best practices.
Posted: 16 Dec 2016 | Published: 30 Nov 2016

Absolute

Improving Patient Care With Secure Mobile Software
sponsored by BlackBerry
CASE STUDY: Learn how UHB used mobile technology to improve patient care while ensuring security and empowering staff. For example, UHB deployed applications which serve as on-call systems providing physicians with real-time assistance.
Posted: 21 Dec 2016 | Published: 21 Dec 2016

BlackBerry

How to Seamlessly Integrate Security Into DevOps
sponsored by Veracode, Inc.
WHITE PAPER: Learn how to integrate security at multiple points into DevOps workflows in a collaborative way that is largely transparent to developers, and preserves the teamwork, agility and speed of DevOps and agile development environments.
Posted: 13 Jan 2017 | Published: 30 Sep 2016

Veracode, Inc.

Cyber Security: How to Know What You Don't Know
sponsored by Presidio Networked Solutions
WHITE PAPER: Learn how to figure out and mitigate your vulnerabilities so that your organization stays secure and your cyber security strategy keeps your data safe for whatever the future throws at it.
Posted: 18 Jan 2017 | Published: 18 Jan 2017

Presidio Networked Solutions

7 Ways To Make Yourself Hard To Hack
sponsored by Solarwinds MSP
WHITE PAPER: Your corporate data is likely spread across devices, networks, and servers. Learn 7 ways to make yourself harder to hack and secure your data. Learn to take a layered approach to security, increase network visibility to help spot system anomalies and more.
Posted: 10 Jan 2017 | Published: 10 Jan 2017

Solarwinds MSP

Using Log Data Streams for Real-Time Analytics: 4 Common Use Cases
sponsored by Logentries
WHITE PAPER: Explore 4 use cases that exemplify why real-time analytics are critical to performance and user experience. Read on to learn how leveraging analytics to ensure continuous service delivery and uptime can be the keys to your enterprise's success.
Posted: 13 Jan 2017 | Published: 13 Jan 2017

Logentries

Improve Network Security Speed and Performance
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: In this data sheet, you'll learn about security technology that upholds performance even as more security functions and features get added. Learn about these features, including agile firewall throughput, comprehensive network security services, and more.
Posted: 11 Jan 2017 | Published: 11 Jan 2017

WatchGuard Technologies, Inc.

The Power of Virtual Security
sponsored by Microsoft
EGUIDE: Learn how easy it is to inadequately secure your virtual environment and leave your network exposed as a result of BYOD and scattered management. You'll see why you need a single management policy for security, with layered safeguards ensuring consistent protection.
Posted: 20 Dec 2016 | Published: 20 Dec 2016

Microsoft

Two-Factor Authentication Helps Officers Protect and Serve New York
sponsored by BlackBerry
WHITE PAPER: Learn how field officers of the Suffolk County Police Department of Long Island, NY utilize two-factor authentication to protect and serve their constituents and keep their database safe.
Posted: 20 Dec 2016 | Published: 30 Nov 2016

BlackBerry

Email-borne Malware Highlights Danger of Over-reliance on Sandboxes
sponsored by Mimecast North America
WHITE PAPER: Gain an in-depth understanding of a recent email malware attack and how both strategy and effectiveness of weaponized attachments have evolved recently. Learn how to both prevent these kinds of attacks from crippling your organization and uncover recommendations to keep yourself safe from the future trends of malware.
Posted: 11 Jan 2017 | Published: 11 Jan 2017

Mimecast North America
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement