IT Management  >   Systems Operations  >  

Systems Security

RSS Feed    Add to Google    Add to My Yahoo!
Systems SecurityReports
 
The Threat and Vulnerability Management Maturity Model
sponsored by Core Security Technologies
WHITE PAPER: This exclusive whitepaper dives into the threat and vulnerability management maturity model, explaining how it works to reduce the risk of breach.
Posted: 10 Dec 2014 | Published: 10 Dec 2014

Core Security Technologies

Vectra Networks: X-Series Product Datasheet
sponsored by Vectra Networks
DATA SHEET: This exclusive resource outlines the key benefits of a network security strategy that was able to deliver for organizations today. Read on to learn more.
Posted: 05 Dec 2014 | Published: 05 Dec 2014

Vectra Networks

The Transformation of Wireless Network Security
sponsored by SearchSecurity.com
EBOOK: Learn how to integrate Wi-Fi security into your overall network strategy to help maintain security in the age of wireless connectivity.
Posted: 10 Dec 2014 | Published: 10 Dec 2014

SearchSecurity.com

The Top 8 Mobile Security Risks: How to Protect Your Organization
sponsored by BlackBerry
WHITE PAPER: This helpful resource presents the top 8 mobile security risks that you need to be on top of right now in order to protect your business, and also provides a questionnaire designed to elucidate and resolve the gaps in your approach to mobile security.
Posted: 02 Dec 2014 | Published: 02 Dec 2014

BlackBerry

Gartner Evaluates 12 Web Access Management Solutions
sponsored by IBM
WHITE PAPER: This white paper from Gartner evaluates 12 leading Web access management solutions on criteria like customer experience, core goods and services, and pricing.
Posted: 05 Dec 2014 | Published: 15 Nov 2013

IBM

Analysis of the 4 Acceptable PCI DSS Storage Methods
sponsored by Delego
WHITE PAPER: Continue on to this important whitepaper now to explore the pros and cons of the four acceptable storage methods as outlined by the PCI DSS.
Posted: 12 Dec 2014 | Published: 12 Dec 2013

Delego

Data Security is Stormy in the Cloud
sponsored by SafeNet, Inc.
WHITE PAPER: This infographic presents a variety of informative statistics on the widespread struggle to keep data safe in the cloud.
Posted: 11 Dec 2014 | Published: 11 Dec 2014

SafeNet, Inc.

How SDN Will Enable Automated Network Security
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Dave Shackleford explains how the centralized control enabled by SDN will ultimately result in security-defined routing and other SDN security strategies that could forever change how we defend the network and the applications or data running across it.
Posted: 12 Dec 2014 | Published: 12 Dec 2014

Hewlett-Packard Company

Exclusive offer for AVG CloudCare Partners – 50% off AVG Cloud Backup
sponsored by AVG Technologies
SOFTWARE DEMO: This complimentary IT download will allow you to experience a reliable, automated, company-wide backup solution that will protect your customer's data while driving greater productivity.
Posted: 18 Dec 2014 | Premiered: 18 Dec 2014

AVG Technologies

Product Comparison: Network Performance Monitoring
sponsored by IT Central Station
ESSENTIAL GUIDE: With the number of network performance monitoring products on the market, searching for the right one for your organization can be a challenge. With IT Central Station's comprehensive report, you will find IT Professionals' honest opinions about the most popular vendors and products in network performance management today.
Posted: 08 Dec 2014 | Published: 08 Dec 2014

 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement