IT Management  >   Systems Operations  >  

Systems Security

RSS Feed    Add to Google    Add to My Yahoo!
Systems SecurityReports
 
Network Security Intelligence Selection Buying Guide
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper explains why network defense can make or break the success of an enterprise; and also introduces HP TippingPoint, a leader in security intelligence, as a potential solution.
Posted: 19 Nov 2014 | Published: 19 Nov 2014

Hewlett-Packard Company

Denial of Service Use Case for Predicting Outages before they Occur
sponsored by IBM
VIDEO: This video demo provides an overview of how IBM SmartCloud Analytics Predictive Insights helps provide early warning in preventing a security attack.
Posted: 07 Nov 2014 | Premiered: 07 Nov 2014

IBM

Next Generation Firewall Comparative Analysis
sponsored by Fortinet, Inc.
WHITE PAPER: Check out this important whitepaper now to find out as it examines the security effectiveness and value of 12 different next-generation firewall solutions from Cisco, Dell, Fortinet, and more.
Posted: 14 Nov 2014 | Published: 14 Nov 2014

Fortinet, Inc.

Mitigating User-Based Risks: Where Infrastructure Monitoring Falls Short, User-Based Monitoring Excels
sponsored by ObserveIT
WHITE PAPER: This white paper discusses the roles of trusted insiders versus outsiders in data breaches; identifying activities and intent when it comes to user-based threats; why user-based monitoring is a promising solution; and more.
Posted: 14 Nov 2014 | Published: 31 Oct 2014

ObserveIT

The Cloud Pillars: Five Foundational Building Blocks for Apps in the Cloud
sponsored by Rackspace
WHITE PAPER: This white paper explains the five pillars associated with cloud applications.
Posted: 13 Nov 2014 | Published: 13 Nov 2014

Rackspace

Security Analytics and Intelligence Survey 2014
sponsored by Hewlett-Packard Company
WHITE PAPER: This survey of 350 IT professionals explores how IT security teams use security analytics and intelligence to help detect cyber attacks.
Posted: 12 Nov 2014 | Published: 15 Oct 2014

Hewlett-Packard Company

Identity and Access Governance Buyer's Guide
sponsored by Courion Corporation
WHITE PAPER: This Identity and Access Governance Buyer's Guide is designed to help you define requirements for an Identity and Access Governance solution for your enterprise.
Posted: 21 Nov 2014 | Published: 21 Nov 2014

Courion Corporation

24/7 Visibility into Advanced Malware on Networks and Endpoints
sponsored by Tenable Network Security
WHITE PAPER: This white paper argues that containing the massive-scale security breaches that many high-profile organizations are experiencing requires a holistic approach that addresses vulnerabilities and threats at the network and system levels, and leverages threat intelligence to accurately identify attacks in progress.
Posted: 12 Nov 2014 | Published: 24 Oct 2014

Tenable Network Security

All you need to know about Bash bug and how to protect your data with IBM Endpoint Manager
sponsored by IBM
WHITE PAPER: This white paper examines how the "Bash bug" allows attackers to execute malicious code within a bash shell, allowing them to gain access to confidential information by taking control of the operating system. It also highlights how you can better identify which systems are vulnerable and protect your endpoints and data from this bug.
Posted: 11 Nov 2014 | Published: 26 Sep 2014

IBM

10 Steps for Implementing Strong Authentication in your Organization
sponsored by Gemalto
WHITE PAPER: This important whitepaper covers 10 crucial steps you must take to implement strong authentication in your organization.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

Gemalto
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement