IT Management  >   Systems Operations  >  

Systems Security

RSS Feed    Add to Google    Add to My Yahoo!
Systems SecurityReports
 
Addressing the Full Attack Continuum- A New Security Model For Before, During and After an Attack
sponsored by Cisco
WHITE PAPER: This important whitepaper will teach you how to develop a threat-centric security approach.
Posted: 17 Nov 2014 | Published: 17 Nov 2014

Cisco

CSC MyWorkStyle: The Next Generation Workforce
sponsored by CSC
WEBCAST: This exclusive webcast details a suite of mobile solutions that can solve key problems for EMM. Read on to learn more.
Posted: 21 Nov 2014 | Premiered: Nov 21, 2014

CSC

The Importance of Improving and Adapting Web Security
sponsored by Akamai Technologies
WHITE PAPER: This white paper explores CSOs' opinions and strategies regarding web security; the challenges that currently stand in the way of web security deployment within many organizations; and the options that businesses have for working through these critical issues.
Posted: 11 Nov 2014 | Published: 11 Nov 2014

Akamai Technologies

Bio-Reference Discovered the Key to Solving Network and Application Performance Issues
sponsored by Fluke Networks
WHITE PAPER: This case study provides insight into a solution that Bio-Reference Laboratories deployed to address network and application performance problems.
Posted: 13 Nov 2014 | Published: 23 Sep 2014

Fluke Networks

IBM Endpoint Manager, Built on BigFix Technology
sponsored by IBM
WHITE PAPER: This exclusive whitepaper explores how you can take control of your heterogeneous computing devices with effective endpoint management.
Posted: 11 Nov 2014 | Published: 09 May 2012

IBM

Central control. Manage, monitor and secure your network in minutes with ControlNow
sponsored by GFI
WHITE PAPER: This exclusive white paper takes an in-depth look at how one bank was able to recover and continue business after a security breach. Read on to learn more.
Posted: 24 Nov 2014 | Published: 24 Nov 2014

GFI

The Cloud Pillars: Five Foundational Building Blocks for Apps in the Cloud
sponsored by Rackspace
WHITE PAPER: This white paper explains the five pillars associated with cloud applications.
Posted: 13 Nov 2014 | Published: 13 Nov 2014

Rackspace

Finding the Right Security Assessment Approach for Your Organization
sponsored by Dell SecureWorks
WHITE PAPER: Download this exclusive whitepaper to determine how you should be assessing your security and explore test options.
Posted: 19 Nov 2014 | Published: 13 Nov 2013

Dell SecureWorks

Close the Gaps Left By Traditional Vulnerability Management Through Continuous Monitoring
sponsored by Tenable Network Security
WHITE PAPER: This white paper explores the results of a recent Forrester study of 180 security leaders on the current state and effectiveness of vulnerability management.
Posted: 12 Nov 2014 | Published: 28 Feb 2014

Tenable Network Security

Weighing Risk Against the Total Cost of a Data Breach
sponsored by Akamai Technologies
WHITE PAPER: This white paper provides an approach to determine the risk of web application cyber-attacks that could potentially affect your company.
Posted: 11 Nov 2014 | Published: 01 Aug 2014

Akamai Technologies
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement