IT Management  >   Systems Operations  >  

Systems Security

RSS Feed    Add to Google    Add to My Yahoo!
Systems Security Reports
Real-Time Protection from Advanced Web Threats
sponsored by Trustwave
WHITE PAPER: This white paper discusses how you can stay safe from web-based attacks without compromising your organization's online presence.
Posted: 05 Oct 2015 | Published: 31 Dec 2014


Simplifying Security for Software-Defined Data Centers
sponsored by HyTrust
WHITE PAPER: Save time on compliance and audit reporting and speed time to resolution for trouble shooting with advanced reporting on NSX admin access and changes.
Posted: 07 Oct 2015 | Published: 07 Oct 2015


DD4BC and the Rise of Extortion
sponsored by Akamai
WEBCAST: This webcast discusses the methods, capabilities, and risks cyber-extortion groups pose to your organization.
Posted: 18 Sep 2015 | Premiered: Sep 10, 2015


Old PCs Put Your Business at Risk
sponsored by Dell, Inc. and IntelĀ®
WHITE PAPER: Access this white paper to learn how hardware-enhanced security features work alongside software solutions to protect your business from malware and secure all the important, private data on all your endpoints. You'll explore three most common ways hackers can attack you desktops and five technologies that help protect your business.
Posted: 07 Oct 2015 | Published: 30 Apr 2015

Dell, Inc. and IntelĀ®

Compliance Made Easy
sponsored by HyTrust
WHITE PAPER: This resource introduces a comprehensive solution that can mitigate the risks of the virtualized infrastructure and support compliance with relevant regulatory requirements, including PCI, HIPAA and more.
Posted: 06 Oct 2015 | Published: 10 Aug 2015


Streamline Endpoint Security with the Cloud
sponsored by Trustwave
WHITE PAPER: This white paper explains how putting endpoint security in the cloud can give you effective security that's both affordable and simple.
Posted: 02 Oct 2015 | Published: 31 Dec 2014


Security Report: Are Your Customers Afraid to Share Data?
sponsored by Unisys
WHITE PAPER: In this report, survey results from the Australian public reveal how much consumers fear sharing their personal data and which industries they distrust the most.
Posted: 25 Sep 2015 | Published: 25 Sep 2015


Protegrity Big Data Protector for HDP
sponsored by Hortonworks
RESOURCE: Discover how one system can offer coarse grained (volume/file) and fine-grained (field/column) protection so that you can encrypt, tokenize, mask and monitor according to your specific business needs. Read on to learn if this system is right for your big data security needs.
Posted: 28 Sep 2015 | Published: 28 Sep 2015


Delivering Cloud-Based Mobile Apps to the Enterprise
sponsored by Dimension Data
EGUIDE: In this exclusive e-guide, learn expert tips for delivering cloud-based mobile apps to the enterprise. Read on to discover the two basic models for application delivery clouds and how the hybrid cloud is becoming an increasingly popular choice for enterprise mobile cloud delivery.
Posted: 25 Sep 2015 | Published: 25 Sep 2015

Dimension Data

State of File Collaboration Security
sponsored by FinalCode
WHITE PAPER: Access this research report on file collaboration security for insights into file data leakage risks, security processes and control maturity, perceived cloud-based file platform threats, and more.
Posted: 08 Oct 2015 | Published: 08 Oct 2015

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement