IT Management  >   Systems Operations  >  

Systems Security

RSS Feed    Add to Google    Add to My Yahoo!
Systems Security Reports
 
The Cost of a Data Breach
sponsored by IBM
WHITE PAPER: This report uses statistical analysis to determine how much a breach will cost you depending on attack size, location, and type.
Posted: 22 May 2015 | Published: 31 May 2014

IBM

4 Factors Forcing IT to Modernize End-User Computing
sponsored by VMware
WHITE PAPER: Access this white paper to explore the top four end-user trends that are forcing IT to modernize end-user computing. Also, discover expert advice from CIOs as they share best practices for end-user computing management – even when time and budget are tight.
Posted: 19 May 2015 | Published: 31 Dec 2014

VMware

Peer 1 On Demand Cloud Platform™. For True Native Hybrid Cloud™
sponsored by Peer1
DATA SHEET: View this informative white paper to learn about an on demand cloud platform that enables you to provision complex True Native Hybrid Cloud™ solutions in just minutes from a single, intuitive control panel.
Posted: 11 May 2015 | Published: 11 May 2015

Peer1

Endpoint Security for Today's Cyber Risks
sponsored by Malwarebytes Corporation
WHITE PAPER: In this white paper, discover how you can create layered endpoint security with the combination of anti-malware and anti-exploit software.
Posted: 07 May 2015 | Published: 07 May 2015


Up and running in an instant. No contract, no capex, no delay.
sponsored by Peer1
WHITE PAPER: This white paper highlights an on demand cloud platform that delivers business agility, ease of use and outstanding value.
Posted: 06 May 2015 | Published: 06 May 2015

Peer1

An Inside Look at the On Demand Cloud Platform™
sponsored by Peer1
WHITE PAPER: Access this white paper to learn about a specific type of cloud platform that enables virtual cloud servers and bare metal cloud servers to be provisioned in minutes—all from a single, highly intuitive, easy-to-use control panel.
Posted: 07 May 2015 | Published: 07 May 2015

Peer1

Security on the Edge Classroom
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This classroom looks at enterprise strategies for network perimeter defense and next generation tools such as network access control, single sign-on, encryption certificates and more.
Posted: 05 May 2015 | Premiered: 04 May 2015

SearchSecurity.com

dapt Your Endpoint Security to Mobility and Advanced Threats
sponsored by AVG Technologies
EGUIDE: Read this expert guide to learn about the different kinds of endpoint security options available, and to begin creating strong, multi-layered defense for all your endpoints.
Posted: 21 May 2015 | Published: 21 May 2015

AVG Technologies

Best Practices for Web Application Security
sponsored by White Hat Security
EGUIDE: Access this exclusive e-guide to discover tips for tackling web application security through software development. Learn how to review your Web application security assessment tools and develop a strategy.
Posted: 06 May 2015 | Published: 06 May 2015

White Hat Security

Protect Your Data While Increasing End-User Productivity
sponsored by Absolute Software
WEBCAST: The District of Columbia National Guard (DCNG) once struggled to run inventories on devices and protect against data breaches. Tune in to the following webinar and learn how DCNG was able to improve inventory accountability and save resources.
Posted: 07 May 2015 | Premiered: Apr 8, 2014

Absolute Software
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement