IT Management  >   Systems Operations  >  

Systems Security

RSS Feed    Add to Google    Add to My Yahoo!
Systems Security Reports
How to Choose Your Next Sandboxing Solution
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Access this white paper for a look at the eight essential qualities of effective sandboxing solutions and advice from Gartner on preventing the most sophisticated unknown malware from compromising your systems and networks.
Posted: 12 Nov 2015 | Published: 13 Jul 2015

Check Point Software Technologies Ltd.

4 Customers who never have to refresh their PCs again
sponsored by Citrix
CASE STUDY: Access this white paper to explore the journey of four companies who reallocated their annual PC refresh budget into a cutting-edge solution that delivers employee mobility -- paired with IT management efficiency and corporate security -- all within, or under, the standard yearly budget allocated to replace outdated PCs.
Posted: 13 Nov 2015 | Published: 13 Nov 2015


Seven Questions to Ask Before Buying SIEM Products
sponsored by LogRhythm, Inc.
EGUIDE: This expert guide explores the most essential criteria to consider before purchasing your SIEM solution.
Posted: 17 Nov 2015 | Published: 17 Nov 2015

LogRhythm, Inc.

The Global Cost of Cyber Crime
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Discover the most salient findings of this enterprise security and intelligence study and learn what you can do to protect your organization.
Posted: 20 Nov 2015 | Published: 31 Oct 2015

Hewlett Packard Enterprise

API Security Now
sponsored by
EBOOK: Secure APIs are possible but not easy. This guide outlines the source for security risks with application program interfaces, and how to eliminate them.
Posted: 16 Nov 2015 | Published: 16 Nov 2015

Why Innovation Matters: Discussing 8x8's Patents and Technologies
sponsored by 8x8, Inc.
VIDEO: Watch this informative webcast to hear executives from 8x8 reflect on their culture of innovation and discuss why it matters to customers and to the cloud communications industry. You'll find out how their patents and technologies have changed the business communications market.
Posted: 23 Nov 2015 | Premiered: 22 Jan 2015

8x8, Inc.

Report on App, Platform and Device Preferences from Mobile Security Experts
sponsored by Good Technology
WHITE PAPER: Access this report for details on app, platform, and device preferences as analyzed by mobile security experts, and the methodologies behind them.
Posted: 25 Nov 2015 | Published: 06 Nov 2014

Good Technology

Malicious Email Files: The Growing Digital Weapon
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This infographic delivers some fast facts on email-based cyber-risks and how you can defend against them. Discover how advanced hackers are leveraging email against you and what you can do to stop them.
Posted: 17 Nov 2015 | Published: 17 Nov 2015

Check Point Software Technologies Ltd.

Smart Log Monitoring and Analysis: The Key to Security Success
sponsored by LogRhythm, Inc.
EGUIDE: This expert guide discusses how you can create a strategic log monitoring and analysis program that won't get in the way of your users' privacy.
Posted: 18 Nov 2015 | Published: 18 Nov 2015

LogRhythm, Inc.

The Rise of the Anytime-Anywhere Mobile Worker
sponsored by Good Technology
WHITE PAPER: In this white paper, you will learn how to harness the power of your anytime-anywhere workforce by viewing 8 key considerations to evaluate mobile platforms. Discover how to securely mobilize your enterprise, while also considering mobile data protection, app development, and more.
Posted: 23 Nov 2015 | Published: 31 Dec 2014

Good Technology
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement