Search Results for: Property-

Did you mean: property
   All     White Papers   Multimedia   IT Downloads 
31 - 40 of 3871 Matches Previous Page  |  Next Page
Security Appliances: New Strides in Preventing Intrusions
According to the most recent FBI/CSI survey on computer crime, hackers were responsible for over $23 billion in losses in 2006. But security appliances, which incorporate an array of security functions, now give SMBs the ability to ward off security breaches without breaking the bank or hiring more IT staff.

IBM

Collaboration solutions: Solutions for small and medium business
Check out this IBM resource center to identify collaboration software solutions specifically geared towards small and medium-sized businesses.

IBM

E-Guide: Monitoring Strategies for Insider Threat Detection
In this e-guide, you will learn about practical strategies for implementing insider threat detection tools. Also covered in this e-guide are the three common types of insider crimes and how each one requires its own set of insider threat detection tactics. Read on to learn more about monitoring strategies for insider threat detection.

IBM

Anatomy of a Data Breach: Why Breaches Happen…and What to Do About It
This paper examines the three most common causes of data breaches—well-meaning insiders, targeted attacks from outside the organization, and malicious insiders-- and then illustrates each cause to show that breaches can occur in.

Symantec Corporation

New Insider Threat Emerges in the New Economy
Learn how employees and partners are engaging with IT assets and intellectual property.

Lumension

e-Book: Chapter 3 - Litigation Holds: How Windows Shops Can Reduce Risk with a Successful Litigation Hold Process
The creation of an effective litigation hold process and procedures provides the foundation for a prepared approach to e-discovery and litigation readiness.

Symantec Corporation

Anti-X and the Mob: Addressing Content-Borne Threats with Unified Threat Management
Register for this webcast to learn more about the anatomy of a modern blended attack and how Unified Threat Management from Juniper Networks can help stop these threats at various points of their progression.

Juniper Networks, Inc.

Demo: Tivoli Identity Manager Express - Highlighting Security and Identity Management
This multi-part demonstration highlights the security and identity management functions, features, and value of IBM Tivoli Identity Manager Express, including how it can benefit your organization's endpoint security.

IBM

Make Your Data More Valuable With Real-Time Analytics
Location, location, location. True for property value, and for data value. Make an impact with enhanced enterprise data.

IBM

The Trouble Heading for Your Business 2013
This resource details the current state of targeted attacks and explores why putting an effective defensive strategy in place is so critical. View now to uncover the effects of these potentially disastrous attacks and what you can do to stay protected.

Trend Micro
31 - 40 of 3871 Matches Previous Page    2 3 4 5 6 7    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement