Search Results for: property

E-Book: Strategic guide to insider threat detection and breach response
Data loss by insiders poses a significant threat to enterprises, so it's critical to have a plan in place to detect, prevent or mitigate the behaviors of malicious insiders. This expert e-book discusses strategies for implementing insider threat detection tools and provides 10 simple steps for building a robust security breach response plan.

TechTarget Security

Defend Your Mobile Applications with Citrix NetScaler
Mobile apps are proliferating in businesses & are often the front end to a complex web property. Learn how to secure & optimize these apps.

Citrix

The Trouble Heading for Your Business 2013
This resource details the current state of targeted attacks and explores why putting an effective defensive strategy in place is so critical. View now to uncover the effects of these potentially disastrous attacks and what you can do to stay protected.

Trend Micro

Why Lendlease is embracing digital twin technology
Find out how Australia-based property developer Lendlease is using digital twins, data analytics and automation to break the bulwark of rising costs and declining productivity in the construction sector.

TechTarget ComputerWeekly.com

Presentation Transcript: Changing Authentication Options
Financial services institutions and enterprises developing high-value intellectual property need to stay on the leading edge of authentication technology.

ActivIdentity Corporation

Presentation Transcript: Risk Mitigation – Bang for the Buck
Financial services institutions and enterprises developing high-value intellectual property need to stay on the leading edge of authentication technology.

ActivIdentity Corporation

IBM Rational Asset Manager e-Kit
Explore the benefits of Rational Asset Manager with this IBM e-Kit. The e-Kit includes demos, white papers and a webcast. Discover how to track and audit your assets to utilize them for reuse, especially within a service-oriented architecture.

IBM

MicroScope June 2014
We investigate the current state of the independent software vendor market and the measures being taken to protect intellectual property and reveal the ACEs winners

MicroScope

Need all that speed?
'Storage' magazine examines nonvolatile memory express and the future of flash storage. We also look at combating ransomware and intellectual property theft.

TechTarget Storage

Are You Securely Delivering Enterprise Data and Services?
Cloud-adoption solutions to prevent  from violating corporate policy. Companies carefully craft security policies to protect sensitive enterprise data, intellectual property and financial information.

OpenText Security Solutions