All Research Sponsored By:TechTarget Security

Mobility Management Selection Guide
WHITE PAPER: This exclusive paper takes an in-depth look at the criteria you can use to select the optimal enterprise mobility management system that can meet your specific, fast-paced, and consistently changing requirements.
Posted: 22 Jan 2014 | Published: 22 Jan 2014


Tips on Managing the Deluge of Information Security Threat Reports
EGUIDE: Don't get overwhelmed by today's cyber-attacks: Access this expert e-guide to take advantage of threat report data and use it as actionable intelligence. Read on to discover the real impact of insider security threats.
Posted: 02 Dec 2013 | Published: 02 Dec 2013


Creating and Enforcing Email Security Policies
EGUIDE: This expert guide examines effective methods of instituting and enforcing email security policies, such as putting the rules in writing and creating penalties for policy violation.
Posted: 02 Dec 2013 | Published: 02 Dec 2013


Cloud Security as a Service For Secure Cloud-Based Server Hosting
EGUIDE: Access this expert e-guide where industry specialist Joseph Granneman highlights the need for cloud-specific security tools, such as encryption and identity management, and how they can be offered as a service to better mitigate cloud computing risks.
Posted: 27 Nov 2013 | Published: 20 Apr 2011


Legacy Application Migration to the Cloud and Security
ESSENTIAL GUIDE: Access this resource to gain expert advice on how to plan ahead for a secure migration of legacy applications to the cloud.
Posted: 27 Nov 2013 | Published: 27 Nov 2013


Private Cloud Computing Security Issues
ESSENTIAL GUIDE: Access this expert resource to uncover some of the most notable cloud computing security issues to watch out for before deploying a private cloud.
Posted: 26 Nov 2013 | Published: 26 Nov 2013


Managing Hybrid Cloud Computing Risks
ESSENTIAL GUIDE: Access this resource to explore two key security questions to ask when it comes to your hybrid cloud computing project, and whether or not you have the right management tools to ensure a secure environment.
Posted: 26 Nov 2013 | Published: 22 Mar 2011


Endpoint Security IT Decision Center Handbook 2
EGUIDE: Access this expert handbook to discover which features any endpoint protection software should have, and 10 questions to ask your vendor before choosing your next IT security investment.
Posted: 25 Nov 2013 | Published: 25 Nov 2013


Data Center Modernization Starts With Cloud, SDN and Virtualization
EGUIDE: This expert guide covers the essentials of modernizing your data center.
Posted: 21 Nov 2013 | Published: 21 Nov 2013


Network Evolution: Software defined networks and the new network hyper-visor
EZINE: This expert resource puts SDN under the microscope, examining the impact that the technology can have on your environment, along with how your peers are utilizing it. Read on to find out whether SDN is really worth the hype that is building around it.
Posted: 20 Nov 2013 | Published: 20 Nov 2013


How Can You Avoid a Web Security Breach? It's All in the Preparation
EGUIDE: In this e-guide, from SearchCompliance.com, discover simple steps in order to avoid web security breaches.
Posted: 14 Nov 2013 | Published: 14 Nov 2013


Desktop Video Conference Preparation: 4 Key Steps
EGUIDE: This expert E-Guide discusses what to expect and how to tackle the potential challenges of mobile and desktop video conferences in the workplace.
Posted: 04 Nov 2013 | Published: 04 Nov 2013


Insider Edition: Antimalware Technologies and Techniques to the Rescue
EZINE: In this special edition of Information Security, our experts examine the recent advances in anti-malware detection and prevention, and which ones can tip the scale in your favor in the fight against malware.
Posted: 05 Mar 2014 | Published: 05 Mar 2014


Unified Threat Management: RFP Technology Decisions
EBOOK: To properly evaluate unified threat management (UTM) products, you must understand what each vendor offers and how well it fits with your organization.
Posted: 26 Feb 2014 | Published: 26 Feb 2014


Unified Threat Management: Decision Time
EBOOK: Learn how to evaluate your potential vendor's UTM product and its ability to meet your specific business requirements.
Posted: 26 Feb 2014 | Published: 26 Feb 2014


Unified Threat Management: From Business Problem to Technical Solution
EBOOK: Learn how unified threat management (UTM) systems can help you achieve a layered security defense.
Posted: 25 Feb 2014 | Published: 25 Feb 2014


Make Your SIEM the Best It Can Be: Stepping Up Your SIEM Usage
EGUIDE: Receive expert guidance to maximize your SIEM to its utmost potential. View now to learn how you can optimize your SIEM, ramp up its security capabilities for your enterprise, and how to identify authorized access with SIEM best practices.
Posted: 19 Feb 2014 | Published: 19 Feb 2014


Security Analytics Security School
VIRTUAL ENVIRONMENT: Learn how to develop a customized program that delivers insightful, actionable security analytics. Key points of emphasis include defining success, identifying needs, developing and integrating data sources, and ultimately analyzing information and using it to make smarter security decisions.
Posted: 07 Feb 2014 | Premiered: 14 Feb 2014


Information Security Magazine
EGUIDE: In our inaugural issue of 2014, we look at the top cyberthreats and attack techniques that security professionals are likely to face this year.
Posted: 03 Feb 2014 | Published: 03 Feb 2014


Mobile Application Delivery: The Next Frontier (An Expert Handbook on Mobile Application Management)
EBOOK: This expert handbook features three articles that examine the best approaches to take when delivering mobile applications.
Posted: 03 Feb 2014 | Published: 03 Feb 2014


An Expert Guide to the PCI DSS 3.0
EBOOK: This expert handbook gives you the information that you require right now to understand the updated requirements for the PCI DSS 3.0, which went into effect in early 2014.
Posted: 31 Jan 2014 | Published: 31 Jan 2014


Handbook: Vulnerability Management
EGUIDE: This TechGuide will help you both identify and prioritize vulnerabilities based on sound risk-management principles, ensuring a vulnerability management program that is effective and aligned with broader risk-management goals.
Posted: 27 Jan 2014 | Published: 27 Jan 2014


December Information Security Magazine
EZINE: Everyone in the information security filend knows how hard it is to stay ahead of the rapidly evolving threat landscape. In this month's edition of Information Security, learn about a variety of sercurity issues.
Posted: 05 Dec 2013 | Published: 05 Dec 2013


Endpoint Security IT Decision Center Handbook 3
EGUIDE: Access this expert handbook for 6 questions to ask about your next endpoint security software solution and its ability integrate into your environment.
Posted: 26 Nov 2013 | Published: 26 Nov 2013


Mobile Security Insider's Edition
EZINE: This Insider Edition explores some of the most useful tools and strategies for reducing threats to your network and protecting your critical data in the era of BYOD.
Posted: 18 Nov 2013 | Published: 18 Nov 2013