IT Management  >   Systems Operations  >   Security  >   Security Management  >   Security Policies  >  

AUP

RSS Feed   
AUP White Papers (View All Report Types)
 
Protecting Credit Card Data: How to Achieve PCI Compliance
sponsored by Motorola, Inc.
WHITE PAPER: This white paper details the best way to achieve compliance by building a complete end-to-end PCI-capable solution.
Posted: 20 Jun 2008 | Published: 01 Jul 2007

Motorola, Inc.

BYOD: Bring Your Own Device – or Bring Your Own Danger?
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This resource reveals the major issues plaguing BYOD – from data loss and viruses to policy enforcement and lack of IT insight – and outlines ten strategic points you should include in your BYOD planning process to ensure success.
Posted: 26 Aug 2013 | Published: 11 Jan 2013

WatchGuard Technologies, Inc.

Strategies for Managing Social Networking & Personal Web Use in the Workplace
sponsored by Total Defense
WHITE PAPER: Access to Web content in the workplace such - as social networking, streaming media and more - has become an increasing issue. This resource explores the risks and challenges of personal Web use as well as presents a business case for enabling appropriate use. View now to uncover key strategies that will help you protect your business.
Posted: 14 May 2012 | Published: 14 May 2012

Total Defense

Solution Note: Enabling the Secure Use of Facebook
sponsored by Palo Alto Networks
WHITE PAPER: With millions of users, Facebook offers significant opportunities for organizations to conduct research, execute targeted marketing, increase awareness and more. But enabling the use of Facebook introduces a number of security risks. In this paper, uncover how to reap the benefits of social networking while doing it in a safe and secure manner.
Posted: 13 Apr 2012 | Published: 13 Apr 2012

Palo Alto Networks

Getting Started with DMARC
sponsored by Proofpoint
WHITE PAPER: Email is great for business, but unfortunately, the very things that make email so popular also make it a vector of choice for cybercriminals. However, the DMARC standard is one of the most powerful weapons to date in the fight against phishing. In this white paper, explore what DMARC is, how it works and its key benefits.
Posted: 28 Jun 2019 | Published: 28 Feb 2019

Proofpoint

How to Set Up Testing For Your Digital Transformation Project
sponsored by nfocus
WHITE PAPER: Tackling a digital transformation project can be daunting, which is why businesses need to designate a testing and assurance team for successful project management. Download this 4-page whitepaper which outlines how to plan your digital transformation project to ensure successful project deliverables.
Posted: 08 Jul 2019 | Published: 08 Jul 2019

nfocus

Cybersecurity Trailblazers Make Security Intrinsic to Their Business
sponsored by VMware
WHITE PAPER: In this e-book, find suggestions for improving your enterprises' security posture, based on lessons learned from the cybersecurity trailblazers and executives interviewed for this report.
Posted: 15 Jul 2019 | Published: 15 Jul 2019

VMware

Securing Apache Kafka
sponsored by comForte AG
WHITE PAPER: There is often sensitive data passing through Apache Kafka, which needs to be secured. This could be PII, PANs, SSNs, health care records or any other sensitive value. Download this white paper for the main reasons to secure Apache Kafka and how it can benefit your business today.
Posted: 10 Jul 2019 | Published: 10 Jul 2019

comForte AG

The 6 Most Common Types of Phishing Attacks
sponsored by Inky Technology
WHITE PAPER: Phishing attacks are on the rise and attackers are constantly evolving their tactics to trick victims. In this white paper, explore 6 of the most common types of phishing attacks.
Posted: 28 Jun 2019 | Published: 28 Jun 2019

Inky Technology

Information Security Program Health Monitoring Guide
sponsored by ReliaQuest
WHITE PAPER: Health monitoring is an often-overlooked process that's critical to maintaining a secure environment. Learn how to address existing vulnerabilities, implement best practices and assess tool efficacy to protect your enterprise.
Posted: 11 Jul 2019 | Published: 11 Jul 2019

ReliaQuest
 
Browse by Report Type:
AUP White Papers | AUP Multimedia | AUP IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement