IT Management  >   Systems Operations  >   Security  >   Security Management  >   Security Policies  >  

AUP

RSS Feed   
AUP White Papers (View All Report Types)
 
Solution Note: Enabling the Secure Use of Facebook
sponsored by Palo Alto Networks
WHITE PAPER: With millions of users, Facebook offers significant opportunities for organizations to conduct research, execute targeted marketing, increase awareness and more. But enabling the use of Facebook introduces a number of security risks. In this paper, uncover how to reap the benefits of social networking while doing it in a safe and secure manner.
Posted: 13 Apr 2012 | Published: 13 Apr 2012

Palo Alto Networks

Protecting Credit Card Data: How to Achieve PCI Compliance
sponsored by Motorola, Inc.
WHITE PAPER: This white paper details the best way to achieve compliance by building a complete end-to-end PCI-capable solution.
Posted: 20 Jun 2008 | Published: 01 Jul 2007

Motorola, Inc.

BYOD: Bring Your Own Device – or Bring Your Own Danger?
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This resource reveals the major issues plaguing BYOD – from data loss and viruses to policy enforcement and lack of IT insight – and outlines ten strategic points you should include in your BYOD planning process to ensure success.
Posted: 26 Aug 2013 | Published: 11 Jan 2013

WatchGuard Technologies, Inc.

Strategies for Managing Social Networking & Personal Web Use in the Workplace
sponsored by Total Defense
WHITE PAPER: Access to Web content in the workplace such - as social networking, streaming media and more - has become an increasing issue. This resource explores the risks and challenges of personal Web use as well as presents a business case for enabling appropriate use. View now to uncover key strategies that will help you protect your business.
Posted: 14 May 2012 | Published: 14 May 2012

Total Defense

Protecting Data Capital in Your Organization
sponsored by Dell EMC
WHITE PAPER: With high volumes of business-critical data comes the necessity for innovative and modernized data protection strategies—read this white paper to learn how to keep your most valuable digital assets well protected and compliant.
Posted: 13 Nov 2019 | Published: 13 Nov 2019

Dell EMC

CyberArk Privileged Access Security
sponsored by Cyber-Ark Software
WHITE PAPER: Privileged accounts, and the access they provide, represent the largest security vulnerabilities an organization faces today. In this CyberArk white paper, discover the industry’s most complete solution to reduce risk created by privileged credentials.
Posted: 08 Nov 2019 | Published: 08 Nov 2019

Cyber-Ark Software

Government IT Modernization: 5 Questions to Ask
sponsored by Dell Technologies
WHITE PAPER: Use this resource to uncover the five key questions your organization should be asking to help position IT for modernization success.
Posted: 07 Nov 2019 | Published: 07 Nov 2019

Dell Technologies

Identity & Access Management – Securing the Modern Workplace With Microsoft 365
sponsored by Core BTS
WHITE PAPER: Cyberthreats are the top concern among leaders heading up companies of all sizes, and identity and access management (IAM) is a foundation of enterprise cybersecurity. In this white paper, discover how to secure the modern workplace with Microsoft 365.
Posted: 06 Nov 2019 | Published: 06 Nov 2019

Core BTS

Elevating Enterprise Security with Fidelis Cybersecurity: Network and Deception
sponsored by Fidelis
WHITE PAPER: As organizations adopt cloud technologies and regulatory requirements, networks grow increasingly complex. Security teams are finding it difficult to defend their networks without holistic insight into the environment. Does your security team have the visibility and investigative ability to defend your network? Read on to find out.
Posted: 01 Nov 2019 | Published: 30 Sep 2019

Fidelis

Certificate Lifecycle Management and Automation
sponsored by AppViewX
WHITE PAPER: Certificate management is a complex process. Without constant management, certificates are vulnerable to attacks, breaches, & system downtime. This white paper outlines why you should automate the certificate lifecycle, the consequences for not applying it & 5 steps to quickly implement automation in your organization.
Posted: 05 Nov 2019 | Published: 05 Nov 2019

AppViewX
 
Browse by Report Type:
AUP White Papers | AUP Multimedia | AUP IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement