Business of Information Technology  >   Business Management  >   Financial Management  >   Budgeting  >   IT Spending  >  

Infrastructure Security Spending

RSS Feed   
Infrastructure Security Spending White Papers (View All Report Types)
A Practical Process for Incident Response
sponsored by Proofpoint, Inc.
WHITE PAPER: Learn how to put together a practical approach to incident response in light of today's threat landscape with a 4-step incident response process.
Posted: 01 May 2017 | Published: 01 May 2017

Proofpoint, Inc.

10 Things You Need to Know About Ransomware
sponsored by Cylance
WHITE PAPER: As threatening as ransomware sounds, damage can be avoided with increased user awareness coupled with the right security practices. In this resource uncover the 10 facts your organization should know about ransomware.
Posted: 03 May 2017 | Published: 03 May 2017


Security Use Case Detecting Unknown Malware
sponsored by Splunk
WHITE PAPER: Learn how to gain significant power over understanding detailed activities on endpoint as well as the ability to detect advanced and unknown malware activities.
Posted: 03 May 2017 | Published: 03 May 2017


The 2016 Global Cloud Data Security Study
sponsored by Gemalto
WHITE PAPER: In this in-depth report conducted by the Ponemon Institute, uncover trends that are arising in cloud governance and security practices, how they can affect your organization, and recommendations on improving cloud governance.
Posted: 13 Mar 2017 | Published: 13 Mar 2017


Don't Settle for Good Enough Mobile Security: Transform Business Processes
sponsored by MobileIron
WHITE PAPER: Discover what security features your enterprise needs to consider in an EMM solution, and how to deploy one that will provide fully integrated mobile, cloud, and desktop management, protect your email on smartphones, and more.
Posted: 25 May 2017 | Published: 25 May 2017


Office of the CIO - Box Case Study
sponsored by IBM
WHITE PAPER: Learn how to secure Box on the cloud, and in doing so yield more benefits than just keeping your data safe.
Posted: 03 Feb 2017 | Published: 01 Feb 2017


The CISO as a Transformational Role in Risk Management
sponsored by SAI Global IT Risk Manager (Formerly Modulo Risk Manager)
WHITE PAPER: Discover 8 risk questions the CISO must be asking, 5 benefits the CISO can expect in leading risk management, 6 action items that CISO must take to lead risk management, and more.
Posted: 02 Jun 2017 | Published: 02 Jun 2017

SAI Global IT Risk Manager (Formerly Modulo Risk Manager)

Improve Your Threat Intel Capabilities
sponsored by Bayshore Networks
WHITE PAPER: Learn how to deploy comprehensive threat intel protection and enablement capabilities, gaining a policy engine that automatically converts threat intel feeds into actionable policy, and more.
Posted: 25 May 2017 | Published: 25 May 2017

Bayshore Networks

The Promise and Risk of the Industrial Internet of Things
sponsored by Bayshore Networks
WHITE PAPER: Discover how operational tech like centrifuges and electrical grids can ensure robust security with IT/OT convergence efforts, create a foundation for greater cost and process efficiencies, gain a competitive edge derived from harnessing the power of the industrial Internet of Things, and more.
Posted: 26 May 2017 | Published: 26 May 2017

Bayshore Networks

Study on Cybercrime's Cost to Business
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This exclusive whitepaper covers the results of a survey that analyzed the cost of cyber-crime.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

Hewlett Packard Enterprise

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement