Software  >   Systems Software  >  

Security Software

RSS Feed   
ALSO CALLED: Auditing Software (Security), Infrastructure Software, Security Tools
DEFINITION: Software installed on a computer network or an individual computer that protects it from attack.
Security Software White Papers (View All Report Types)
76 - 100 of 247 Matches Previous Page  |  Next Page
Is Onboard Key Storage the Right Corporate Strategy?
sponsored by Gemalto
WHITE PAPER: Learn the answer to the question: "Is onboard key storage a 'good enough' solution, or is an external key management system something that should be deployed?"
Posted: 09 Mar 2017 | Published: 09 Mar 2017

Gemalto

Six Steps to a Better Security Strategy
sponsored by Armor
WHITE PAPER: In this Forrester report, discover 6 straightforward steps you can take immediately to start building a truly business-savvy security strategy.
Posted: 08 Mar 2017 | Published: 22 Jan 2016

Armor

Myth vs. Reality: What You Need to Know About Microsoft Office 365 Backup
sponsored by Unitrends
WHITE PAPER: Learn how data loss occurs in cloud applications, as well as how to restore email in seconds instead of hours, recover files even after Office 365 purges, safeguard all of your users' data, and more.
Posted: 13 Mar 2017 | Published: 13 Mar 2017

Unitrends

Solution Brief - Securing the mobile enterprise
sponsored by IBM
WHITE PAPER: Discover a comprehensive portfolio of mobile security systems that address four key mobile security challenges: protecting devices, securing content and collaboration, safeguarding applications and data, and managing access and fraud. The portfolio also includes a layer of security intelligence for advanced threat detection.
Posted: 08 Mar 2017 | Published: 06 Mar 2017

IBM

Minimize the Risk and Impact of a Breach in the Cloud
sponsored by Dell SecureWorks
WHITE PAPER: Learn how to reduce the scope and duration of a data breach in the cloud with a multi-pronged approach to security. Discover 5 strategies for success.
Posted: 07 Mar 2017 | Published: 07 Mar 2017

Dell SecureWorks

2016 Mobile Security & Business Transformation Study
sponsored by IBM MaaS360
WHITE PAPER: Enterprise mobility has transformed security and business practices. Access the 2016 Mobile Security & Business Transformation Study, and learn what 200 respondents had to say about how organizations like yours can conduct -- and secure -- enterprise mobility.
Posted: 24 Feb 2017 | Published: 24 Feb 2017

IBM MaaS360

Box: Securing Business Information In The Cloud
sponsored by IBM
WHITE PAPER: Learn how to address content security challenges with Box on the cloud and enable productivity and collaboration with anyone, anywhere, and at any time, while maintaining control and compliance over your business content.
Posted: 03 Feb 2017 | Published: 01 Feb 2017

IBM

Office of the CIO - Box Case Study
sponsored by IBM
WHITE PAPER: Learn how to secure Box on the cloud, and in doing so yield more benefits than just keeping your data safe.
Posted: 03 Feb 2017 | Published: 01 Feb 2017

IBM

How to Speed Up Your Breach Detection Rate
sponsored by Cisco
WHITE PAPER: Learn how to reduce time to breach detection and increase detection rate. Discover how to reduce the space and time attackers have to harm your organization.
Posted: 23 Jan 2017 | Published: 23 Jan 2017

Cisco

Tackle Email Fraud with Comprehensive Targeted Threat Protection
sponsored by Mimecast
WHITE PAPER: This research report from 451 Research highlights Mimecast's expansion into the targeted threat protection market. Access now to compare various vendors and what they can do for your enterprise and uncover the analysis of Mimecast's strengths, weaknesses, threats and more.
Posted: 14 Jan 2017 | Published: 14 Jan 2017

Mimecast

Firewall Clean Up Recommendations
sponsored by FireMon
WHITE PAPER: At the core of the firewall is the policy that enforces what access is permitted. Discover the benefits of proper firewall policy for your organization and learn the main causes of firewall policy mistakes.
Posted: 08 Dec 2016 | Published: 30 Nov 2016

FireMon

Create a Customized Testing Strategy
sponsored by IBM
WHITE PAPER: Learn the importance of thorough penetration testing. Discover how to ensure each of the four disciplines are covered, and how each play a crucial role in securing your organization.
Posted: 21 Nov 2016 | Published: 21 Nov 2016

IBM

Masergy's Unified Enterprise Security Solution
sponsored by MASERGY
WHITE PAPER: This white paper explores how Masergy's Unified Enterprise Security Solution provides an integrated approach to security, combining predictive data sharing with an agile analytics and correlation program. Learn how Masergy can help you build an affordable, multi-layered security infrastructure that causes no additional network latency.
Posted: 18 Oct 2016 | Published: 18 Oct 2016

MASERGY

Adopt a Bimodal Approach to Manage PCs and Broaden Support for New Devices
sponsored by Lenovo Software
WHITE PAPER: This Gartner Report teaches you new approaches to endpoint management and security as updates to PC software increase in volume and frequency.
Posted: 26 Aug 2016 | Published: 21 Sep 2015

Lenovo Software

Addressing the Security Dangers of "Appification"
sponsored by IBM
WHITE PAPER: Identify the key security dangers of mobile apps in the enterprise and find out how to eliminate them. Learn not only what an enterprise can do for data at rest, data in motion, methods of deployment, and more.
Posted: 10 Aug 2016 | Published: 10 Aug 2016

IBM

Defend your Organization with Advanced SIEM and Privileged Account Controls
sponsored by Splunk
WHITE PAPER: As SIEM technologies change, it's important that your own approach to SIEM evolves to incorporate these advances. Discover 4 recent advances as relayed by experts, including big data adoption, threat intelligence feeds, and more. As a bonus, learn tips on limiting privileged accounts and boosting security.
Posted: 04 Aug 2016 | Published: 31 Jul 2016

Splunk

Easily Access Behind-the-Firewall Resources
sponsored by IBM
WHITE PAPER: Discover a solution to facilitate mobile collaboration with authorization, encryption, and containerization policies. Read on to find how it provides protected mobile access to corporate data without device VPN, uses in-app VPN tunnels to existing enterprise systems, protects sensitive corporate data with robust security policies, and more.
Posted: 17 Jun 2016 | Published: 17 Jun 2016

IBM

Secure Browser for Mobile Enterprise Devices
sponsored by IBM MaaS360
WHITE PAPER: Discover how to address and reduce vulnerabilities from risky websites with a mobile browser solution. Read on to find how it uses a centralized management platform to deploy protected access to intranet and internet sites, controls the mobile internet experience though granular security policies, prevents attacks and malware, and more.
Posted: 17 Jun 2016 | Published: 17 Jun 2016

IBM MaaS360

Protect and Distribute BYOD documents
sponsored by IBM MaaS360
WHITE PAPER: Discover a scalable solution to mobile document protection that provides a secure way for users to collaborate on smartphones and tablets. Read on to learn how it can protect corporate documents from data leaks with containerization, centrally manage document distribution, selectively wipe managed documents, and more.
Posted: 17 Jun 2016 | Published: 17 Jun 2016

IBM MaaS360

Secure Enterprise Email on Mobile Devices
sponsored by IBM MaaS360
WHITE PAPER: Discover the key to securing and controlling enterprise emails on mobile devices in a BYOD environment. Uncover the value of separating personal and corporate data on phones and tablets, using a single sign-on for authentication, and more.
Posted: 17 Jun 2016 | Published: 17 Jun 2016

IBM MaaS360

Laptop Management for Windows
sponsored by IBM MaaS360
WHITE PAPER: Discover how to protect your enterprise laptops, desktops, ultrabooks, and tablets from a single screen. Read on to learn key benefits a solution can provide such as pushing software to devices independent of their location, lock devices remotely, demonstrate compliance for audits, and more.
Posted: 16 Jun 2016 | Published: 16 Jun 2016

IBM MaaS360

IBM Security QRadar Incident Forensics
sponsored by IBM
WHITE PAPER: Discover a solution to ensure visibility and clarity into breach-related network activities. Uncover how to investigate malicious actions on your enterprise's network using holistically-drawn data, simplify the query process with a search engine-like interface, build new intelligence by labeling suspected content, and more.
Posted: 16 Jun 2016 | Published: 31 Dec 2014

IBM

Mobile Threat Management
sponsored by IBM MaaS360
WHITE PAPER: Discover a viable solution to the catastrophic damages that can be caused by malicious code infecting 11.6 million+ mobile devices today. Read on to find how to safely support both BYOD and corporate-owned devices, proactively manage mobile threats in near real-time, reduce the risk of sensitive data leakage of vital information, and more.
Posted: 16 Jun 2016 | Published: 31 Dec 2015

IBM MaaS360

2016 Security Predictions: Understanding the Most Serious Threats and How to Protect Against Them
sponsored by A10 Networks
WHITE PAPER: This security predictions guide highlights 5 emerging threats of 2016. Armed with tactics to stay steps ahead of cybercriminals, you'll feel good about leading your team through the trenches as you mitigate IoT, mobile, and cloud risks.
Posted: 15 Feb 2016 | Published: 15 Feb 2016

A10 Networks

Detect Network Anomalies with the Right Netflow Analysis Tool
sponsored by Lancope
WHITE PAPER: In this article, a security expert discusses how he found a security tool that met his netflow analysis needs. Read on and learn how you can obtain the deep network insights necessary for stopping advanced hacks in your organization.
Posted: 04 Jan 2016 | Published: 18 Nov 2014

Lancope
76 - 100 of 247 Matches Previous Page    2 3 4 5 6 7    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement