Mobile: The Technology Game-Changer in 2013
sponsored by TechTarget Security
EGUIDE:
TechTarget's recent IT Security Trends 2013 revealed mobility took the cake for biggest fear. In this E-Guide, uncover the results and analysis of the survey to better understand what's in store for your organization.
Posted: 28 Feb 2013 | Published: 28 Feb 2013
|
|
|
How SSL-Encrypted Web Connections are Intercepted
sponsored by TechTarget Security
EGUIDE:
In this expert e-guide, uncover 4 key strategies for defending against illegal TLS/SSL-encrypted Web connection interception. Learn how these cyber-attacks work, the challenges of digital certificates, SSL-interception tools, and more by reading on now.
Posted: 27 Dec 2012 | Published: 17 Dec 2012
|
|
|
BYOPC Strategy: Policies and Problem Solving
sponsored by TechTarget Security
EGUIDE:
Creating a bring your own PC (BYOPC) policy before implementation is crucial to the success of the initiative. In this E-Guide from SearchConsumerization.com, get help creating a policy that fulfills your employees' and your organizations' needs alike.
Posted: 13 Dec 2012 | Published: 13 Dec 2012
|
|
|
Enterprise Mobile Device Security Best Practices
sponsored by TechTarget Security
EGUIDE:
This E-Guide from SearchConsumerization.com explores the top four best practices for keeping your corporate information safe in case a mobile device is lost or stolen.
Posted: 17 Sep 2012 | Published: 17 Sep 2012
|
|
|
IT Handbook : Smartphones & Tablets in the Enterprise
sponsored by TechTarget Security
EGUIDE:
This IT Handbook from SearchConsumerization.com explores the growing trend of consumerization and how you can embrace it in your organization.
Posted: 10 Apr 2012 | Published: 10 Apr 2012
|
|
|
Mobile Device Security Best Practices for BYOD
sponsored by TechTarget Security
EGUIDE:
This expert E-Guide from SearchMobileComputing.com explores the issue of mobile device security and offers best practices for making a BYOD program work in your organization.
Posted: 06 Apr 2012 | Published: 06 Apr 2012
|
|
|
How Consumerization Affects Security and Compliance
sponsored by TechTarget Security
EBRIEF:
The trend of consumerization is changing the way your employees and organization work, but is also affecting security and compliance. A number of new issues are emerging because of this trend, but with adequate monitoring and policies to protect corporate data, you can protect your crown jewels.
Posted: 09 Mar 2012 | Published: 29 Feb 2012
|
|
|
Applications and best practices to keep your mobile devices secure
sponsored by TechTarget Security
EGUIDE:
Uncover best practices for keeping your mobile devices and applications secure.
Posted: 06 Mar 2012 | Published: 06 Mar 2012
|
|
|
Securing Corporate Data in the Age of Mobile Computing
sponsored by TechTarget Security
EBOOK:
This Expert Briefing from SearchConsumerization.com discusses key tips for enterprises to allow employees to work from their personal devices while ensuring corporate data remains secure.
Posted: 20 Jan 2012 | Published: 20 Jan 2012
|
|
|
A CIO's Five-Point Plan for Managing Endpoint Security
sponsored by Dell KACE
EGUIDE:
Managing endpoint security is a major challenge for organizations. This expert e-guide, brought to you by SearchCIO.com, offers a five-point solution for managing endpoint security for the hyper-connected enterprise – starting with data governance.
Posted: 20 Jun 2013 | Published: 20 Jun 2013
|
|
|
Securely Implement and Configure SSL to Ward Off SSL Vulnerabilities
sponsored by GeoTrust, Inc.
EGUIDE:
This e-guide from SearchSecurity.com explores the issues threatening SSL vulnerabilities and offers advice on how to defend against said risks. View now to learn more!
Posted: 16 May 2013 | Published: 16 May 2013
|
|
|
Explaining How Trusted SSL Certificates and Forged SSL Certificates Work
sponsored by GeoTrust, Inc.
EGUIDE:
This e-guide from SearchSecurity.com takes an in-depth look at what Certificate Authorities and digital certificates do for secure web browsing and explores what trusted SSL certificates and forged SSL certificates mean to your business.
Posted: 16 May 2013 | Published: 16 May 2013
|
|
|
How iOS Encryption and Data Protection Work
sponsored by Symantec Corporation
EGUIDE:
This expert guide from SearchConsumerization.com details the enablement and the methods of iOS data protection that can help you embrace modern mobility securely. Read on tho learn more about built-in iOS encryption and Apple's data protection.
Posted: 15 May 2013 | Published: 15 May 2013
|
|
|
Hot Tips for Securing Your Wireless Network
sponsored by Sophos
WHITE PAPER:
Everyone from the home user to the corporate enterprise needs to secure their Wi-Fi network. This white paper offers 11 tips for securing your Wi-Fi network, including encryption, password management, and more.
Posted: 07 May 2013 | Published: 31 Aug 2012
|
|
|
Mobile Health Handbook: Device Security
sponsored by TechTarget Health IT
EBOOK:
Finding the balance between convenience and security is the key for successful mobile device management. Review expert techniques and strategies for achieving this objective in this handbook on mobile device security for the health care organization.
Posted: 06 Mar 2013 | Published: 06 Mar 2013
|
|
|
De-risking IT Lifecycle Management
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
Analysts Clive Longbottom and Rob Bamforth offer advice on managing IT assets more effectively.
Posted: 23 Nov 2012 | Published: 23 Nov 2012
|
|
|
Recommended Best Security Practices for Unified Communications
sponsored by Polycom, Inc.
WHITE PAPER:
Unified Communications (UC) can be viewed as another set of data and protocols utilizing IP networks. From a security perspective, it is very similar to other IP data services. This document describes the security issues that organizations should consider as they deploy UC, and offers Polycom's recommendations for implementing secured UC.
Posted: 07 Sep 2012 | Published: 30 Mar 2012
|
|
|
Making Mobility Matter in Healthcare Data Security
sponsored by DellEMC and Intel®
WHITE PAPER:
This white paper highlights the need for health care organizations to have solid encryption and risk assessment procedures and policies in place.
Posted: 18 Jun 2012 | Published: 18 Jun 2012
|
|
|
Healthcare Information at Risk: Encryption is not a Panacea
sponsored by Intel
WHITE PAPER:
This resource demonstrates how encryption technology can play a key role in safeguarding sensitive patient information. But encryption isn’t a cure-all – there are still some downfalls associated with exclusive reliance on upon it. Read now to learn about the benefits and shortcomings of encryption, as well as other ways to protect electronic data.
Posted: 15 Jun 2012 | Published: 15 Jun 2012
|
|
|
IT Security: Built-In Protection with Intel vPro Technology
sponsored by Intel
WHITE PAPER:
New security threats are constantly emerging, and it is your responsibility to properly protect your business. This white paper discusses four key aspects of IT security and explains how you can effectively address them by implementing processors with built-in security features.
Posted: 12 Jun 2012 | Published: 01 May 2012
|
|
|
Enabling High Performance for Apple iPads in the Enterprise
sponsored by Aruba Networks
WHITE PAPER:
Learn how you can integrate iPads into your wireless LAN, facilitating the adoption of tablets into your workplace. Start delivering scalable performance for all mobile devices, helping you create an on-demand, always available enterprise.
Posted: 30 May 2012 | Published: 20 Sep 2011
|
|
|
eBook: Trends in Healthcare Data Protection
sponsored by LANDesk Software
EBOOK:
This E-Book explores how encryption technologies can help protect health care data, ensuring the avoidance of costly non-compliance penalties.
Posted: 22 Mar 2012 | Published: 22 Mar 2012
|
|
|
UCB Gains Efficiencies and Realizes Lower TCO with CallCopy Call Recording
sponsored by NACR
CASE STUDY:
Uncover why a implementing a CallCopy recording solution that is easy to use, search, update, support and maintain can offer a lower TCO than other solutions, as well as fulfilling all your call recording needs.
Posted: 10 Feb 2012 | Published: 10 Feb 2012
|
|
|
Best practices for implementing 2048-bit SSL
sponsored by Citrix
WHITE PAPER:
Ready for 2048-bit SSL? Not with the competition. Shift to Citrix NetScaler for 2x faster 2048-bit SSL performance. Download the 2048-bit Performance Kit.
Posted: 05 Jan 2012 | Published: 05 Jan 2012
|
|
|
Technical Guide on Windows Security
sponsored by TechTarget Security
EGUIDE:
SearchSecurity.com presents a comprehensive guide to Windows security. Our experts help you discover all of the security enhancements made to Windows 7, including BitLocker, AppLocker, DirectAccess and the Win7 Firewall. You’ll learn how to use these tools to help your organization better manage your Windows security efforts.
Posted: 04 Nov 2011 | Published: 04 Nov 2011
|
|