Business of Information Technology  >   Business Management  >   Content Management  >  

Filtering

RSS Feed   
Filtering Reports
 
6 Elements of Effective Compliance Training: What Moves the Needle
sponsored by Skillsoft
WHITE PAPER: The task of understanding what makes a compliance training program effective may seem daunting. However, the foundation of any effective compliance training program begins with 6 essential elements. This white paper outlines these 6 components and explores how each one contributes to organizational strategy and efficacy.
Posted: 27 Feb 2019 | Published: 27 Feb 2019

Skillsoft

SOC-as-a-Service versus DIY SOC
sponsored by Arctic Wolf
RESEARCH CONTENT: Security operation centers are very useful in monitoring, detecting and responding to cyberthreats. However, they can be very expensive to build and extremely difficult to manage. Download this Frost and Sullivan report to evaluate the costs and features of SOC-as-a-service and DIY SOC to make an informed decision for your organization.
Posted: 10 Dec 2018 | Published: 31 Dec 2018

Arctic Wolf

Market Guide for Application Shielding
sponsored by Arxan
RESEARCH CONTENT: Protecting applications that run within untrusted environments is crucial as mobile, IoT and modern web applications migrate software logic to the client side. Application shielding is well-suited to protect consumer mobile apps. Download this Gartner research report to learn more about application shielding.
Posted: 14 Feb 2019 | Published: 27 Jun 2018

Arxan

E-Guide: Building a Security Toolkit to Protect Against the Latest Web 2.0 Threats
sponsored by SearchSecurity.com
EGUIDE: This expert e-guide provides an in-depth overview of the latest Web 2.0 security threats and offers technical advice on how to defend against them.
Posted: 13 Jul 2011 | Published: 13 Jul 2011

SearchSecurity.com

2018 Cybersecurity Report Card: Organizations Rate their Security Posture and Share Best Practices
sponsored by DomainTools
WHITE PAPER: Responses from the 2018 Report Card survey shed light on how cybersecurity practices are evolving, and what the most successful organizations are doing to ensure they stay ahead of the ever-growing and changing threat landscape. This report outlines key findings from the survey and suggests how companies can improve their security efforts.
Posted: 10 Jan 2019 | Published: 31 Dec 2018

DomainTools

Mastering Mobile Application Management: How to Adopt MAM
sponsored by IBM
EBOOK: Enhance your MAM understanding with proven best practices that'll help you to solve app compatibility, security, and adoption issues.
Posted: 24 Mar 2015 | Published: 24 Mar 2015

IBM

Success Story: Astaro Gets the Checkered Flag at F1 Boston
sponsored by Astaro
CASE STUDY: New England’s premier high performance kart racing venue, F1 Boston, faced issues with its current firewall protection solution. View this case study to learn how switching to Astaro Security Gateway met F1 Boston’s security needs, while being easy to set up and manage at a more affordable cost.
Posted: 30 Aug 2011 | Published: 30 Aug 2011

Astaro

TITUS Meets SharePoint Security Needs of Document Management System of Turkish Prime Minister's Office
sponsored by TITUS
WHITE PAPER: Read this white paper to discover how the Turkish Prime Minister's office implemented a secure SharePoint system to protect-- yet keep their content accessible to those authorized to use it.
Posted: 19 Mar 2012 | Published: 19 Mar 2012

TITUS

Mobile Presence and Instant Messaging:  Key Strategies for Mid-Sized Companies
sponsored by Cisco Systems, Inc.
EGUIDE: This e-guide discusses steps to develop a UC strategy for presence in the anywhere office. Additionally, uncover the dangers of instant messaging, how to tackle potential security challenges, what role mobility plays within presence and more.
Posted: 27 Jun 2011 | Published: 23 Jun 2011

Cisco Systems, Inc.

How to Secure Your Microsoft SharePoint Products
sponsored by Thawte Inc.
EGUIDE: This e-guide from our experts at searchEnterpriseDesktop.com will help you understand what it takes to make sure SharePoint is secure. Read on to discover a quick checklist you can use to keep security priorities in order.
Posted: 22 May 2013 | Published: 22 May 2013

Thawte Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement