IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Information Security Policies

RSS Feed   
Information Security Policies Reports
 
Threats Posed by Portable Storage Devices
sponsored by Seqrite
WHITE PAPER: In this white paper, find out if security policies alone are the best solution to mitigate the risks posed by portable storage devices, as well as explore some of the threats that these devices pose if they go uncontrolled.
Posted: 22 Dec 2017 | Published: 22 Dec 2017

Seqrite

10 Advantages of a Proxy Deployment with a Next-Generation Firewall
sponsored by Symantec
WHITE PAPER: Ensuring that your organization has a layered defense strategy in place is vital to combat today's threat landscape. Learn 10 advantages of layered defense, and what can be gained from pairing a proxy deployment with a next-generation firewall
Posted: 16 Jun 2017 | Published: 16 Jun 2017

Symantec

The Building Security in Maturity Model Examined
sponsored by Synopsys
RESEARCH CONTENT: In this white paper, you'll find the Building Security in Maturity Model (BSIMM) which compiles the information given by 109 security professionals. Read on to learn the important roles found in a successful security initiative, as well as how you contemporaries are managing their compliance policies, testing protocols, analytics, and more.
Posted: 12 Jan 2018 | Published: 12 Jan 2018

Synopsys

How Does Mobile Device Management Differ from Traditional Security?
sponsored by Seqrite
WHITE PAPER: In this white paper explore the need for an mobile device management (MDM) system, as well as several best practices for selecting and deploying a comprehensive MDM solution to your enterprise in a way that will be beneficial to security, and intuitive for employees.
Posted: 28 Dec 2017 | Published: 28 Dec 2017

Seqrite

GDPR: What Healthcare Organizations Everywhere Need To Know
sponsored by Absolute
WHITE PAPER: Enforcement of the new EU GDPR rules is slated to begin in May 2018 and what they require should compel healthcare organizations to start preparing now. Inside, discover 10 recommendations to get started with GDPR compliance.
Posted: 20 Oct 2017 | Published: 20 Oct 2017

Absolute

The Security Risks of IoT
sponsored by Fortinet, Inc.
EGUIDE: In this expert guide, learn the 3 questions every security administrator should be asking themselves in preparation of the IoT boom. Then, read on to discover what's contributing to this massive growth in devices, and how you can take steps to reduce the risk they pose.
Posted: 07 Jun 2017 | Published: 31 May 2017

Fortinet, Inc.

What You Need to Know About the General Data Protection Regulation (GDPR)
sponsored by Rapid7
WHITE PAPER: In this 1-page white paper, learn some key changes the General Data Protection Regulation (GDPR) will bring about, get the answers to 4 commonly asked questions on GDPR compliance, and find some tips on how you can prepare as the deadline approaches.
Posted: 22 Nov 2017 | Published: 22 Nov 2017

Rapid7

A Closer Look at Cloud Migration Security Risks
sponsored by F5 Networks
EGUIDE: Explore the security challenges when moving workloads and data into the cloud, and how to mitigate the risks they entail.
Posted: 08 Jun 2017 | Published: 31 May 2017

F5 Networks

Cloud Computing Top Threats
sponsored by HPE and IntelĀ® Corporate
WHITE PAPER: This Cloud Security Alliance report focuses on 12 security concerns specifically related to the shared, on-demand nature of cloud computing. Discover an in-depth dissection of the issues and gain insight to help you make informed decisions about risk mitigation within a cloud strategy.
Posted: 08 Jun 2017 | Published: 08 Jun 2017

HPE and IntelĀ® Corporate

The Role of Automation in Optimizing Network Performance and Security
sponsored by FireMon
WHITE PAPER: As networks become more complex, network visibility reduces making it harder to identify and contain threats. Access this resource to learn how to overcome the challenges with this network security complexity gap.
Posted: 11 Aug 2017 | Published: 11 Aug 2017

FireMon
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement