IT Management  >   Systems Operations  >   Security  >  

Management of Security Information

RSS Feed   
Management of Security Information Reports
 
Why HIPAA Compliance is Impossible without Privileged Management
sponsored by One Identity
WHITE PAPER: In this white paper, gain valuable insights into automating privileged account management and streamlining compliance to meet HIPAA's requirements.
Posted: 13 Nov 2018 | Published: 12 Feb 2018

One Identity

Your Organization is Moving to Office 365. Now What?
sponsored by Symantec
RESOURCE: Download this security checklist to guide you through the multiple dimensions of your Office 365 migration.
Posted: 13 Nov 2018 | Published: 13 Nov 2018

Symantec

Protect your Data in the Cloud
sponsored by Dell EMC and Intel®
VIDEO: Learn about Dell EMC's Integrated Data Protection Appliance, a cloud enabled protection storage product that protects physical and virtual workloads.
Posted: 02 Nov 2018 | Premiered: 02 Nov 2018

Dell EMC and Intel®

Machine Learning Use Cases in Financial Crimes
sponsored by SAS
WHITE PAPER: Learn about 10 practical and achievable ways to put machine learning to work and ensure fraud detection efficiency.
Posted: 02 Nov 2018 | Published: 02 Nov 2018

SAS

Managing Fraud Risk in the Digital Age
sponsored by SAS
WHITE PAPER: Learn how to detect, prevent and manage fraud in real time – from a single platform and uncover 4 steps your organization can take to fight fraud.
Posted: 02 Nov 2018 | Published: 02 Nov 2018

SAS

IDC Government Procurement Device Security Index 2018
sponsored by HP
RESOURCE: Download the IDC Government Procurement Device Security Index 2018 to explore a study on the consideration given to security requirements in public sector procurement of PCs and printers (and print services). Discover the results IDC found and find out the implications of security in procurement.
Posted: 15 Nov 2018 | Published: 31 May 2018

HP

MSSP Buyer's Guide: For Security Orchestration & Automation Platforms
sponsored by Siemplify
WHITE PAPER: As the MSSP market continues to flourish, customer demand and intense competition places margins under constant pressure. This guide outlines the challenges faced by MSSPs and sets out the criteria to consider when presented with orchestration as a solution. It also provides direction regarding the implantation of orchestration.
Posted: 07 Dec 2018 | Published: 07 Dec 2018

Siemplify

The Buyer's Guide to Cyber Threat Intelligence
sponsored by Recorded Future
RESOURCE: Download The Buyer's Guide to Cyber Threat Intelligence for 11 questions you should answer before you invest.
Posted: 12 Nov 2018 | Published: 12 Nov 2018

Recorded Future

Exploring the Past, Present, and Future of Blockchain Technology
sponsored by Armor
WHITE PAPER: Download this report for an overview of blockchain's origins, its evolution to Blockchain 2.0, attraction for cryptopirates, and potential to expand into more legitimate industries.
Posted: 19 Nov 2018 | Published: 19 Nov 2018

Armor

Defending against Encrypted Threats
sponsored by F5 Networks
WHITE PAPER: In a world dominated by SSL/TLS encrypted traffic, find out how to overcome various challenges with inbound and outbound traffic inspection so that you can effectively neutralize malware attacks, intelligently route traffic, and more.
Posted: 03 Dec 2018 | Published: 03 Dec 2018

F5 Networks
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement