PBN Reports

How Consumerization Affects Security and Compliance
sponsored by TechTarget Security
EBRIEF: The trend of consumerization is changing the way your employees and organization work, but is also affecting security and compliance. A number of new issues are emerging because of this trend, but with adequate monitoring and policies to protect corporate data, you can protect your crown jewels.
Posted: 09 Mar 2012 | Published: 29 Feb 2012

TechTarget Security

Reducing the Risks of Social Media
sponsored by TechTarget Security
EGUIDE: Social Media can enhance brand reputation, build connections with external customers, improve collaboration and more. However using social media also carries risks. Fortunately, this expert e-guide explores the potential identity, security and privacy threats associated with social media.
Posted: 15 Nov 2013 | Published: 15 Nov 2013

TechTarget Security

Software-Defined Networking Could Make Network-as-a-Service a Reality
sponsored by TechTarget Security
EGUIDE: This E-Guide from SearchNetworking.com explores the topic of Network-as-a-Service and how software-defined networking could help make this new network paradigm for the cloud a reality.
Posted: 05 Nov 2012 | Published: 09 Apr 2012

TechTarget Security

Cashing in on Policy-based Power Management
sponsored by Intel
WHITE PAPER: In today’s ever-growing data centers, no one takes power for granted. There have been many reminders of the threats to power supplies— including catastrophic natural events, breakdowns in the power grid, and seasonal power shortages. This white paper describes how policy-based power management can reign in energy use and significantly cut costs.
Posted: 28 Nov 2011 | Published: 28 Nov 2011

Intel

File Security: Audit and Protect Critical Files
sponsored by Imperva
WHITE PAPER: Read this paper to learn how Imperva SecureSphere File Security products deliver real-time file monitoring, auditing, security, and user rights management for files stored on file servers and network attached storage (NAS) devices.
Posted: 30 Aug 2010 | Published: 30 Aug 2010

Imperva

Keep Your Enemies Closer - Get Proactive about Security
sponsored by AT&T Corp
WEBCAST: Forrester Research Inc. guest speaker, Khalid Kark, VP-Research Director, along with Steve Hurst of AT&T, will highlight today's complex enterprise security environments, discuss the latest research on security infrastructure essentials and explain how managed security services can reduce your risk and simplify policy compliance.
Posted: 01 Mar 2011 | Premiered: Mar 1, 2011

AT&T Corp

Cisco Any Device: Planning a Productive, Secure and Competitive Future
sponsored by Cisco
WHITE PAPER: Discover the details of the "Any Device" vision and why providing an optimal, predictable end-user experience on the device of your employees' choice can help you maintain or even enhance your organisation's competitive advantage, productivity, and security.
Posted: 29 Nov 2013 | Published: 31 Aug 2011

Cisco

What You Need to Know About the Costs of Mobility  
sponsored by iPass Inc.
WHITE PAPER: Control rising mobility expenses, uncover cost reduction opportunities, and improve operational efficiencies through an enterprise-defined mobility strategy. 
Posted: 30 Jan 2012 | Published: 27 Jan 2012

iPass Inc.

Why Your Organization Needs to Implement DLP
sponsored by Trend Micro, Inc.
WHITE PAPER: Outbound content sent from any communications tools or stored on laptops and removable storage devices must be monitored and managed in order to minimize risk and to ensure that the content is appropriate and in compliance with an organization’s policies, statutory obligations and industry best practices. Read this paper to learn more.
Posted: 15 Jul 2010 | Published: 15 Jul 2010

Trend Micro, Inc.

Putting Network Security Into Context
sponsored by TechTarget Networking
EBOOK: Today's advanced threats demand a network security strategy that can adjust policies based on contextual data about users and apps. The technology is there to achieve this, but does your team have the skills and resources necessary to configure and maintain it? Access this handbook now to find out.
Posted: 12 Nov 2014 | Published: 14 Nov 2013

TechTarget Networking