Security Best Practices White Papers, Videos, Webcasts, Podcasts and Case Studies

Java Development Research Library

 WHITE PAPERS   MULTIMEDIA 
SEARCH the Research Library: WHAT'S POPULAR
Business of Information Technology  >  Business Management  >  

Security Best Practices

 All   White Papers   Multimedia   IT Downloads 
Limit Results:
Sort by:
1 - 15 of 983 Matches
Securing 24x7 Operation of Clinical IT Systems
sponsored by Symantec Corporation
White Paper: | Posted: 23 Apr 2014
Published:31 Dec 2013
Summary:This brief white paper highlights 6 risk management and compliance best practices to help HCOs avoid strict HIPAA violations and fines.
Get This Now
Symantec Corporation

Cloud Web Security Using Cisco ASA
sponsored by Cisco Systems, Inc.
White Paper: | Posted: 23 Apr 2014
Published:23 Apr 2014
Summary:This exclusive resource examines a cloud web security (CWS) solution that offers a combination of web usage controls with category and reputation-based control, malware filtering, and data protection to address the need for a corporate web security policy.
Get This Now
Cisco Systems, Inc.

Cisco Web Security Appliance
sponsored by Cisco Systems, Inc.
White Paper: | Posted: 23 Apr 2014
Published:23 Apr 2014
Summary:This exclusive paper examines a web security appliance that combines advanced malware protection, application visibility and control, insightful reporting and highly secure mobility to ensure the protection and control of web traffic.
Get This Now
Cisco Systems, Inc.

Cisco Email Security
sponsored by Cisco Systems, Inc.
White Paper: | Posted: 23 Apr 2014
Published:22 Apr 2014
Summary:This informative resource discusses how you can ensure the safety and security of your corporate email environment, detailing threats you should prepare for and tools you can use to mitigate them.
Get This Now
Cisco Systems, Inc.

Content Security – Safe Guarding Organization Play - Vendor Webcast
sponsored by Cisco Systems, Inc.
Webcast: | Posted: 23 Apr 2014
Premiered:Apr 22, 2014
Summary:This informative webcast discusses a security solution that is designed specifically to inspect the content of web and email transactions using state-of-the art threat intelligence, eliminating potentially harmful threats while allowing safe transactions to proceed effectively and efficiently.
Get This Now
Cisco Systems, Inc.

Is Your Data Center Ready for Today’s DDoS Threats?
sponsored by Fortinet, Inc.
White Paper: | Posted: 23 Apr 2014
Published:23 Apr 2014
Summary:This guide explores various DDoS attack types and highlights some key protection methods for testing your detection and mitigation defenses.
Get This Now
Fortinet, Inc.

Cisco adds Sourcefire AMP to email, Web security
sponsored by Cisco Systems, Inc.
Press Release: | Posted: 22 Apr 2014
Published:25 Feb 2014
Summary:This informative resource discusses a recent merger that brought together advanced malware protection for your email and web gateways.
Get This Now
Cisco Systems, Inc.

Advanced Malware Protection for your Web and Email Gateways
sponsored by Cisco Systems, Inc.
Press Release: | Posted: 22 Apr 2014
Published:25 Feb 2014
Summary:This article explores the recent merger between one company's advanced malware protection and their web and email gateways.
Get This Now
Cisco Systems, Inc.

Ensuring Security for your E-Mail Applications
sponsored by Cisco Systems, Inc.
White Paper: | Posted: 22 Apr 2014
Published:27 Feb 2014
Summary:This informative article explores a top-tier email security strategy and how it utilizes advanced malware protection to prevent devastating security breaches.
Get This Now
Cisco Systems, Inc.

ABAC to the Future: Deliver Smarter SiteMinder Policies with No Sweat - Vendor Webcast
sponsored by Radiant Logic, Inc.
Webcast: | Posted: 22 Apr 2014
Premiered:Apr 22, 2014
Summary:This webcast features a next-generation authorization strategy that offers a finer-grained approach to user provisioning. Click now to explore key benefits.
Get This Now
Radiant Logic, Inc.

Filling the Threat Management Gateway Void
sponsored by F5 Networks
White Paper: | Posted: 22 Apr 2014
Published:22 Apr 2014
Summary:This guide explores a top threat management solution and how it can provide superior scalability and performance.
Get This Now
F5 Networks

Protect your Devices with File Sync and Share Platform
sponsored by Code42
White Paper: | Posted: 22 Apr 2014
Published:22 Apr 2014
Summary:This white paper highlights a continuous, secure, enterprise-ready file sync and share platform that facilitates real-time collaboration across all devices.
Get This Now
Code42

Lowering MSP TCO for Endpoint Security Solutions - Bottom-Line Benefits of Cloud-Based Antivirus Architecture
sponsored by Webroot
White Paper: | Posted: 21 Apr 2014
Published:31 Jan 2014
Summary:This guide shows how organizations can derive more value from their endpoint security by delivering bottom-line benefits of cloud-based antivirus protection from Webroot. This lowers MSP TCO. The paper also highlights the costs of archaic endpoint security when compared to newer security methods.
Get This Now
Webroot

Breach Prevention Industry Best Practices & Standards Data Sheet: Industry Perspectives – Healthcare
sponsored by Symantec Corporation
White Paper: | Posted: 21 Apr 2014
Published:21 Apr 2014
Summary:This informative paper examines how you can build a formidable breach prevention strategy designed specifically for healthcare.
Get This Now
Symantec Corporation

Endpoint Data Management: Protecting the Perimeter of the Internet of Things - Vendor Webcast
sponsored by Code42
Webcast: | Posted: 21 Apr 2014
Premiered:Apr 21, 2014
Summary:This crucial webcast discusses how your organization can protect its perimeter and keep your endpoint data safe.
Get This Now
Code42

1 - 15 of 983 Matches


Library Home | Advertise with Us | Partner with Us
 
Powered by Bitpipe
 
Java Development Research Library Copyright © 1998-2010 Bitpipe, Inc. All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.
Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.
webmaster@techtarget.com