Security Best Practices White Papers, Videos, Webcasts, Podcasts and Case Studies

Java Development Research Library

 WHITE PAPERS   MULTIMEDIA 
SEARCH the Research Library: WHAT'S POPULAR
Business of Information Technology  >  Business Management  >  

Security Best Practices

 All   White Papers   Multimedia   IT Downloads 
Limit Results:
Sort by:
1 - 15 of 1099 Matches
What's Behind a Cyber Attack?
sponsored by IBM
White Paper: | Posted: 29 Jul 2014
Published:30 Apr 2014
Summary:This white paper analyzes the shortcomings of many current approaches to breach investigation, and also introduces one solution to help organizations to defend against advanced persistent and internal threats.
Get This Now
IBM

DCIG Buyer's Guide 2014-15: SIEM Appliances
sponsored by LogRhythm, Inc.
White Paper: | Posted: 29 Jul 2014
Published:29 Jul 2014
Summary:Many smaller organizations still face an uphill battle in understanding and sorting through the SIEM vendor options available to them and then choosing the right product for them. This Buyer's Guide lets IT organizations immediately understand what features and functions are available so they can move more quickly to making a buying decision.
Get This Now
LogRhythm, Inc.

Data Center Trends and Network Security Impact
sponsored by Fortinet, Inc.
White Paper: | Posted: 29 Jul 2014
Published:31 Dec 2012
Summary:This white paper reviews the major data center trends that enterprises and service providers should be preparing for, as well as their anticipated impact on network security.
Get This Now
Fortinet, Inc.

A Multilayered Defense Approach to Protect Your Organization's Data
sponsored by Symantec Corporation
White Paper: | Posted: 28 Jul 2014
Published:28 Jul 2014
Summary:This white paper details the types of attacks that enterprises commonly face, and it introduces a multilayered solution that could be a valuable investment for your organization in the face of these threats.
Get This Now
Symantec Corporation

Enterprise Information Security in Transition
sponsored by IBM
White Paper: | Posted: 28 Jul 2014
Published:31 Oct 2012
Summary:This white paper boils the reasons behind current issues in the information security field down into four major causes, and also lays out a list of specific, detailed changes that need to be made to the enterprise security model for these core issues to be resolved.
Get This Now
IBM

Extending Security Intelligence with Big Data
sponsored by IBM
White Paper: | Posted: 28 Jul 2014
Published:31 Jan 2013
Summary:This white paper introduces a security solution that applies big data capabilities to help organizations to keep pace with today's advanced threats and prevent attacks before they happen.
Get This Now
IBM

The Top 8 Mobile Security Risks: How to Protect Your Organization
sponsored by BlackBerry
White Paper: | Posted: 28 Jul 2014
Published:28 Jul 2014
Summary:This white paper outlines the key issues CIOs need to be on top of right now to protect their organization, employees, and customers. Read on to find out the top 8 mobile security risks and how to maintain protection.
Get This Now
BlackBerry

Exposing the Cybersecurity Cracks: Australia
sponsored by Websense, Inc.
White Paper: | Posted: 28 Jul 2014
Published:28 Jul 2014
Summary:The following report learn how better communication and information about cybersecurity, the right investment in skilled personnel, enabling technologies, and the adoption of security measures will minimized the risk of current and emerging cyber threats.
Get This Now
Websense, Inc.

Comparing Security Information and Event Management (SIEM) Technologies
sponsored by IBM
White Paper: | Posted: 28 Jul 2014
Published:25 Jun 2014
Summary:This highly informative white paper from Gartner objectively evaluates a variety of SIEM technologies on a number of critical dimensions, including market responsiveness, customer experience, and pricing.
Get This Now
IBM

Web Application Firewalls vs. Next-Generation Firewalls
sponsored by Fortinet, Inc.
White Paper: | Posted: 28 Jul 2014
Published:28 Jul 2014
Summary:This white paper compares the ability of two different types of firewalls—Web Application Firewalls (WAFs) and Next-Generation Firewalls (NGFWs)—to protect web applications from security threats.
Get This Now
Fortinet, Inc.

Firms Turn To Next-Generation Firewalls To Tackle Evolving IT Threats
sponsored by Fortinet, Inc.
White Paper: | Posted: 28 Jul 2014
Published:30 Apr 2014
Summary:This white paper summarizes a number of insights on current security challenges for enterprises and the ways that next-generation firewalls (NGFWs) are being applied as a solution.
Get This Now
Fortinet, Inc.

Free Trial: Real-Time Threat Detection and Security Visibility from Day 1
sponsored by AlienVault
Software Download: | Posted: 24 Jul 2014
Premiered:24 Jul 2014
Summary:This resource contains a free 30-day trial of an innovative new Unified Security Management platform, designed and priced to aid mid-market organizations in obtaining complete security visibility and advanced threat intelligence.
Get This Now
AlienVault

VMware SDDC: IT Architecture for the Cloud Era
sponsored by Symantec
Video: | Posted: 24 Jul 2014
Premiered:17 Dec 2013
Summary:This white paper explores the benefits of building a software-defined data center to handle the challenges and demands of the modern data center.
Get This Now
Symantec

PCI DSS Reporting Requirements for People Who Hate PCI DSS Reporting - Vendor Webcast
sponsored by AlienVault
Webcast: | Posted: 24 Jul 2014
Premiered:Jul 24, 2014
Summary:This practical session covers strategies to help you take the pain out of PCI DSS reporting.
Get This Now
AlienVault

AWS Security Best Practices
sponsored by Amazon Web Services
White Paper: | Posted: 24 Jul 2014
Published:30 Nov 2013
Summary:This white paper provides security best practices that will help you define your Information Security Management System (ISMS), and build a set of policies to protect your data and assets in the AWS cloud.
Get This Now

1 - 15 of 1099 Matches


Library Home | Advertise with Us | Partner with Us
 
Powered by Bitpipe
 
Java Development Research Library Copyright © 1998-2010 Bitpipe, Inc. All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.
Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.
webmaster@techtarget.com