Security Best Practices White Papers, Videos, Webcasts, Podcasts and Case Studies

Java Development Research Library

 WHITE PAPERS   MULTIMEDIA 
SEARCH the Research Library: WHAT'S POPULAR
Business of Information Technology  >  Business Management  >  

Security Best Practices

 All   White Papers   Multimedia   IT Downloads 
Limit Results:
Sort by:
1 - 15 of 961 Matches
The Most Powerful of Adversaries: NSA Programs and Techniques Provide Lessons in Data Privacy and Managing Enterprise Collaboration
sponsored by IntraLinks, Inc
White Paper: | Posted: 17 Apr 2014
Published:17 Apr 2014
Summary:This resource reveals best practices on how to protect intellectual property, especially from the U.S. National Security Agency (NSA) and other government actors, who have the power to exploit critical data.
Get This Now
IntraLinks, Inc

Websense 2014 Threat Report, Websense Security Labs
sponsored by Websense
White Paper: | Posted: 17 Apr 2014
Published:17 Apr 2014
Summary:In preparing the Websense® 2014 Threat Report, Websense Security Labs™ researchers examined cybersecurity through the lens of a seven-stage kill chain and attack model. Learn how to apply the seven-stage "kill chain" and attack model to your cybersecurity.
Get This Now
Websense

Transforming Information Security: Future-Proofing Processes
sponsored by RSA, The Security Division of EMC
White Paper: | Posted: 17 Apr 2014
Published:31 Dec 2013
Summary:Adapting your security strategy to today's expanding threat landscape can be a daunting task. This guide explores strategies for enhancing your security strategy and how to adapt to the current threat landscape.
Get This Now
RSA, The Security Division of EMC

The APT Lifecycle and its Log Trail
sponsored by LogRhythm, Inc.
White Paper: | Posted: 17 Apr 2014
Published:31 Dec 2013
Summary:This guide explores the APT lifecycle and helps you understand the motives behind these attacks, making it easier to prevent them.
Get This Now
LogRhythm, Inc.

Advanced Intelligence (AI) EngineTM
sponsored by LogRhythm, Inc.
White Paper: | Posted: 17 Apr 2014
Published:17 Apr 2014
Summary:This brief guide takes an in-depth look at one company's SIEM solution and how it employs log and event management to prevent cyber-attacks.
Get This Now
LogRhythm, Inc.

Top 8 Secure Messaging Policy Best Practices
sponsored by TigerText, Inc.
White Paper: | Posted: 17 Apr 2014
Published:31 Dec 2013
Summary:In this white paper, explore 8 valuable recommendations on how to develop a secure text messaging policy to ensure data security and compliance.
Get This Now
TigerText, Inc.

Predictions 2014: Identity and Access Management
sponsored by IBM
Analyst Report: | Posted: 17 Apr 2014
Published:26 Nov 2013
Summary:This Gartner report reveals predictions for identity and access management (IAM) tools needed for 2014.
Get This Now
IBM

Cisco 2014 Annual Security Report
sponsored by Cisco Systems, Inc.
White Paper: | Posted: 17 Apr 2014
Published:17 Apr 2014
Summary:This in-depth report provides valuable insight into the top security concerns of 2014 and what your organization can do to prevent cybercrime.
Get This Now
Cisco Systems, Inc.

What Businesses Need to Know About Cyber Security - Vendor Webcast
sponsored by Lumension
Webcast: | Posted: 17 Apr 2014
Premiered:Apr 17, 2014
Summary:Access this resource and witness 4 security experts discuss today's threat landscape and how cyber security is being dealt with across the world.
Get This Now
Lumension

Defending Your Corporate Endpoints: How to Go Beyond Anti-Virus
sponsored by Lumension
White Paper: | Posted: 17 Apr 2014
Published:17 Apr 2014
Summary:Malware is the most common type of cyber-threat and businesses are struggling when it comes to stopping its growing complexity. This informative resource explores some strategies for preventing these sophisticated malware attacks.
Get This Now
Lumension

Managing Complexity in Identity and Access Management
sponsored by RSA, The Security Division of EMC
Analyst Report: | Posted: 17 Apr 2014
Published:31 Aug 2013
Summary:This Ponemon Institute report sheds light on which level of complexity is best for an effective, yet easy-to-manage identity and access management (IAM) program.
Get This Now
RSA, The Security Division of EMC

NSS Labs: Breach Detection System Comparative Analysis
sponsored by Sourcefire
White Paper: | Posted: 17 Apr 2014
Published:17 Apr 2014
Summary:This informative analysis tests some top breach detection technologies and compares the standards of their security and performance.
Get This Now
Sourcefire

Is Your AV Keeping Up? - Vendor Webcast
sponsored by Lumension
Webcast: | Posted: 16 Apr 2014
Premiered:Apr 16, 2014
Summary:This informative resource takes a look at anti-virus technology and outlines how businesses can prevent sophisticated malware from infiltrating their system.
Get This Now
Lumension

Top 9 Mistakes of APT Victims: What They Are and What You Can Do To Prevent Them - Vendor Webcast
sponsored by Lumension
Webcast: | Posted: 16 Apr 2014
Premiered:Apr 16, 2014
Summary:This informative resource explores the role of APTs in today's current threat landscape and what you can do to prevent them.
Get This Now
Lumension

The Critical Incident Response Maturity Journey
sponsored by RSA, The Security Division of EMC
White Paper: | Posted: 16 Apr 2014
Published:31 Dec 2013
Summary:This paper focuses on defining levels of critical incident response maturity and how organizations can continually improve their incident response capabilities to help reduce the risk of experiencing a damaging incident.
Get This Now
RSA, The Security Division of EMC

1 - 15 of 961 Matches


Library Home | Advertise with Us | Partner with Us
 
Powered by Bitpipe
 
Java Development Research Library Copyright © 1998-2010 Bitpipe, Inc. All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.
Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.
webmaster@techtarget.com