Security Management White Papers, Videos, Webcasts, Podcasts and Case Studies

Java Development Research Library

 WHITE PAPERS   MULTIMEDIA 
SEARCH the Research Library: WHAT'S POPULAR
IT Management  >  Systems Operations  >  

Security Management

MORE SPECIFIC TOPICS:  Fraud Protection |  Integrated Threat Management |  Log Management |  Password Management |  Risk Assessment |  Security Event Management |  Security Policies |  Vulnerability Management
 All   White Papers   Multimedia   IT Downloads 
Limit Results:
Sort by:
1 - 15 of 2529 Matches
SQL Compliance Manager – Download Free Trial
sponsored by Idera
Software Download: | Posted: 22 Jul 2014
Premiered:22 Jul 2014
Summary:Uncover the ins-and-outs of SQL Compliance Manager – and get your hands on a free trial.
Get This Now
Idera

Protecting Organizations Against Advanced Persistent Threats
sponsored by CDW Corporation
Video: | Posted: 22 Jul 2014
Premiered:21 May 2014
Summary:This helpful video provides an overview of advanced persistent threats (APTs) and identifies several best practices that organizations should keep in mind to identify vulnerabilities and enforce stronger security policies.
Get This Now
CDW Corporation

Combatting APTs with a Defense-in-Depth Security Approach
sponsored by CDW Corporation
White Paper: | Posted: 22 Jul 2014
Published:05 Mar 2014
Summary:This informative white paper contains critical information on why a defense-in-depth security approach has proven effective in protecting organizations' sensitive data from APTs.
Get This Now
CDW Corporation

A Secure Transition to iOS
sponsored by IBM
White Paper: | Posted: 22 Jul 2014
Published:22 Jul 2014
Summary:Read this white paper to learn about a security solution that has a clean and intuitive interface with easy reporting and usage tracking for expense management.
Get This Now
IBM

Tactics to combat insider threat
sponsored by ComputerWeekly.com
Essential Guide: | Posted: 22 Jul 2014
Published:22 Jul 2014
Summary:This article in our Royal Holloway Security Series argues that the threat to an organisation’s data security from within its workforce requires a considered and objective approach.
Get This Now
ComputerWeekly.com

5 Things Your Organization Can Do Today to Improve Security
sponsored by CDW Corporation
White Paper: | Posted: 22 Jul 2014
Published:04 Apr 2014
Summary:This informative resource contains insights from a security assessment professional on the problematic patterns that he has observed within a wide variety of organizations, as well as their simple but critical solutions.
Get This Now
CDW Corporation

Acceptable Use: How to Write a Mobility Policy Document Employees Will Actually Follow
sponsored by BlackBerry
White Paper: | Posted: 22 Jul 2014
Published:22 Jul 2014
Summary:A mobile computing policy document tells employees what's expected of them when it comes to using these devices for work. It marks out the responsibilities of the company as well.Read this white paper to find out how to write a mobile policy document that employees will understand and follow
Get This Now
BlackBerry

Keeping IT Security Decision-Making on Track
sponsored by CDW Corporation
White Paper: | Posted: 22 Jul 2014
Published:21 Feb 2013
Summary:This resource defines multiple approaches to IT security organization and decision-making that can help companies to determine the most effective ways of functioning in these areas.
Get This Now
CDW Corporation

Strengthening and Simplifying Enterprise Security and Data Protection
sponsored by CDW Corporation
White Paper: | Posted: 22 Jul 2014
Published:22 Jul 2014
Summary:This informative white paper describes one company's comprehensive portfolio of security and data protection solutions.
Get This Now
CDW Corporation

IPS/IDS: Innovations, Changes and How to Solve Your Problems
sponsored by IBM
eGuide: | Posted: 21 Jul 2014
Published:21 Jul 2014
Summary:This expert e-guide explores recent innovations to IDS/IPS technologies and outlines strategies for solving breach detection issues.
Get This Now
IBM

Applying Innovation and Expertise to Enterprise Security
sponsored by CDW Corporation
White Paper: | Posted: 21 Jul 2014
Published:21 Jul 2014
Summary:This helpful white paper introduces one renowned company's security solutions, which cover risk and compliance from end to end.
Get This Now
CDW Corporation

Easy-to-Manage Security Solutions for Today's Threats and Technologies
sponsored by CDW Corporation
White Paper: | Posted: 21 Jul 2014
Published:21 Jul 2014
Summary:This informative white paper describes one company's easy-to-manage security solutions, which are prepared to confront today's evolving threats and emerging technologies.
Get This Now
CDW Corporation

Innovative Technology for Enterprise Security and Enablement
sponsored by CDW Corporation
White Paper: | Posted: 21 Jul 2014
Published:21 Jul 2014
Summary:Read now to learn more about this company's advanced security solutions, which work in conjunction with one another to leverage your enterprise's security, efficiency, compliance, and enablement.
Get This Now
CDW Corporation

Webcast: Why Conventional Security Tools Fail in Modern Data Centers - Vendor Webcast
sponsored by CDW Corporation
Webcast: | Posted: 21 Jul 2014
Premiered:Jun 17, 2014
Summary:This presentation describes how to address the security issues presented by the transition of enterprise data centers to virtual and cloud-based environments.
Get This Now
CDW Corporation

Effective Security in a BYOD Environment: Arming Your Organization Against the Unknown
sponsored by Dell, Inc. and Intel®
White Paper: | Posted: 21 Jul 2014
Published:15 Nov 2012
Summary:Learn how to get ahead of threats and develop a pragmatic strategy to secure data and assets from malware and theft – without impeding the flexibility, agility and efficiency BYOD can deliver for your enterprise.
Get This Now
Dell, Inc. and Intel®

1 - 15 of 2529 Matches


Library Home | Advertise with Us | Partner with Us
 
Powered by Bitpipe
 
Java Development Research Library Copyright © 1998-2010 Bitpipe, Inc. All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.
Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.
webmaster@techtarget.com