Security Management White Papers, Videos, Webcasts, Podcasts and Case Studies

Java Development Research Library

 WHITE PAPERS   MULTIMEDIA 
SEARCH the Research Library: WHAT'S POPULAR
IT Management  >  Systems Operations  >  

Security Management

MORE SPECIFIC TOPICS:  Fraud Protection |  Integrated Threat Management |  Log Management |  Password Management |  Risk Assessment |  Security Event Management |  Security Policies |  Vulnerability Management
 All   White Papers   Multimedia   IT Downloads 
Limit Results:
Sort by:
1 - 15 of 2571 Matches
The Three Phases of Securing Privileged Accounts- A Best Practices Guide
sponsored by Cyber-Ark Software
White Paper: | Posted: 30 Jul 2014
Published:30 Jul 2014
Summary:This helpful white paper explains exactly how privileged account security works, and outlines the best practices for implementing it for your organization.
Get This Now
Cyber-Ark Software

Implementing Privileged Account Security to Address Advanced Threats
sponsored by Cyber-Ark Software
White Paper: | Posted: 30 Jul 2014
Published:31 Dec 2013
Summary:In this informative Q&A, you'll get inside information from industry analysts as they discuss the best security practices for IT professionals, why privileged account security is vital to a successful security plan, and how to protect your systems from new strategies utilized by cybercriminals.
Get This Now
Cyber-Ark Software

How Privileged Account Security Can Significantly Reduce Risk, Stop Attackers & Prevent Data Exfiltration
sponsored by Cyber-Ark Software
White Paper: | Posted: 30 Jul 2014
Published:31 May 2014
Summary:This white paper examines the best practices for minimizing the security risks that privileged accounts can create, and provides the essential strategic takeaways that can start protecting your organization now.
Get This Now
Cyber-Ark Software

Advanced Cyber Threats Demand a New Privileged Account Security Model
sponsored by Cyber-Ark Software
White Paper: | Posted: 30 Jul 2014
Published:29 Jun 2013
Summary:In this ESG report, discover how to better protect your privileged accounts by embracing new centralized architectural solutions.
Get This Now
Cyber-Ark Software

Advanced Evasion Techniques For Dummies
sponsored by McAfee, Inc.
eBook: | Posted: 30 Jul 2014
Published:31 Dec 2013
Summary:In this in-depth eBook, you'll learn about the different kinds of cybercrime organizations are up against today, and the best strategies to protect yourself from these advanced evasions and attacks.
Get This Now
McAfee, Inc.

Are you using the right tablet device?
sponsored by ComputerWeekly.com
Resource: | Posted: 30 Jul 2014
Published:30 Jul 2014
Summary:Is your tablet device the right tablet device for your business? Participate in our Web Security Research Program to find out. Upon completion of the survey, you will get immediate access to Computer Weekly Buyer's Guide to Business Tablets, where CW reveals the ins-and-outs of the tablet devices on the market.
Get This Now
ComputerWeekly.com

Secure Border Computing
sponsored by Zentera Systems Inc.
White Paper: | Posted: 30 Jul 2014
Published:30 Jul 2014
Summary:This important whitepaper covers the emerging cloud virtualization market and details how to keep your information secure.
Get This Now
Zentera Systems Inc.

How Managed Endpoint Security Can Help Expand Your Managed Services Business
sponsored by N-able Technologies
White Paper: | Posted: 30 Jul 2014
Published:30 Jul 2014
Summary:In this white paper, learn how utilizing a single integrated management platform for malware protection can help Managed Service Providers (MSPs) streamline and standardize their security efforts, and the many benefits of implementing managed endpoint security for MSPs and their customers.
Get This Now
N-able Technologies

What's Behind a Cyber Attack?
sponsored by IBM
White Paper: | Posted: 29 Jul 2014
Published:30 Apr 2014
Summary:This white paper analyzes the shortcomings of many current approaches to breach investigation, and also introduces one solution to help organizations to defend against advanced persistent and internal threats.
Get This Now
IBM

DCIG Buyer's Guide 2014-15: SIEM Appliances
sponsored by LogRhythm, Inc.
White Paper: | Posted: 29 Jul 2014
Published:29 Jul 2014
Summary:Many smaller organizations still face an uphill battle in understanding and sorting through the SIEM vendor options available to them and then choosing the right product for them. This Buyer's Guide lets IT organizations immediately understand what features and functions are available so they can move more quickly to making a buying decision.
Get This Now
LogRhythm, Inc.

Introducing LogRhythm v6.2
sponsored by LogRhythm, Inc.
White Paper: | Posted: 29 Jul 2014
Published:30 Apr 2014
Summary:Although security professionals do as much as they can to prevent error or risks, they must always be prepared for something to go wrong. Now they can with a powerful monitoring and auditing platform that keeps security personnel informed with an excellent investigatory tool.
Get This Now
LogRhythm, Inc.

Info-Tech Research Group 2015/15 Vendor Landscape Report
sponsored by LogRhythm, Inc.
White Paper: | Posted: 29 Jul 2014
Published:29 Jul 2014
Summary:Check out this vendor landscape report to see how the top 10 SIEM vendors compare and contrast.
Get This Now
LogRhythm, Inc.

Gartner Magic Quadrant for Security Information and Event Management (SIEM)
sponsored by LogRhythm, Inc.
White Paper: | Posted: 29 Jul 2014
Published:29 Jul 2014
Summary:Check out this Magic Quadrant report for security information and event management to see how leading vendors compare and contrast.
Get This Now
LogRhythm, Inc.

A Multilayered Defense Approach to Protect Your Organization's Data
sponsored by Symantec Corporation
White Paper: | Posted: 28 Jul 2014
Published:28 Jul 2014
Summary:This white paper details the types of attacks that enterprises commonly face, and it introduces a multilayered solution that could be a valuable investment for your organization in the face of these threats.
Get This Now
Symantec Corporation

Enterprise Information Security in Transition
sponsored by IBM
White Paper: | Posted: 28 Jul 2014
Published:31 Oct 2012
Summary:This white paper boils the reasons behind current issues in the information security field down into four major causes, and also lays out a list of specific, detailed changes that need to be made to the enterprise security model for these core issues to be resolved.
Get This Now
IBM

1 - 15 of 2571 Matches


Library Home | Advertise with Us | Partner with Us
 
Powered by Bitpipe
 
Java Development Research Library Copyright © 1998-2010 Bitpipe, Inc. All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.
Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.
webmaster@techtarget.com