Security Management White Papers, Videos, Webcasts, Podcasts and Case Studies

Java Development Research Library

 WHITE PAPERS   MULTIMEDIA 
SEARCH the Research Library: WHAT'S POPULAR
IT Management  >  Systems Operations  >  

Security Management

MORE SPECIFIC TOPICS:  Fraud Protection |  Integrated Threat Management |  Log Management |  Password Management |  Risk Assessment |  Security Event Management |  Security Policies |  Vulnerability Management
 All   White Papers   Multimedia   IT Downloads 
Limit Results:
Sort by:
1 - 15 of 2335 Matches
How-to Build High Performance Security for the Software-Defined Data Center - Vendor Podcast
sponsored by Trend Micro
Podcast: | Posted: 18 Apr 2014
Premiered:Apr 11, 2014
Summary:Listen to this podcast for valuable information to consider when virtualizing your networks, especially with a whole new set of security risks to worry about. Click now for key recommendations to ensure a high-performance, secure network.
Get This Now
Trend Micro

How to Consolidate Identities for Office 365 and Cloud Access - Vendor Webcast
sponsored by Radiant Logic, Inc.
Webcast: | Posted: 18 Apr 2014
Premiered:Apr 18, 2014
Summary:This webcast offers top, simple recommendations on how to extend existing identity and access management strategies to the cloud.
Get This Now
Radiant Logic, Inc.

A Guide to Data Privacy for Business and IT Executives
sponsored by IntraLinks, Inc
White Paper: | Posted: 18 Apr 2014
Published:31 Dec 2013
Summary:This white paper explains the latest global government efforts in enforcing stronger data privacy laws. Click now to uncover 6 data protection recommendations to help you mitigate the risks of information sharing and prevent regulatory and market sanctions.
Get This Now
IntraLinks, Inc

Retail Cyber Crime
sponsored by LogRhythm, Inc.
White Paper: | Posted: 18 Apr 2014
Published:18 Apr 2014
Summary:This guide explores the growing trend of retail-based cybercrime and the importance of securing your point-of-sale endpoints.
Get This Now
LogRhythm, Inc.

Design Security Policies For #GenMobile
sponsored by Aruba Networks
White Paper: | Posted: 18 Apr 2014
Published:18 Apr 2014
Summary:This white paper highlights the 4 areas that must be addressed when providing secure, reliable access to business applications for mobile users. Click through to explore the essential tools you need for this strategy.
Get This Now
Aruba Networks

Encryption Buyer's Guide
sponsored by Sophos, Inc.
White Paper: | Posted: 18 Apr 2014
Published:18 Apr 2014
Summary:This white paper offers 3 key questions to ask an encryption vendor to help you find a tool that best fits your business needs.
Get This Now
Sophos, Inc.

Policy Based Encryption: Protecting your Business Against Email Risks
sponsored by Apptix
White Paper: | Posted: 18 Apr 2014
Published:31 Dec 2013
Summary:This white paper features a cloud-based gateway service offering policy-based encryption to protect your business email exchanges.
Get This Now
Apptix

Network Monitoring and your SIEM Solution
sponsored by LogRhythm, Inc.
White Paper: | Posted: 18 Apr 2014
Published:18 Apr 2014
Summary:This informative guide provides insight into an effective network monitoring solution and how it can enhance your SIEM strategy.
Get This Now
LogRhythm, Inc.

A Security Overview of Adobe Cloud Services
sponsored by CDW Corporation
White Paper: | Posted: 18 Apr 2014
Published:01 Jan 2014
Summary:Explore this informative whitepaper to learn how Adobe designs their cloud services, what they do to keep them secure, and how you can give your team the competitive edge in the workplace by making a leap to the cloud.
Get This Now
CDW Corporation

The State of APT Preparedness: Enterprises Struggle to Adapt to Changing IT Security Risks
sponsored by Lumension
White Paper: | Posted: 18 Apr 2014
Published:31 Dec 2013
Summary:This informative guide explores the current struggles enterprises face when adapting to changing security risks and what you can do to prepare for APTs.
Get This Now
Lumension

SC Magazine Security Brief: Server Side Risk
sponsored by Lumension
White Paper: | Posted: 18 Apr 2014
Published:18 Apr 2014
Summary:This crucial resource analyzes how attackers today use advance persistent threats (APTs) to exploit server vulnerabilities to disrupt business and steal critical information, discussing also how to prepare for and mitigate these attacks.
Get This Now
Lumension

The 5 Key Tactics for Dealing with Advanced Persistent Threats
sponsored by Lumension
White Paper: | Posted: 18 Apr 2014
Published:31 Dec 2013
Summary:This guide explores 5 key tactics for dealing with APTs and how to prevent potential APT attacks.
Get This Now
Lumension

The Most Powerful of Adversaries: NSA Programs and Techniques Provide Lessons in Data Privacy and Managing Enterprise Collaboration
sponsored by IntraLinks, Inc
White Paper: | Posted: 17 Apr 2014
Published:17 Apr 2014
Summary:This resource reveals best practices on how to protect intellectual property, especially from the U.S. National Security Agency (NSA) and other government actors, who have the power to exploit critical data.
Get This Now
IntraLinks, Inc

Websense 2014 Threat Report, Websense Security Labs
sponsored by Websense
White Paper: | Posted: 17 Apr 2014
Published:17 Apr 2014
Summary:In preparing the Websense® 2014 Threat Report, Websense Security Labs™ researchers examined cybersecurity through the lens of a seven-stage kill chain and attack model. Learn how to apply the seven-stage "kill chain" and attack model to your cybersecurity.
Get This Now
Websense

Transforming Information Security: Future-Proofing Processes
sponsored by RSA, The Security Division of EMC
White Paper: | Posted: 17 Apr 2014
Published:31 Dec 2013
Summary:Adapting your security strategy to today's expanding threat landscape can be a daunting task. This guide explores strategies for enhancing your security strategy and how to adapt to the current threat landscape.
Get This Now
RSA, The Security Division of EMC

1 - 15 of 2335 Matches


Library Home | Advertise with Us | Partner with Us
 
Powered by Bitpipe
 
Java Development Research Library Copyright © 1998-2010 Bitpipe, Inc. All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.
Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.
webmaster@techtarget.com