Security Management White Papers, Videos, Webcasts, Podcasts and Case Studies

Java Development Research Library

 WHITE PAPERS   MULTIMEDIA 
SEARCH the Research Library: WHAT'S POPULAR
IT Management  >  Systems Operations  >  

Security Management

MORE SPECIFIC TOPICS:  Fraud Protection |  Integrated Threat Management |  Log Management |  Password Management |  Risk Assessment |  Security Event Management |  Security Policies |  Vulnerability Management
 All   White Papers   Multimedia   IT Downloads 
Limit Results:
Sort by:
1 - 15 of 2375 Matches
Simplify implementation of the HITRUST Common Security Framework
sponsored by Symantec Corporation
White Paper: | Posted: 24 Apr 2014
Published:31 Mar 2013
Summary:Click through to explore the Health Information Trust Alliance (HITRUST) common security framework (CSF) which harmoniously combines compliance management controls for simplified, cost-effective HCO audit preparation.
Get This Now
Symantec Corporation

Industry Perspectives: The Impact of HIPAA and HITECH
sponsored by Symantec Corporation
White Paper: | Posted: 24 Apr 2014
Published:30 Jun 2011
Summary:This white paper features a set of solutions that address not only compliance concerns, but the overarching risk potential in today's healthcare environments.
Get This Now
Symantec Corporation

DDoS Prevention: Time for "Defense in Depth"
sponsored by Fortinet, Inc.
Analyst Report: | Posted: 24 Apr 2014
Published:24 Apr 2014
Summary:This informative guide provides you with key strategies to prevent DDoS attacks and outlines what you can expect in the coming years.
Get This Now
Fortinet, Inc.

Mobility Management Selection Guide
sponsored by Citrix
White Paper: | Posted: 24 Apr 2014
Published:24 Apr 2014
Summary:This crucial white paper takes an in-depth look at the criteria you can use to choose the best enterprise mobility management system for your organization’s specific needs.
Get This Now
Citrix

Threat-Aware Identity and Access Management for Cloud, Mobile and Enterprise Security
sponsored by IBM
White Paper: | Posted: 24 Apr 2014
Published:31 Dec 2013
Summary:This white paper features threat-aware IAM software that offers centralized security management across physical and virtual applications.
Get This Now
IBM

A Risk Management Approach to HITECH
sponsored by Symantec Corporation
White Paper: | Posted: 23 Apr 2014
Published:23 Apr 2014
Summary:This exclusive resource describes the challenges of security and privacy in the healthcare environment, discussing how you can best assess risk, prevent data loss, and secure critical systems with minimal impact on the end user or the quality of patient care.
Get This Now
Symantec Corporation

Securing 24x7 Operation of Clinical IT Systems
sponsored by Symantec Corporation
White Paper: | Posted: 23 Apr 2014
Published:31 Dec 2013
Summary:This brief white paper highlights 6 risk management and compliance best practices to help HCOs avoid strict HIPAA violations and fines.
Get This Now
Symantec Corporation

Cloud Web Security Using Cisco ASA
sponsored by Cisco Systems, Inc.
White Paper: | Posted: 23 Apr 2014
Published:23 Apr 2014
Summary:This exclusive resource examines a cloud web security (CWS) solution that offers a combination of web usage controls with category and reputation-based control, malware filtering, and data protection to address the need for a corporate web security policy.
Get This Now
Cisco Systems, Inc.

Cisco Web Security Appliance
sponsored by Cisco Systems, Inc.
White Paper: | Posted: 23 Apr 2014
Published:23 Apr 2014
Summary:This exclusive paper examines a web security appliance that combines advanced malware protection, application visibility and control, insightful reporting and highly secure mobility to ensure the protection and control of web traffic.
Get This Now
Cisco Systems, Inc.

Cisco Email Security
sponsored by Cisco Systems, Inc.
White Paper: | Posted: 23 Apr 2014
Published:22 Apr 2014
Summary:This informative resource discusses how you can ensure the safety and security of your corporate email environment, detailing threats you should prepare for and tools you can use to mitigate them.
Get This Now
Cisco Systems, Inc.

Content Security – Safe Guarding Organization Play - Vendor Webcast
sponsored by Cisco Systems, Inc.
Webcast: | Posted: 23 Apr 2014
Premiered:Apr 22, 2014
Summary:This informative webcast discusses a security solution that is designed specifically to inspect the content of web and email transactions using state-of-the art threat intelligence, eliminating potentially harmful threats while allowing safe transactions to proceed effectively and efficiently.
Get This Now
Cisco Systems, Inc.

Cisco Cloud Web Security: Single Interface for Global Control
sponsored by Cisco Systems, Inc.
White Paper: | Posted: 23 Apr 2014
Published:28 Feb 2014
Summary:This resource features a cloud Web security solution that offers unique features to help you gain clear visibility and complete control over today's more expansive networks.
Get This Now
Cisco Systems, Inc.

HIPAA Compliance in a BYOD Environment
sponsored by Imprivata
eGuide: | Posted: 23 Apr 2014
Published:23 Apr 2014
Summary:Access this expert e-guide from SearchHealthIT.com to explore the mHealth survey results to see how your peers are faring with HIPAA compliance given their latest BYOD implementations.
Get This Now
Imprivata

Avoid HIPAA Compliance Violations Amid the Rise of BYOD
sponsored by Imprivata
White Paper: | Posted: 23 Apr 2014
Published:23 Apr 2014
Summary:This expert e-guide from SearchHealthIT.com offers 5 tips on how to secure a mobility strategy so that HCOs can enjoy the benefits of a more flexible workforce while maintaining HIPAA compliance.
Get This Now
Imprivata

Is Your Data Center Ready for Today’s DDoS Threats?
sponsored by Fortinet, Inc.
White Paper: | Posted: 23 Apr 2014
Published:23 Apr 2014
Summary:This guide explores various DDoS attack types and highlights some key protection methods for testing your detection and mitigation defenses.
Get This Now
Fortinet, Inc.

1 - 15 of 2375 Matches


Library Home | Advertise with Us | Partner with Us
 
Powered by Bitpipe
 
Java Development Research Library Copyright © 1998-2010 Bitpipe, Inc. All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.
Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.
webmaster@techtarget.com