Security White Papers, Videos, Webcasts, Podcasts and Case Studies

Java Development Research Library

 WHITE PAPERS   MULTIMEDIA 
SEARCH the Research Library: WHAT'S POPULAR
IT Management  >  

Security

MORE SPECIFIC TOPICS:  AAA |  Application Security |  Certificate Authorities |  Cybersecurity |  Data Center Physical Security |  Data Security |  Database Security |  Endpoint Security |  Homeland Security |  Information Security |  Internet Security |  Messaging Security |  Network Security |  Physical Security |  Security Audits |  Security Management |  Security Threats |  Storage Security |  Virus Protection |  Web Application Security
 All   White Papers   Multimedia   IT Downloads 
Limit Results:
Sort by:
1 - 15 of 2247 Matches
Cisco 2014 Annual Security Report
sponsored by Cisco Systems, Inc.
White Paper: | Posted: 17 Apr 2014
Published:17 Apr 2014
Summary:This in-depth report provides valuable insight into the top security concerns of 2014 and what your organization can do to prevent cybercrime.
Get This Now
Cisco Systems, Inc.

What Businesses Need to Know About Cyber Security - Vendor Webcast
sponsored by Lumension
Webcast: | Posted: 17 Apr 2014
Premiered:Apr 17, 2014
Summary:Access this resource and witness 4 security experts discuss today's threat landscape and how cyber security is being dealt with across the world.
Get This Now
Lumension

Defending Your Corporate Endpoints: How to Go Beyond Anti-Virus
sponsored by Lumension
White Paper: | Posted: 17 Apr 2014
Published:17 Apr 2014
Summary:Malware is the most common type of cyber-threat and businesses are struggling when it comes to stopping its growing complexity. This informative resource explores some strategies for preventing these sophisticated malware attacks.
Get This Now
Lumension

Managing Complexity in Identity and Access Management
sponsored by RSA, The Security Division of EMC
Analyst Report: | Posted: 17 Apr 2014
Published:31 Aug 2013
Summary:This Ponemon Institute report sheds light on which level of complexity is best for an effective, yet easy-to-manage identity and access management (IAM) program.
Get This Now
RSA, The Security Division of EMC

NSS Labs: Breach Detection System Comparative Analysis
sponsored by Sourcefire
White Paper: | Posted: 17 Apr 2014
Published:17 Apr 2014
Summary:This informative analysis tests some top breach detection technologies and compares the standards of their security and performance.
Get This Now
Sourcefire

Is Your AV Keeping Up? - Vendor Webcast
sponsored by Lumension
Webcast: | Posted: 16 Apr 2014
Premiered:Apr 16, 2014
Summary:This informative resource takes a look at anti-virus technology and outlines how businesses can prevent sophisticated malware from infiltrating their system.
Get This Now
Lumension

Top 9 Mistakes of APT Victims: What They Are and What You Can Do To Prevent Them - Vendor Webcast
sponsored by Lumension
Webcast: | Posted: 16 Apr 2014
Premiered:Apr 16, 2014
Summary:This informative resource explores the role of APTs in today's current threat landscape and what you can do to prevent them.
Get This Now
Lumension

The Critical Incident Response Maturity Journey
sponsored by RSA, The Security Division of EMC
White Paper: | Posted: 16 Apr 2014
Published:31 Dec 2013
Summary:This paper focuses on defining levels of critical incident response maturity and how organizations can continually improve their incident response capabilities to help reduce the risk of experiencing a damaging incident.
Get This Now
RSA, The Security Division of EMC

The Case for GRC: Addressing the Top 10 GRC Challenges
sponsored by RSA, The Security Division of EMC
White Paper: | Posted: 16 Apr 2014
Published:31 Dec 2012
Summary:This white paper shares the top 10 governance, risk, and compliance (GRC) challenges, and offer industry-leading advice on how to best leverage this investment.
Get This Now
RSA, The Security Division of EMC

Health Insurance Association Launches a Security & Integration Cloud Services Brokerage
sponsored by Mashery
Case Study: | Posted: 16 Apr 2014
Published:31 Dec 2012
Summary:Read how BCBSA implemented a "mediation layer" that simplified security, integration and aggregation of healthcare information, while enabling users with mobile devices to access this information.
Get This Now
Mashery

A New Threat-Centric Security Model for Before, During, and After an Attack
sponsored by Sourcefire
White Paper: | Posted: 16 Apr 2014
Published:16 Apr 2014
Summary:This guide explores a threat-centric security model designed to prevent, detect and remediate any potential cyber-attacks.
Get This Now
Sourcefire

Next Generation Authentication for the Mobile Ready Enterprise
sponsored by RSA, The Security Division of EMC
White Paper: | Posted: 16 Apr 2014
Published:16 Apr 2014
Summary:This white paper explores a multi-factor authentication solution that allows organizations to leverage existing security services to better manage the identities accessing IT services from mobile devices.
Get This Now
RSA, The Security Division of EMC

Measure Risks and Vulnerability Effectively
sponsored by Hewlett-Packard Limited
White Paper: | Posted: 16 Apr 2014
Published:31 May 2013
Summary:This guide explores strategies for measuring your risks and vulnerabilities, as well as understanding what you must do to achieve these goals.
Get This Now
Hewlett-Packard Limited

Nine Steps to Smart Security for Small Businesses
sponsored by Qualys
White Paper: | Posted: 16 Apr 2014
Published:30 Dec 2011
Summary:This white paper lists the 9 steps to achieving smart security for small businesses and focuses on how a cloud security solution can benefit organizations without the resources for traditional security approaches.
Get This Now
Qualys

EMC Video Surviellance Storage Solution - Vendor Webcast
sponsored by EMC & Arrow
Webcast: | Posted: 16 Apr 2014
Premiered:Apr 16, 2014
Summary:Watch this concise webcast to uncover the key features of an industry-leading storage solution which has been specifically designed to support your video surveillance systems.
Get This Now
EMC & Arrow

1 - 15 of 2247 Matches


Library Home | Advertise with Us | Partner with Us
 
Powered by Bitpipe
 
Java Development Research Library Copyright © 1998-2010 Bitpipe, Inc. All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.
Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.
webmaster@techtarget.com