Security White Papers, Videos, Webcasts, Podcasts and Case Studies

Java Development Research Library

 WHITE PAPERS   MULTIMEDIA 
SEARCH the Research Library: WHAT'S POPULAR
IT Management  >  

Security

MORE SPECIFIC TOPICS:  AAA |  Application Security |  Certificate Authorities |  Cybersecurity |  Data Center Physical Security |  Data Security |  Database Security |  Endpoint Security |  Homeland Security |  Information Security |  Internet Security |  Messaging Security |  Network Security |  Physical Security |  Security Audits |  Security Management |  Security Threats |  Storage Security |  Virus Protection |  Web Application Security
 All   White Papers   Multimedia   IT Downloads 
Limit Results:
Sort by:
1 - 15 of 2515 Matches
Survey: Can Security in Higher Education Be Both Open and Secure?
sponsored by AlienVault
White Paper: | Posted: 23 Jul 2014
Published:30 Jun 2014
Summary:This report contains data collected by SANS regarding the successes and challenges that colleges and universities experience in protecting their environments from threats, and also provides advice for security professionals working in these environments to improve their tactics in this critical area.
Get This Now
AlienVault

Live Demo: How to Detect a Cryptolocker Infection - Vendor Webcast
sponsored by AlienVault
Webcast: | Posted: 23 Jul 2014
Premiered:Jul 23, 2014
Summary:This informative webcast explains how CryptoLocker, a type of ransomware, gains access to your computer, and how to use a Unified Security Management platform to monitor and detect these dangerous threats.
Get This Now
AlienVault

Webcast: Practical Threat Management and Incident Response for Small and Medium-Sized Enterprises - Vendor Webcast
sponsored by AlienVault
Webcast: | Posted: 23 Jul 2014
Premiered:Jul 23, 2014
Summary:This helpful webcast discusses a multitude of critical issues related to threat management in small and medium-sized enterprises.
Get This Now
AlienVault

Memory corruption attacks
sponsored by ComputerWeekly.com
Essential Guide: | Posted: 22 Jul 2014
Published:22 Jul 2014
Summary:This article in our Royal Holloway Security Series argues that the lack of diversity in software and operating systems has left a large number of computers vulnerable to memory program attacks.
Get This Now
ComputerWeekly.com

SQL Compliance Manager – Download Free Trial
sponsored by Idera
Software Download: | Posted: 22 Jul 2014
Premiered:22 Jul 2014
Summary:Uncover the ins-and-outs of SQL Compliance Manager – and get your hands on a free trial.
Get This Now
Idera

Protecting Organizations Against Advanced Persistent Threats
sponsored by CDW Corporation
Video: | Posted: 22 Jul 2014
Premiered:21 May 2014
Summary:This helpful video provides an overview of advanced persistent threats (APTs) and identifies several best practices that organizations should keep in mind to identify vulnerabilities and enforce stronger security policies.
Get This Now
CDW Corporation

Combatting APTs with a Defense-in-Depth Security Approach
sponsored by CDW Corporation
White Paper: | Posted: 22 Jul 2014
Published:05 Mar 2014
Summary:This informative white paper contains critical information on why a defense-in-depth security approach has proven effective in protecting organizations' sensitive data from APTs.
Get This Now
CDW Corporation

A Secure Transition to iOS
sponsored by IBM
White Paper: | Posted: 22 Jul 2014
Published:22 Jul 2014
Summary:Read this white paper to learn about a security solution that has a clean and intuitive interface with easy reporting and usage tracking for expense management.
Get This Now
IBM

Tactics to combat insider threat
sponsored by ComputerWeekly.com
Essential Guide: | Posted: 22 Jul 2014
Published:22 Jul 2014
Summary:This article in our Royal Holloway Security Series argues that the threat to an organisation’s data security from within its workforce requires a considered and objective approach.
Get This Now
ComputerWeekly.com

Secure, sync and share content on your mobile device - BYOD
sponsored by Acronis
Video: | Posted: 22 Jul 2014
Premiered:22 Jul 2014
Summary:This video explains some of the challenges of the BYOD trend and highlights a solution that allows organizations to deliver optimal access, sync and share capabilities without sacrificing security.
Get This Now
Acronis

5 Things Your Organization Can Do Today to Improve Security
sponsored by CDW Corporation
White Paper: | Posted: 22 Jul 2014
Published:04 Apr 2014
Summary:This informative resource contains insights from a security assessment professional on the problematic patterns that he has observed within a wide variety of organizations, as well as their simple but critical solutions.
Get This Now
CDW Corporation

Keeping IT Security Decision-Making on Track
sponsored by CDW Corporation
White Paper: | Posted: 22 Jul 2014
Published:21 Feb 2013
Summary:This resource defines multiple approaches to IT security organization and decision-making that can help companies to determine the most effective ways of functioning in these areas.
Get This Now
CDW Corporation

Strengthening and Simplifying Enterprise Security and Data Protection
sponsored by CDW Corporation
White Paper: | Posted: 22 Jul 2014
Published:22 Jul 2014
Summary:This informative white paper describes one company's comprehensive portfolio of security and data protection solutions.
Get This Now
CDW Corporation

Solution Spotlight: Threat Intelligence Can Give Enterprise Security the Upper Hand
sponsored by IBM
eGuide: | Posted: 21 Jul 2014
Published:21 Jul 2014
Summary:In this expert e-guide, discover how threat intelligence can go hand in hand with new technology—and how to avoid system vulnerabilities for security purposes.
Get This Now
IBM

IPS/IDS: Innovations, Changes and How to Solve Your Problems
sponsored by IBM
eGuide: | Posted: 21 Jul 2014
Published:21 Jul 2014
Summary:This expert e-guide explores recent innovations to IDS/IPS technologies and outlines strategies for solving breach detection issues.
Get This Now
IBM

1 - 15 of 2515 Matches


Library Home | Advertise with Us | Partner with Us
 
Powered by Bitpipe
 
Java Development Research Library Copyright © 1998-2010 Bitpipe, Inc. All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.
Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.
webmaster@techtarget.com