Infosecurity Reports

How SIEM Helps IT Security, Compliance, Operations and Management
sponsored by CDW Corporation
WHITE PAPER: Security information and event management (SIEM) tools offer more than just security. In fact, many organizations overlook some of the most useful aspects of SIEM technology, including fraud prevention and operations management. In this expert resource, discover the value of SIEM tools for four different audiences.
Posted: 12 Sep 2014 | Published: 12 Sep 2014

CDW Corporation

Surviving in a State of DDoS Denial
sponsored by TechTarget Security
EBOOK: DDoS attack prevention begins with understanding the nature of the latest sophisticated attacks. In this guide, leading security pros explain the mechanics of DDoS, the nature of the newest mega-attacks, and provide concrete, actionable guidance to make your systems as strong as possible.
Posted: 15 Jun 2015 | Published: 15 Jun 2015

TechTarget Security

Enterprise Information Protection - The Impact of Big Data
sponsored by IBM
WHITE PAPER: In this comprehensive resource, explore the requirements for information security and privacy in the age of big data. You'll discover how a holistic approach to enterprise information, along with the right big data technologies, enables you to keep data classified, secure, and organized.
Posted: 31 Jul 2013 | Published: 31 Mar 2013

IBM

KPN focuses on Information Security with HP
sponsored by Hewlett-Packard Enterprise
WEBCAST: View this brief webcast to gain insight on an information security solution one organization chose to defend against today's highly motivated hackers, and how they're benefiting.
Posted: 25 Nov 2013 | Premiered: Nov 25, 2013

Hewlett-Packard Enterprise

Economic & Productivity Impact of IT Security on Healthcare - Video
sponsored by Imprivata
WEBCAST: View this webcast to explore the results of a recent Ponemon Institute study that indicate a clear need for healthcare institutions to invest in modern communications technology to ensure efficient patient care, as well as compliance with the Health Insurance Portability and Accountability Act (HIPAA) regulations.
Posted: 08 Nov 2013 | Premiered: May 8, 2013

Imprivata

Get Smart About Threat Intel Tools and Services
sponsored by TechTarget Security
EBOOK: Learn how threat intelligence tools can improve enterprise security and where they should fit into the broader security scheme.
Posted: 25 Jun 2018 | Published: 25 Jun 2018

TechTarget Security

Reconfigure Your Antimalware Strategy to Boost Endpoint Security For Advanced Threat Protection
sponsored by OpenText Security Solutions
EGUIDE: This expert e-guide explains why reconfiguration of your current antimalware strategy is all it takes to mitigate new trends in cyber-attacks.
Posted: 17 Sep 2013 | Published: 17 Sep 2013

OpenText Security Solutions

Why Information Governance Must be Addressed Now, an Aberdeen Report
sponsored by IBM
ANALYST REPORT: This Aberdeen Group research report explores the challenges of data quality and information governance in the age of big data, and offers must-see advice for avoiding these problems and driving business success.
Posted: 16 Dec 2013 | Published: 31 Dec 2012

IBM

How to add Mobile Devices to Enterprise PKI solutions
sponsored by OpenTrust
WHITE PAPER: Extending Public Key Infrastructure’s (PKI) certificate-based authentication to include mobile devices is the only way to restore the security of computing assets in the BYOD era. Read this whitepaper to learn how to add mobile devices to your Enterprise PKI solution.
Posted: 27 Jun 2013 | Published: 27 Jun 2013

OpenTrust

Computer Weekly – 4 August 2015: Cyber risks hit the road
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, after hackers took remote control of a Jeep Cherokee, we assess the security concerns for internet-connected cars. With the growth of digital banking, is there a need for high-street branches anymore? And we examine whether email overload is hindering the UK's economic productivity. Read the issue now.
Posted: 03 Aug 2015 | Published: 03 Aug 2015

TechTarget ComputerWeekly.com