Login
Password
Sources on this Page

> Headlines by Category

 Home / Technology / Security

You are using the plain HTML view, switch to advanced view for a more complete experience.

The Evolution of Disaster Recovery with SDS
This white paper examines five major reasons software-defined storage tiering can help radically simplify storage and drastically improve disaster recover implementations and operations. Published by: VMware
Critical Factors to Endpoint Security
Endpoints are the new security perimeter, and this means rethinking your endpoint security. This white paper will help you do so. Published by: Dell India
Know What Third-Party App Developers Are Doing
This white paper discusses the convenience of using of monitoring software for external application management activities. Published by: BalaBit
The Key to Smarter Enterprise Code Signing
This white paper explores several alternative approaches to enterpise code signing to minimize mismanagement of keys. View now to learn more. Published by: Symantec
Avoiding the Headlines: 5 Critical Security Practices to Implement Now
Inside this webinar, join Adrian Sanabria, Senior Security Analyst at 451 Research, and Amrit Williams, CTO of CloudPassage to learn five best practices to put in place in order to avoid a security breach within your organization. Published by: CloudPassage
Best Practices for Securing Your Citrix Remote Access Against Hacker Intrusions
Join this live webcast on May 21, 2015 to learn the best practices for securing your remote access against sophisticated hackers. Published by: Citrix Ready and SMS Passcode
Why Activity Monitoring Should Supplement Log Management
In this white paper, discover how you can fill in your log management gaps by monitoring privileged users. Published by: BalaBit
How Privileged Activity Monitoring Streamlines Compliance
This white paper gives suggestions for how you can use privileged activity monitoring to simplify your audit creation , particularly when it comes to ISO compliance. Published by: BalaBit
Big Data Governance and Metadata Management
View this webcast to learn how you can step up your data systems and manage Big Data effectively. Published by: Oracle Corporation
SSL Certificates: The Return of the DSA Algorithm
This white paper explores the shortcoming of the RSA algorithm and how the Digital Signature Algorithm (DSA) developed in 1991 is making a return in a big way to trip up cybercriminals. Published by: Symantec Corporation
Post Selected Items to:

Showing 10 items of about 10000

home  •   advertising  •   terms of service  •   privacy  •   about us  •   contact us  •   press release design by Popshop •   Official PR partner B2BLogger.com •   © 1999-2015 NewsKnowledge