Login
Password
Sources on this Page

> Headlines by Category

 Home / Technology / Security / Security Administration

You are using the plain HTML view, switch to advanced view for a more complete experience.

Protecting Your Roaming Workforce With Cloud-Based Security
Remote and roaming workers are constantly checking email, downloading data and staying productive. Results are their top priority—security is not. IT departments must mitigate the ...
A Manager's Guide to Unified Threat Management and Next-Gen Firewalls
A lot of security vendors use the terms Unified Threat Management (UTM) and Next-Gen Firewall (NGFW) interchangeably — so it’s easy to get confused about which type of protection i...
Information Lifecycle Governance Leader - Reference Guide
Data is growing at unprecedented rates. But how much of it is useful to your business? Read this leader guide from the Compliance, Governance and Oversight Council (CGOC) to learn ...
Fixing the Disconnect Between Employer and Employee for BYOD
BYOD security management adds complications that businesses have not faced before – the devices are owned by employees and contain the owners’ personal data.To explore the disconn...
Firewall Buyers Guide
Five key areas to consider when choosing your next firewallChecklist of the security capabilities you needQuestions to ask vendors to make sure they meet your requirementsCompar...
Buyer Brief- Improving the Management and Governance of Unstructured Data
Maximize efficiency with deeper insight to data value and automated, policy-based compliance, retention & disposition
Following the Rules - Reducing the Risk
A short article by AIIM on compliance
iOS 8 third-party keyboards: Enterprise IT needs to understand security risks
One of the biggest new features in iOS 8 is the addition of third-party keyboards, something Android has had for a long time. Here's a look at some of the options, and the risks, b...
How We Define a Network is about to Change, Again
VMware NSX does for networks and physical network components what virtual machines did for data centers and physical servers. It allows you to use them in very different and more f...
Working with Windows 8.1's Credential Manager
Greg Shultz takes a look at the Windows 8.1's Credential Manager and explains how it works.
Post Selected Items to:

Showing 10 items of 167

home  •   advertising  •   terms of service  •   privacy  •   about us  •   contact us  •   press release design by Popshop •   Official PR partner B2BLogger.com •   © 1999-2014 NewsKnowledge