IT Agents  >   Research Institutes and Consortia  >   Software Engineering Institute  >  

CERT

RSS Feed    Add to Google    Add to My Yahoo!
CERTWhite Papers (View All Report Types)
 
Viewing Application Performance from the End-User Perspective
sponsored by Fluke Networks
WHITE PAPER: This resource introduces Application-Aware Network Performance Management, which quickly identifies the root cause of performance issues within a complex application environment.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

Fluke Networks

IT jobswatch – trends in media IT recruitment
sponsored by ComputerWeekly.com
WHITE PAPER: This quarters figures compiled by jobadswatch.co.uk show that during the fourth quarter of 2010 the IT jobs market for permanent staff being recruited by media organisations is up by 1.8%. This is the sixth consecutive quarter that has seen higher demand.
Posted: 20 Oct 2011 | Published: 15 Mar 2011

ComputerWeekly.com

Working Together To Improve Strategic Planning
sponsored by Oracle Corporation
WHITE PAPER: This report reveals compelling examples of how organizations foster collaboration between finance and IT to ensure successful strategic planning.
Posted: 01 Oct 2010 | Published: 01 Oct 2010

Oracle Corporation

The 7 Deadly Skills of The Perfect Employee
sponsored by Skillsoft
WHITE PAPER: This resource examines the 7 skills essential to employee success and how to keep your employees productive and satisfied.
Posted: 23 Apr 2012 | Published: 23 Apr 2012

Skillsoft

Gartner Middle East CIO Leadership Forum
sponsored by Gartner
WHITE PAPER: Join Gartner analysts from 28 February to 1 March in Dubai, industry thought leaders and a select group of your peers to find new answers to new questions - and learn how your IT leadership can create and follow the path to world class best practice.
Posted: 28 Jan 2011 | Published: 28 Jan 2011

Gartner

Five Myths of Agile Development
sponsored by VersionOne Inc.
WHITE PAPER: In this white paper, you will gain insight into five myths commonly associated with agile development. Explore what agile development is in reality, what it is not, and the true benefits of transitioning to agile methods in your organization.
Posted: 15 Oct 2008 | Published: 26 Sep 2008

VersionOne Inc.

Extending Reach and Ensuring Effectiveness of Leadership Development: The Role of Technology-Based Learning
sponsored by Skillsoft
WHITE PAPER: This paper discusses leadership development and the role of technology-based learning in leadership development programs.
Posted: 18 Apr 2012 | Published: 01 Apr 2010

Skillsoft

The 7 Deadly Skills Your IT Team Should Possess
sponsored by Skillsoft
WHITE PAPER: This resource examines IT skill shortages, how to minimise them within your company, and 7 deadly skills that your IT team should possess.
Posted: 18 Apr 2012 | Published: 18 Apr 2012

Skillsoft

SysML-Based Systems Engineering Using a Model-Driven Development Approach
sponsored by IBM
WHITE PAPER: This paper describes a SysML-based (Systems Modeling Language) process that systems engineers can use to capture requirements and specify architecture. The approach uses model execution as a means for requirements verification and validation.
Posted: 23 Feb 2009 | Published: 01 Oct 2008

IBM

2012 Security Outlook
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from the Corporate Executive Board, based on extensive research with Chief Information Security Officers, identifies the top 10 security imperatives for 2012.
Posted: 24 Feb 2012 | Published: 24 Feb 2012

ComputerWeekly.com

UK steps towards “Digital Britain” with the introduction of the Digital Economy Act 2010
sponsored by ComputerWeekly.com
WHITE PAPER: In this article, we describe how some key Digital Britain proposals have been implemented in the Digital Economy Act 2010.
Posted: 25 Oct 2011 | Published: 02 Jun 2010

ComputerWeekly.com

The Pros and Cons of Delivering Web Pages Over an SSL Connection
sponsored by SearchSecurity.com
EGUIDE: Though Secure Sockets Layer (SSL) offers distinct security advantages, there are drawbacks to this method of webpage delivery, as well. This expert e-guide explores the pros and cons of delivering webpages over an SSL connection. See if this strategy is right for your organization – read on to learn more.
Posted: 27 Dec 2012 | Published: 20 Dec 2012

SearchSecurity.com

The Hidden Costs of Self-Signed SSL Certificates
sponsored by Symantec Corporation
WHITE PAPER: Many IT professionals believe that self-signed SSL certificates can help lower security costs. Unfortunately, aside from the certificate itself, there are a number of other costs. This paper uncovers the true total cost of ownership for self-signed SSL certificates and why they are costlier and riskier than working with a trusted security vendor.
Posted: 09 May 2012 | Published: 09 May 2012

Symantec Corporation

Explaining How Trusted SSL Certificates and Forged SSL Certificates Work
sponsored by SearchSecurity.com
EGUIDE: This expert e-guide explores how trusted and forged SSL certificates work, as well as the dangers that arise from compromised Certification Authorities (CAs). Discover what you need to know about the state of the digital marketplace today – read on to learn more.
Posted: 27 Dec 2012 | Published: 19 Dec 2012

SearchSecurity.com

How SSL-Encrypted Web Connections are Intercepted
sponsored by SearchSecurity.com
EGUIDE: In this expert e-guide, uncover 4 key strategies for defending against illegal TLS/SSL-encrypted Web connection interception. Learn how these cyber-attacks work, the challenges of digital certificates, SSL-interception tools, and more by reading on now.
Posted: 27 Dec 2012 | Published: 17 Dec 2012

SearchSecurity.com

How to tackle cloud, IAM, and digital certificate problems in your organization
sponsored by SearchSecurity.com
EBOOK: In this in-depth resource, you’ll find extensive amounts of information regarding options for mitigating digital security certificate problems, as well as a breakdown of the challenges posed by IAM in the extended enterprise.
Posted: 11 Jul 2013 | Published: 11 Jul 2013

SearchSecurity.com

CW Special report on Symantec
sponsored by ComputerWeekly.com
WHITE PAPER: This in-depth profile from Computer Weekly, updated for 2013, gives you the key facts on Symantec's products, financial performance and strategy.
Posted: 14 May 2013 | Published: 14 May 2013

ComputerWeekly.com

IBM FlashSystem Database Mirroring Best Practices
sponsored by IBM
WHITE PAPER: This technical paper explores the best practices of database mirroring, which allows for a failover or recovery strategy as an economical approach to availability.
Posted: 18 Apr 2014 | Published: 30 Apr 2013

IBM

The Essential Elements of Critical Infrastructure Protection against Advanced Threats
sponsored by FireEye
WHITE PAPER: This white paper highlights the current challenges organizations face in terms of cybersecurity. It also mentions 3 essential elements to an effective Critical Infrastructure Protection approach.
Posted: 07 Aug 2014 | Published: 07 Aug 2014

FireEye

E-Book: Strategic guide to insider threat detection and breach response
sponsored by SearchSecurity.com
EGUIDE: Data loss by insiders poses a significant threat to enterprises, so it's critical to have a plan in place to detect, prevent or mitigate the behaviors of malicious insiders. This expert e-book discusses strategies for implementing insider threat detection tools and provides 10 simple steps for building a robust security breach response plan.
Posted: 17 Mar 2011 | Published: 17 Mar 2011

SearchSecurity.com

Threat Intelligence and Data Solutions for your Security Strategy
sponsored by Dell SecureWorks
WHITE PAPER: This paper will discuss the benefits of threat intelligence for both the enterprise and individual security professionals, plus what costs organizations to not have threat intelligence.
Posted: 11 Apr 2011 | Published: 11 Apr 2011

Dell SecureWorks

Next Generation Enterprise Network Security Solutions: The Importance of Incorporating Vulnerability Intelligence-
sponsored by Hewlett-Packard Company
WHITE PAPER: This crucial paper surveys today's network security threat landscape, discussing available tools, best practices, and the critical role that vulnerability intelligence must play in your security strategy.
Posted: 25 Feb 2014 | Published: 25 Feb 2014

Hewlett-Packard Company

Tactics to combat insider threat
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series argues that the threat to an organisation’s data security from within its workforce requires a considered and objective approach.
Posted: 22 Jul 2014 | Published: 22 Jul 2014

ComputerWeekly.com

Exposing the Cybersecurity Cracks: Australia
sponsored by Websense, Inc.
WHITE PAPER: The following report learn how better communication and information about cybersecurity, the right investment in skilled personnel, enabling technologies, and the adoption of security measures will minimized the risk of current and emerging cyber threats.
Posted: 28 Jul 2014 | Published: 28 Jul 2014

Websense, Inc.

The Dynamic Duo: SAM & Security
sponsored by CDW Corporation
WHITE PAPER: This whitepaper offers software asset management as a solution that can meet new licensing and security challenges.
Posted: 02 Apr 2014 | Published: 02 Apr 2014

CDW Corporation

Class: Implement a cloud computing environment using Red Hat Enterprise Linux OpenStack Platform
sponsored by Red Hat
WHITE PAPER: This course teaches system administrators and those responsible for managing a cloud how to implement a cloud computing environment using Red Hat® Enterprise Linux® OpenStack® Platform, including installation, configuration, and maintenance.
Posted: 20 May 2014 | Published: 20 May 2014

Red Hat

The BMC and IPMI Vulnerabilities
sponsored by Avocent
WHITE PAPER: Recent analyst studies have shown that there are potential security flaws in BMCs, also known as service processors, and the Intelligent Platform Management Interface protocol. Read this whitepaper to learn how you can contain the risk.
Posted: 13 May 2014 | Published: 31 Dec 2013

Avocent

HP Mobile Security Assessment
sponsored by Hewlett-Packard Company
DATA SHEET: In this resource, discover a mobile security assessment that tests your most sensitive applications.
Posted: 15 Sep 2014 | Published: 01 Jun 2013

Hewlett-Packard Company

Take Action Against Downtime: How to Minimize Downtime in Four Steps
sponsored by GlobalScape
WHITE PAPER: This white paper explains the top 3 ways downtime will negatively impact organizations, and offers 4 steps to help you improve security and availability of your systems.
Posted: 23 May 2014 | Published: 23 May 2014

GlobalScape

Visualize Your Entire Mobile Environment
sponsored by Fiberlink
DATA SHEET: Each entireprise is unique, so you need a flexible yet simple platform to manage your mobile environment.  Enterprise IT is in the middle of a shift in how they provide support and do business, and enterprise management needs to do the same.
Posted: 28 Aug 2014 | Published: 28 Aug 2014

Fiberlink

I Have to Trust Someone… Don't I?
sponsored by CA Technologies.
WHITE PAPER: This whitepaper outlines the significance of insider threats within every company.
Posted: 25 Jun 2014 | Published: 31 Jul 2013

CA Technologies.

MicroScope July 2014: An issue covering changes in the business intelligence market
sponsored by MicroScope
EZINE: An issue highlighting the changing business intelligence market and the opportunities for resellers
Posted: 14 Jul 2014 | Published: 11 Jul 2014

MicroScope

How to handle requirements for risk assessment methodologies
sponsored by ComputerWeekly.com
WHITE PAPER: Over time, the information security/risk management profession has developed a variety of methods for assessing risk within an organization.
Posted: 24 Oct 2011 | Published: 25 Nov 2010

ComputerWeekly.com

Step by Step: Best practices for security patch management
sponsored by SearchSecurity.com
EGUIDE: Whether you're new to patch management or just need a refresher, this expert e-guide reviews best practices for security patch management to ensure accurate, effective patch testing in your organization.
Posted: 03 Mar 2011 | Published: 03 Mar 2011

SearchSecurity.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement