IT Management  >   Systems Operations  >  

NSM

RSS Feed    Add to Google    Add to My Yahoo!
NSMWhite Papers (View All Report Types)
 
24/7 Visibility into Advanced Malware on Networks and Endpoints
sponsored by Tenable Network Security
WHITE PAPER: This white paper argues that containing the massive-scale security breaches that many high-profile organizations are experiencing requires a holistic approach that addresses vulnerabilities and threats at the network and system levels, and leverages threat intelligence to accurately identify attacks in progress.
Posted: 12 Nov 2014 | Published: 24 Oct 2014

Tenable Network Security

Predicting Attack Paths Within Your Networks
sponsored by Tenable Network Security
WHITE PAPER: This white paper describes how one company's advanced security solutions can be leveraged to identify systems within your networks that are vulnerable to exploitation.
Posted: 12 Nov 2014 | Published: 23 Oct 2014

Tenable Network Security

Gartner Report: Best Practices for Choosing, Implementing and Using MDM and EMM
sponsored by Citrix
WHITE PAPER: This whitepaper looks at the best practices and provides a step-by-step approach for mobile and security specialists.
Posted: 24 Oct 2014 | Published: 24 Oct 2014

Citrix

Networks That Know Automation
sponsored by Juniper Networks, Inc.
WHITE PAPER: Access this white paper to learn how networks are using automation to their advantage, especially with the popularity of software-defined networking (SDN).
Posted: 23 Oct 2014 | Published: 01 Aug 2014

Juniper Networks, Inc.

Five Ways Network Virtualization Will Revolutionize IT
sponsored by Global Knowledge
WHITE PAPER: Discover how Network Functions Virtualization (NFV) will revolutionize IT and change the way you think about network connectivity, and perhaps even application development.
Posted: 10 Nov 2014 | Published: 10 Nov 2014

Global Knowledge

Carrier Grade Reliability: What a Difference a '9' Makes!
sponsored by Wind River Systems, Inc.
WHITE PAPER: This white paper discusses the challenges that telecom service providers grapple with as they attempt to maintain service and network availability while continuing to refine their networks and introducing new network-based functions, such as network function virtualization.
Posted: 03 Oct 2014 | Published: 29 Sep 2014

Wind River Systems, Inc.

Innovating Through Cloud Technologies Change is in Your Hands
sponsored by FrontRange Solutions Inc.
WHITE PAPER: This white paper takes a look into the challenges surrounding the implementation of the cloud among businesses.
Posted: 17 Oct 2014 | Published: 31 Dec 2013

FrontRange Solutions Inc.

Empowering Your Mobile Workforce: Change is in Your Hands
sponsored by FrontRange Solutions Inc.
WHITE PAPER: This white paper explains how to power up your mobile management strategy in the workplace.
Posted: 20 Oct 2014 | Published: 31 Dec 2013

FrontRange Solutions Inc.

File Sync and Share Made Simple
sponsored by Code42
WHITE PAPER: This white paper describes a solution that provides IT teams and end users with a smart, simple file synce-and-share interaction that enables workers to work continuously.
Posted: 21 Oct 2014 | Published: 21 Oct 2014

Code42

Understanding the relationship between SDN and NFV
sponsored by Wind River Systems, Inc.
WHITE PAPER: This expert e-guide highlights the relationship between SDN and NFV and how the simplify network service provisioning.  Aditionally, learn what we need from NFV orchestration.
Posted: 20 Oct 2014 | Published: 20 Oct 2014

Wind River Systems, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
NSM White Papers | NSM Multimedia | NSM IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement