IT Management  >   Systems Operations  >   Security  >  

National Security

RSS Feed    Add to Google    Add to My Yahoo!
National SecurityWhite Papers (View All Report Types)
 
Beyond Native Email: Giving mobile users advanced collaboration capabilities
sponsored by Citrix
WHITE PAPER: Explore this resource to learn how you can bring native email to your workforce and enable them with access via mobile devices without sacrificing security. Read on now to find out more.
Posted: 04 Aug 2014 | Published: 30 Apr 2014

Citrix

Reducing the Cost and Complexity of Web Vulnerability Management
sponsored by Symantec
WHITE PAPER: This white paper investigates how to reduce the cost and complexity of Web vulnerability management with a managed approach for detection.
Posted: 05 Aug 2014 | Published: 31 Dec 2012

Symantec

Diversionary and Multivector DDoS Attacks
sponsored by Juniper Networks, Inc.
WHITE PAPER: In this essential white paper, you'll learn about the rise of these destructive attacks, why they are so difficult to block, and how an integrated security solution could help keep your organization protected.
Posted: 07 Aug 2014 | Published: 07 Aug 2014

Juniper Networks, Inc.

Eight Steps to Fill the Mobile Enterprise Application Gap
sponsored by Citrix
WHITE PAPER: Explore this resource to learn eight steps that can help you move towards a BYOD policy and enable your workforce to benefit from enhanced productivity and flexibility that can lead to transformative business processes and give your organization a competitive advantage. Read on now to learn more.
Posted: 04 Aug 2014 | Published: 31 May 2014

Citrix

Putting mobile first: best practices in the financial services sector
sponsored by IBM
WHITE PAPER: Explore this in-depth resource to discover tips and best practices for optimizing your BYOD program and mobile infrastructure to meet the demands of the financial services sector. Read on now to find out more.
Posted: 21 Aug 2014 | Published: 31 Dec 2013

IBM

Cybersecurity’s Maginot Line: A Real-World Assessment Of The Defense-In-Depth Model
sponsored by FireEye
WHITE PAPER: This essential white paper outlines how organizations can update their security solutions for the modern age by reducing waste on redundant, backward-looking technology, and refocusing on defenses designed to stop today's cyber attacks.
Posted: 06 Aug 2014 | Published: 06 Aug 2014

FireEye

The Heartbleed Bug: How To Protect Your Business
sponsored by Symantec Corporation
WHITE PAPER: In this in-depth white paper, learn how new security platforms can protect your data against Heartbleed and any future attacks with advanced tools like two-factor authentication.
Posted: 06 Aug 2014 | Published: 06 Aug 2014

Symantec Corporation

How to Create a Peripheral Firewall System for Multi-Tenant Clouds
sponsored by Zentera Systems Inc.
WHITE PAPER: Learn how Zentera zChamber creates peripheral firewall systems in mult-tenant cloud computing environments.
Posted: 21 Aug 2014 | Published: 21 Aug 2014

Zentera Systems Inc.

Get the Facts On APTs To Avoid Misguided Security Efforts
sponsored by IBM
WHITE PAPER: This expert E-Guide cuts through the confusion, explaining exactly what APT is, what they are capable of, and how you can best defend your organization from them.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

IBM

Resolve Performance Issues Within Your Citrix XenApp Environment
sponsored by Riverbed Technology, Inc.
WHITE PAPER: This white paper introduces an innovative application performance management technology that could be very valuable to IT professionals who frequently troubleshoot performance issues across a Citrix server, saving time and taking the guesswork out of the analysis.
Posted: 04 Aug 2014 | Published: 31 Dec 2013

Riverbed Technology, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement