IT Management  >   Systems Operations  >   Security  >  

National Security

RSS Feed    Add to Google    Add to My Yahoo!
National Security White Papers (View All Report Types)
 
How to Address IoT, Mobile, and Endpoint Security Challenges
sponsored by SOTI Inc.
WHITE PAPER: This white paper examines the security challenges of IoT and how they affect mobile strategies. Discover how to go beyond unified endpoint management (UEM), address issues of interoperability, and more.
Posted: 05 Jan 2017 | Published: 05 Jan 2017

SOTI Inc.

The Power of Linking Business Analysis and TOGAF® to Achieve IT Results
sponsored by Global Knowledge
WHITE PAPER: This white paper addresses the The Open Group's Architecture Framework (TOGAF) framewo­­­rk and a high-level overview of the key business analysis techniques that IT professionals would benefit from to achieve IT results and establish a valued partnership with the business.
Posted: 06 Jan 2017 | Published: 03 Jan 2017

Global Knowledge

How to Gain Visibility Across Your Multi-Cloud Environment
sponsored by VMware
WHITE PAPER: Adopt an application-centric approach to cloud management. Download this resource to discover how cloud management platforms (CMP) are evolving, and how to leverage the CMP to develop and automate resource delivery across all private and public clouds.
Posted: 16 Dec 2016 | Published: 16 Dec 2016

VMware

Building A Scalable Remote Access Environment in AWS
sponsored by Palo Alto Networks
WHITE PAPER: Learn about a scalable remote access tool available to AWS users. Inside, you will see how you can protect your mobile workforce, as well as the network as a whole, from threats originating on the web. At the same time, you can minimize your administrative costs associated with remote access and mobile security.
Posted: 16 Dec 2016 | Published: 16 Dec 2016

Palo Alto Networks

Survey Findings: Data Security
sponsored by Dell, Inc. & Intel®
WHITE PAPER: This data security report illuminates the data security concerns held by businesses. Learn how to obtain the business support needed to integrate data security, while mitigating the cloud and mobile risks that plague IT.
Posted: 04 Jan 2017 | Published: 04 Jan 2017

Dell, Inc. & Intel®

Nine Types of Cyber Threats and How to Stop Them
sponsored by Solarwinds MSP
WHITE PAPER: Learn how to create an effective IT strategy against all unknown and known threats, how to improve security by viewing customers' networks as targets, and more.
Posted: 09 Jan 2017 | Published: 09 Jan 2017

Solarwinds MSP

Mobile: Enhanced Security, Consistent Management, Open Framework
sponsored by SOTI Inc.
WHITE PAPER: Learn how to make it easier than ever for your organization to support Android as a part of a BYOD or corporate owned personally enabled (COPE) device program. Read on to find challenges to both strategies, what benefits can be reaped from this approach, and more.
Posted: 05 Jan 2017 | Published: 05 Jan 2017

SOTI Inc.

5 Lessons from an Application Security Pro
sponsored by Veracode, Inc.
WHITE PAPER: Learn 5 aspects of application security your peers highlighted as areas of particular concern or difficulty in a recent survey exploring how they are approaching application security and the obstacles they're facing in their approaches.
Posted: 16 Jan 2017 | Published: 16 Jan 2017

Veracode, Inc.

Seven Critical Success Factors for Choosing a Reliable Data Center Provider
sponsored by CyrusOne
WHITE PAPER: This resource offers 7 critical success factors for choosing a reliable data center provider, including guidance for finding one that provides financial stability, physical security, SLAs, and more. Download now to delve further and ensure the high availability of your IT footprint.
Posted: 05 Jan 2017 | Published: 05 Jan 2017

CyrusOne

Best Practices for Healthcare Data Breach Prevention
sponsored by Absolute
WHITE PAPER: As healthcare records grow in value and popularity in underground markets, it's more important than ever to have airtight data protection and breach prevention protocols in place to keep patients' information safe. Whether you're in healthcare or another industry, learn how to keep information secure with data breach protection best practices.
Posted: 16 Dec 2016 | Published: 30 Nov 2016

Absolute
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement