IT Management  >   Systems Operations  >   Security  >  

National Security

RSS Feed    Add to Google    Add to My Yahoo!
National Security White Papers (View All Report Types)
 
Data Center Power Services for Business-Critical Continuity
sponsored by Emerson Network Power
WHITE PAPER: Determine from this resource how to reduce downtime, extend data center equipment life, and increase system availability with proactive power equipment maintenance. Access now to learn how to better manage the health of your entire infrastructure.
Posted: 09 Jun 2016 | Published: 31 Dec 2012

Emerson Network Power

Controlling Software Asset Management in the Mobile Era
sponsored by Snow Software
WHITE PAPER: How can you balance growing user demands and at the same time ensure your company is not exposed to license liability? Discover how creating a software store tightly integrated with effective software management processes can meet these goals.
Posted: 15 Jun 2016 | Published: 15 Jun 2016

Snow Software

Citrix NetScaler: A Powerful Defense Against Denial of Service Attacks
sponsored by Citrix
WHITE PAPER: Denial of service (DoS) attacks are on the rise after years of relative dormancy. In that time they have evolved and are honed in on attacking the different networking layers. Discover how DoS attacks have evolved and how to approach DoS protection at each layer of your network.
Posted: 13 Jun 2016 | Published: 30 Jan 2015

Citrix

Interoperability and the Cloud in Connected Health
sponsored by CloudMine
WHITE PAPER: Learn how to conquer the interoperability, compliance, and security issues holding your organization back from leveraging cloud platforms to develop revolutionary applications.
Posted: 29 Jun 2016 | Published: 29 Jun 2016


The Gartner Top 10 Recommended IT Cost Optimization Ideas, 2016
sponsored by Gartner
WHITE PAPER: This document highlights the 10 ideas on IT cost optimization Garnter most frequently recommended to CIO's and IT leaders. These foundational recommendations, which if executed well, have proven to reduce costs over time.
Posted: 28 Jun 2016 | Published: 01 Feb 2016

Gartner

HITRUST CSF Certification – Frequently Asked Questions
sponsored by Coalfire
WHITE PAPER: What do you know about the HITRUST Common Security Framework (CSF) Assurance Program? Access this resource now to obtain answers to 20 FAQs about HITRUST CSF – including its relationship with HIPAA – and bolster the security posture of your healthcare organization.
Posted: 28 Jun 2016 | Published: 28 Jun 2016

Coalfire

Does Your Application Infrastructure Meet Modern Business User Needs?
sponsored by Citrix
WHITE PAPER: 72% of CEOs are concerned about keeping up with new technology. Learn how infrastructure management tools can enable accelerated application delivery, scalability, security, and streamlined management.
Posted: 24 Jun 2016 | Published: 29 Jan 2016

Citrix

Strengthen Desktop Virtualization Security by Minimizing Endpoint Attack Surfaces
sponsored by Dell, Inc.
WHITE PAPER: Access this white paper to explore why IT professionals are increasingly adopting desktop virtualization paired with thin client solutions to significantly reduce risks and improve protection at endpoints. Examine thin client solutions to help you select one that can best support enhanced endpoint security for your organization.
Posted: 22 Jun 2016 | Published: 22 Jun 2016

Dell, Inc.

Wireless Defense Strategies in the IoT Era
sponsored by Fortinet, Inc.
WHITE PAPER: As IoT blooms, it's introducing new security challenges. Challenges that access layer security strategies can help you combat. Read on to learn about new approaches and choosing secure WLAN solutions.
Posted: 21 Jun 2016 | Published: 21 Jun 2016

Fortinet, Inc.

Gain Capabilities to help you Protect, and Insight to Understand
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: As threats evolve, organizations must find ways to continuously detect, prevent, and respond quickly to attacks on the endpoint in order to limit damages. Discover a strategy that can help you protect endpoint devices against advanced and zero-day threats.
Posted: 10 Jun 2016 | Published: 10 Jun 2016

Check Point Software Technologies Ltd.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement