IT Management  >   Systems Operations  >   Security  >  

National Security

RSS Feed    Add to Google    Add to My Yahoo!
National SecurityWhite Papers (View All Report Types)
 
Move from Chaos to Control:  Creating a Mature File Transfer Process
sponsored by IBM
WHITE PAPER: When it comes to moving files between people, business, and other processes a majority of organizations are struggling. This webcast will show you how to defeat your file transfer demons.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

IBM

Top 10 ways that IBM Platform Computing can save you money
sponsored by IBM
WHITE PAPER: Explore this resource to discover the top 10 ways that IBM Platform Computing solutions can help you and your organisation save money.
Posted: 28 Aug 2014 | Published: 28 Feb 2014

IBM

Mobile Security: Threats and Countermeasures
sponsored by MobileIron
WHITE PAPER: Mobile devices are quickly becoming the device of choice for the primary end-user. The intuitive user-experience, robust computing capabilities, extensive catalog of apps, and always-on connectivity combined with portability make mobile devices very compelling PC replacements.
Posted: 22 Aug 2014 | Published: 22 Aug 2014

MobileIron

Separating Work and Personal - How BlackBerry Balance Works at the Platform Level
sponsored by BlackBerry
WHITE PAPER: This exclusive paper examines a tool that separates work data from personal data on mobile devices so that you can provide the best security without sacrificing the user experience.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

BlackBerry

Reducing the Reputational Impact of Data Breaches and Cyber-Attacks
sponsored by IBM
WHITE PAPER: This informative white paper explores the top strategies and techniques to protect your reputation by increasing business resilience and IT security across the enterprise.
Posted: 25 Aug 2014 | Published: 25 Aug 2014

IBM

Keep Your Endpoints Secure with Customizable Advanced Threat Protection
sponsored by Bit9 + Carbon Black
WHITE PAPER: This informative resource outlines a new approach to endpoint security that can provide your organization with real-time visibility and increased protection against modern cyber-attacks, including advanced persistent threats (APTs).
Posted: 25 Aug 2014 | Published: 25 Aug 2014

Bit9 + Carbon Black

Countering Cyber Threats with Behavioral Analytics
sponsored by RSA, The Security Division of EMC
WHITE PAPER: This white paper explores how organizations can leverage big data and behavioral analytics in their network to foil the top attacks.
Posted: 29 Aug 2014 | Published: 29 Aug 2014

RSA, The Security Division of EMC

Face Tech Challenges Head-On with a Strategic Data Center
sponsored by Equinix
WHITE PAPER: IT teams face a bevy of challenges in today's always-on, demanding IT environment, including (but not limited to) connectivity, bandwidth, latency, and security. By treating your data center as a strategic asset, you can turn those challenges into opportunities to thrive.
Posted: 27 Aug 2014 | Published: 27 Aug 2014

Equinix

Control Network Security with a New Approach to Malware Defense
sponsored by Hewlett-Packard Company
WHITE PAPER: This brief highlights a solution that integrates next-generation firewalls with intrusion prevention to create a barrier against harmful malware.
Posted: 19 Aug 2014 | Published: 19 Aug 2014

Hewlett-Packard Company

Guarding Against a Data Breach
sponsored by Hewlett-Packard Company
WHITE PAPER: In this informative white paper, discover how modern enterprises should respond to growing security threats while balancing economic and organizational concerns.
Posted: 22 Aug 2014 | Published: 31 Jan 2012

Hewlett-Packard Company
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement