IT Management  >   Systems Operations  >   Security  >  

National Security

RSS Feed    Add to Google    Add to My Yahoo!
National Security White Papers (View All Report Types)
 
Addressing PCI Compliance Through Privileged Access Management
sponsored by CA Technologies
WHITE PAPER: Read this white paper to learn how to leverage several privileged access management strategies to meet the latest requirements of Payment Card Industry Data Security Standard version 3. Access now to discover how to interrupt the kill chain and eliminate hard-coded passwords.
Posted: 11 Apr 2016 | Published: 31 Dec 2015

CA Technologies

The Big Data Service Desk: The ITSM Transformation
sponsored by Hewlett Packard Enterprise
WHITE PAPER: In this white paper, examine a comprehensive service desk solution—delivered for on-premises or via SaaS—designed to automate your operations management and improve user experience. Access this paper to transform your IT service desk using big data in 3 ways, like enabling help desk self-service.
Posted: 01 Apr 2016 | Published: 01 Apr 2016

Hewlett Packard Enterprise

Top Five Things to Look for in SDS
sponsored by IBM
WHITE PAPER: This white paper offers 5 tips on how to choose the right software-defined storage (SDS) for your enterprise. Read on to learn how software-defined storage enables new levels of agility, control, and efficiency.
Posted: 06 Apr 2016 | Published: 30 Jun 2015

IBM

The CIO’s Guide to Evaluating IT Sourcing Options
sponsored by Windsor Group
WHITE PAPER: This white paper will assist you in evaluating your IT sourcing options, and in choosing the right provider from which you can expect to save considerable time and money. Learn how to leverage your service provider to transcend IT performance expectations.
Posted: 14 Apr 2016 | Published: 14 Apr 2016

Windsor Group

Top 5 IoT Security Questions for Manufacturers
sponsored by Microsoft
WHITE PAPER: The Internet of Things has introduced new security issues for manufacturers. This infographic reveals the top 5 essential questions you need to address in order to protect your connected devices and assets. Learn how to safely connect systems, devices, and other assets, as well as 4 other critical answers.
Posted: 31 Mar 2016 | Published: 31 Mar 2016

Microsoft

The Impostor in the Machine: Understanding the Motives and Mayhem Behind Impostor Emails
sponsored by Proofpoint, Inc.
WHITE PAPER: In this white paper, learn how hackers evade current email filtering security strategies to dupe high-level employees and steal data. Read on to learn how next-gen email security strategies enable you to quarantine imposter emails before they reach the inbox and discover several proven defense strategies.
Posted: 28 Apr 2016 | Published: 28 Apr 2016

Proofpoint, Inc.

Overcoming Data Sovereignty and Security Challenges with the Cloud
sponsored by PEER 1
WHITE PAPER: Access this valuable resource now and learn how to stay ahead of data residency laws, ensure you are storing data correctly, and safeguard your customer's data and ensure that its sovereignty remains intact.
Posted: 01 Apr 2016 | Published: 01 Apr 2016

PEER 1

Eight Essential Helpdesk Tools Every MSP Needs
sponsored by Solarwinds N-able
WHITE PAPER: Everyone knows that you need the right tools for the job. The problem is that there are so many tools on the market that it is hard to determine which are best for your business. Access this white paper to learn about the eight must-have tools for your MSP business.
Posted: 20 Apr 2016 | Published: 06 Apr 2016

Solarwinds N-able

Building the Next-Generation End-to-End IP Communications Architecture
sponsored by Oracle Corporation
WHITE PAPER: Discover how you can construct an IP layer in order to facilitate a wide variety of new communications services, devices and applications. It also discusses managing this proliferation of new features utilizing the IP layer, despite ever-growing complexity.
Posted: 26 Apr 2016 | Published: 06 Apr 2016

Oracle Corporation

What's on the Agenda of Today's CXOs?
sponsored by Proact IT UK
WHITE PAPER: In this white paper, examine the importance of ensuring all applications support business processes, as well as optimizing communication taking place between employees. As a bonus, CIOs read on to learn how to retain control of your data using one hybrid cloud off-premises infrastructure.
Posted: 07 Apr 2016 | Published: 07 Apr 2016

Proact IT UK
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement