IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

PDD 63

RSS Feed    Add to Google    Add to My Yahoo!
PDD 63White Papers (View All Report Types)
 
CIO Spotlight: Controlling Data Risk In the BYOD Onslaught
sponsored by CommVault
WHITE PAPER: This exclusive paper lists 5 areas that support risk mitigation and data protection for BYOD. Read on to learn more.
Posted: 04 Dec 2014 | Published: 04 Dec 2014

CommVault

The Threat and Vulnerability Management Maturity Model
sponsored by Core Security Technologies
WHITE PAPER: This exclusive whitepaper dives into the threat and vulnerability management maturity model, explaining how it works to reduce the risk of breach.
Posted: 10 Dec 2014 | Published: 10 Dec 2014

Core Security Technologies

Will Windows 10 make a Shift for IT?
sponsored by Vembu Technologies
WHITE PAPER: This resource highlights Windows 10's key features and how its making the shift to IT.
Posted: 03 Dec 2014 | Published: 03 Dec 2014

Vembu Technologies

Win the Race Against Time to Stay Ahead of Cybercriminals
sponsored by IBM
WHITE PAPER: Discover how IBM Security QRadar Incident Forensics can help enterprises investigate and gather evidence on breaches.
Posted: 03 Dec 2014 | Published: 08 Jul 2014

IBM

Developer Education: The Challenges & Opportunities Impacting Your Team
sponsored by Pluralsight
WHITE PAPER: View this white paper to learn about one education solution to keep your developers sharp and interested. For the same cost as enrolling one developer in a traditional classroom experience, you could provide unlimited training for a year to your team. Read on to learn how you can retain your developers through a new education solution.
Posted: 03 Dec 2014 | Published: 19 Nov 2014

Pluralsight

A New way to Integrate Management of Network & Services
sponsored by IBM
WHITE PAPER: Access this case study to learn how Slovak Telecom was able to refresh and integrate infrastructure operations management with a new solution that enabled network and service availability monitoring, root cause analysis, service impact analysis, and more.
Posted: 05 Dec 2014 | Published: 31 Dec 2013

IBM

Understanding the Cyber Attack "Kill Chain" and Attack Model
sponsored by Websense
WHITE PAPER: This white paper describes the seven stages of advanced threats that comprise "kill chains" and explains how cybercriminals use them in attacks.
Posted: 03 Dec 2014 | Published: 16 Oct 2013

Websense

Protecting Government Information While Reducing Complexity and Ongoing Cost
sponsored by Dell
WHITE PAPER: Access this white paper to discover how virtualization and cloud computing are creating secure end user access to desktop resources.
Posted: 02 Dec 2014 | Published: 02 Dec 2014

Dell

No IT for a Day: What Does it Mean for your Business?
sponsored by ControlNow
WHITE PAPER: Download this exclusive whitepaper now to discover the real cost of downtime and uncover some best practices to avoid downtime.
Posted: 05 Dec 2014 | Published: 05 Dec 2014

ControlNow

Gartner: Become a Cloud Enabler by Following Our Eight Steps to Hybrid IT
sponsored by NetApp
WHITE PAPER: Access this whitepaper for a list of eight steps designed to teach I&O professionals how to act as internal cloud service brokers and guarantee a successful transition to hybrid IT.
Posted: 17 Dec 2014 | Published: 09 Sep 2014

NetApp
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement