IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

PDD 63

RSS Feed    Add to Google    Add to My Yahoo!
PDD 63White Papers (View All Report Types)
 
The Top 20 Critical Security Controls for Effective Cyber Defense
sponsored by LogRhythm, Inc.
WHITE PAPER: This paper outlines how LogRhythm's Security Intelligence Platform maps directly to each of the 20 Critical Security Controls, developed by the SANS Institute to help prioritize the most effective methods and policies to safeguard assets, information, and infrastructure.
Posted: 31 Jul 2014 | Published: 31 Jan 2014

LogRhythm, Inc.

The Three Phases of Securing Privileged Accounts- A Best Practices Guide
sponsored by Cyber-Ark Software
WHITE PAPER: This helpful white paper explains exactly how privileged account security works, and outlines the best practices for implementing it for your organization.
Posted: 30 Jul 2014 | Published: 30 Jul 2014

Cyber-Ark Software

Secure Mobile Data without Sacrficing the User Experience
sponsored by Bluebox
WHITE PAPER: This white paper examines a new mobile security solution that avoids the pitfalls of traditional systems by employing data-centric and employee-centric methods.
Posted: 18 Aug 2014 | Published: 18 Aug 2014

Bluebox

Storage Configuration Guide: Choosing the Right Architecture for the Application and Environment
sponsored by Imation Corp.
WHITE PAPER: This white paper analyzes the crucial features of designing a storage system to meet modern demands. Read on to get a better grasp on application and environment requirements so that your storage solution runs efficiently.
Posted: 18 Aug 2014 | Published: 18 Aug 2014

Imation Corp.

Build for Growth: Master the ICM Advantage in Retail - How Incentive Compensation Management Fuels Dynamic, High Performance Retail Businesses
sponsored by IBM
WHITE PAPER: Explore this informative resource to discover how Incentive Compensation Management technology fuels dynamic, high performance retail businesses and promotes productivity through compensation programs, streamlined administration, and rewards contributions that advance growth initiatives.
Posted: 31 Jul 2014 | Published: 31 Jul 2014

IBM

Use Case: Secure Internet Access for 71,000 Australian Students
sponsored by Websense, Inc.
WHITE PAPER: This white paper describes a use case involving an Australian educational in need of a centralized, scalable solution in order to distribute materials to 45,000 users per day in safe, easily accessible manner.
Posted: 07 Aug 2014 | Published: 07 Aug 2014

Websense, Inc.

The Help Desk and the Network Operations Center: What MSPs Need and Why
sponsored by N-able Technologies
WHITE PAPER: This helpful resource defines and discusses network operations centers and help desks, including their functions, what differentiates them from one another, how they contribute to a managed service provider's business, and whether or not MSPs should consider outsourcing them.
Posted: 30 Jul 2014 | Published: 30 Jul 2014

N-able Technologies

Build for Growth: Master the ICM Advantage in the Life Sciences - How Incentive Compensation Management Fuels Dynamic, High-Performing Pharmaceutical and Medical Device Businesses
sponsored by IBM
WHITE PAPER: Explore this informative resource to discover how Incentive Compensation Management technology fuels dynamic, high-performing pharmaceutical and medical device businesses and can help you easily and effectively implement variable compensation programs.
Posted: 31 Jul 2014 | Published: 31 Jul 2014

IBM

The Essential Elements of Critical Infrastructure Protection against Advanced Threats
sponsored by FireEye
WHITE PAPER: This white paper highlights the current challenges organizations face in terms of cybersecurity. It also mentions 3 essential elements to an effective Critical Infrastructure Protection approach.
Posted: 07 Aug 2014 | Published: 07 Aug 2014

FireEye

Reducing the Cost and Complexity of Web Vulnerability Management
sponsored by Symantec
WHITE PAPER: This white paper investigates how to reduce the cost and complexity of Web vulnerability management with a managed approach for detection.
Posted: 05 Aug 2014 | Published: 31 Dec 2012

Symantec
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement