IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

PDD 63

RSS Feed    Add to Google    Add to My Yahoo!
PDD 63 White Papers (View All Report Types)
 
It's Time to Get Serious About Protecting Sensitive Data in Transit
sponsored by Certes Networks
WHITE PAPER: This white paper explains why it's long past time to get serious about protecting your sensitive data as it travels across networks, and also lists 3 steps that you can take to avoid being a hacking statistic in 2015.
Posted: 06 Jan 2015 | Published: 06 Jan 2015

Certes Networks

3 Aspects of an Integrated Threat Defense Strategy
sponsored by Sourcefire
WHITE PAPER: This exclusive infographic explores the three key aspects of creating an integrated threat defense strategy that gives you the visibility to discover and protect against socially engineered exploits.
Posted: 31 Dec 2014 | Published: 31 Dec 2014

Sourcefire

The Business Value of Enterprise Mobility
sponsored by Data#3
WHITE PAPER: In this white paper, learn about a mobile platform that enables to you overcome the challenges of mobile workers and booming app industry. Read on to learn how to streamline your mobile and BYOD strategies to reduce complexity in your organization.
Posted: 12 Jan 2015 | Published: 30 Jul 2014

Data#3

Staying on the Case - George Jon & Associates setup scalable technologies to support eDiscovery
sponsored by Dell Software
WHITE PAPER: Learn how George Jon & Associates is enabled to help law firms and service bureaus deliver documents quickly and securely with Dell hardware and software solutions.
Posted: 09 Jan 2015 | Published: 09 Jan 2015

Dell Software

Regin: Top-Tier Espionage Tool Enables Stealthy Surveillance
sponsored by Symantec Corporation
WHITE PAPER: This exclusive white paper explores the stages of Regin, breaking down its complex architecture.
Posted: 08 Jan 2015 | Published: 22 Nov 2014

Symantec Corporation

Phishing Tactics
sponsored by Symantec Corporation
WHITE PAPER: This fraud alert highlights the current growth and trends in today's phishing schemes, the potential impact on companies, and insight into how businesses can apply technology to protect themselves and their customers.
Posted: 12 Jan 2015 | Published: 28 Feb 2014

Symantec Corporation

Security Throughout the File Transfer Life-Cycle: A Managed File Transfer Imperative
sponsored by Ipswitch File Transfer
WHITE PAPER: Check out this informative white paper that highlights a new approach to secure your file transfers, and details the specific features included in a MFT system.
Posted: 16 Jan 2015 | Published: 31 Dec 2014

Ipswitch File Transfer

Leading Department Store Discounts Traditional AV and Purchases Bit9 to Protect Against Advanced Threats and Targeted Attacks
sponsored by Bit9 + Carbon Black
WHITE PAPER: This valuable case study reveals the security platform one regional retailer chose to better protect themselves after national chains were attacked by advanced threats.
Posted: 14 Jan 2015 | Published: 15 Jan 2014

Bit9 + Carbon Black

Endpoint Data Protection: A Buyer's Checklist
sponsored by CommVault
WHITE PAPER: This exclusive white paper takes an in-depth look a end point security for enterprise mobility, and why end point data backup is critical for organizations today. Read on to learn more.
Posted: 14 Jan 2015 | Published: 14 Jan 2015

CommVault

The Enemy Within: Why Insiders Are Still the Weakest Link in Your Data Security Chain
sponsored by Absolute Software
WHITE PAPER: This white paper describes the 5 steps that your enterprise needs to take in order to foster a conscientious data security environment within your enterprise, despite the challenges of the digital era.
Posted: 21 Jan 2015 | Published: 29 Dec 2014

Absolute Software
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement