IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

PDD 63

RSS Feed    Add to Google    Add to My Yahoo!
PDD 63 White Papers (View All Report Types)
 
How to Create, Deploy, and Operate Secure IoT Applications
sponsored by Telit
WHITE PAPER: According to Gartner, spending on IoT security is expected to reach $547 million in 2018. In this white paper, gain valuable insights on how to create, deploy and operate end-to-end security to help identify and prevent hackers from getting your organizations data through IoT devices.
Posted: 12 Jan 2018 | Published: 12 Jan 2018

Telit

A Guide to Better TCO and Agility with Hyper-Converged Infrastructure
sponsored by VMware & Intel
WHITE PAPER: Clearly your peers find HCI to be a worthwhile investment. But is it worth implementing in your specific enterprise? And how does TCO factor in? Read this white paper from searchDataCenter.com to find out, and for a rundown of one HCI, VMware vSAN.
Posted: 06 Dec 2017 | Published: 06 Dec 2017

VMware & Intel

How to Create a Scalable Threat Model
sponsored by Synopsys
WHITE PAPER: Find out how to make threat modeling more efficient and cost-effective with an automated, scalable, template-based approach.
Posted: 12 Jan 2018 | Published: 21 Sep 2017

Synopsys

The Top 4 Myths of Network Security and Compliance
sponsored by FireMon
WHITE PAPER: Each year, fraudulent activity accounts for $600 billion in losses in the United States. Explore this resource to gain insight into policy regulations and how to secure your data while maintaining regulatory compliance.
Posted: 08 Jan 2018 | Published: 08 Jan 2018

FireMon

Why Enterprises Are Embracing Hyper-Converged Infrastructure
sponsored by VMware
WHITE PAPER: In this paper, you'll examine VMware's vSAN-powered hyper-converged infrastructure (HCI). Read on to take advantage of this HCI's features to extend virtualization to storage, utilize vSphere-integrated features like DRS and vMotion, and establish common management for compute and storage.
Posted: 16 Jan 2018 | Published: 31 Dec 2017

VMware

How to Build a Soc with Limited Resources
sponsored by LogRhythm, Inc.
WHITE PAPER: Having a security operations center (SOC) has become an absolute necessity for implementing threat lifecycle management to minimize damage caused by successful attacks. This white paper offers a guide to building an SOC with limited resources and provides the basics of the cyberattack lifecycle through the threat lifecycle management framework.
Posted: 09 Jan 2018 | Published: 09 Jan 2018

LogRhythm, Inc.

ESG Infographic: Run With Change, Not Away From It
sponsored by McAfee, Inc.
WHITE PAPER: Understand why companies are struggling more than ever with cybersecurity analytics and operations.
Posted: 20 Dec 2017 | Published: 20 Dec 2017

TOPICS:  IT Management
McAfee, Inc.

Should I Really Be Concerned About Cloud Usage?
sponsored by McAfee, Inc.
WHITE PAPER: Gain insight into the rapid growth of cloud usage and the concern that continues to haunt IT security professionals.
Posted: 20 Dec 2017 | Published: 20 Dec 2017

TOPICS:  IT Management
McAfee, Inc.

Enterprise Data is your Edge
sponsored by IBM
WHITE PAPER: Learn about the competitive edge that allows companies to use its unique data to create personal customer experiences.
Posted: 05 Dec 2017 | Published: 05 Dec 2017

TOPICS:  IT Management
IBM

Preparing for GDPR: Discovery Questions
sponsored by McAfee, Inc.
WHITE PAPER: Looking for guidance as you prepare for GDPR? Read these discovery questions to get you started in the right direction.
Posted: 20 Dec 2017 | Published: 20 Dec 2017

TOPICS:  IT Management
McAfee, Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement