IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

PDD 63

RSS Feed    Add to Google    Add to My Yahoo!
PDD 63 White Papers (View All Report Types)
 
How You Can Advance Your Enterprise with Hybrid IT
sponsored by Red Hat
WHITE PAPER: This white paper can help you take full advantage of hybrid IT and avoid any complications it may cause.
Posted: 08 May 2015 | Published: 08 May 2015

Red Hat

Custom Defense Against Targeted Attacks
sponsored by Trend Micro
WHITE PAPER: Read this white paper to discover how you can build custom-designed security that can withstand even the most advanced targeted attack.
Posted: 08 May 2015 | Published: 31 Dec 2014

Trend Micro

Securing Your End of Life Servers While Enabling a Safe Transition
sponsored by Trend Micro
WHITE PAPER: Access this white paper to learn how to continue running your end of life platform while avoiding common security risks and preparing to upgrade your system.
Posted: 07 May 2015 | Published: 30 Apr 2015

Trend Micro

Do customers drive your technology decisions?
sponsored by Hewlett-Packard Limited
WHITE PAPER: Consult the following white paper to learn why your customers' needs and wants should be shaping the way you modernize your technology. Access now and find out more.
Posted: 01 May 2015 | Published: 01 May 2015

Hewlett-Packard Limited

New Methods to Improve your IT Service Management
sponsored by Unisys
WHITE PAPER: Read this white paper to learn how to improve your business processes and gain efficiency by addressing serveral questions regarding your ITSM practices.
Posted: 05 May 2015 | Published: 05 May 2015

Unisys

Special Report: Cyber Security in 2015
sponsored by IBM
WHITE PAPER: This report summarizes essential attack information from recent security breaches to show you what the current threat landscape looks like.
Posted: 22 May 2015 | Published: 31 Mar 2015

IBM

Research Report: The Rise of Mobile Content Management
sponsored by Box
WHITE PAPER: Access this white paper for a buyer's guide to enterprise mobility management providers who are improving their content management features.
Posted: 08 May 2015 | Published: 15 Oct 2014

Box

uilding Layered Security to Defend Against Cyber Attacks
sponsored by Absolute Software
WHITE PAPER: In this white paper, discover how you can implement layered security for protection that is significantly stronger than what the average enterprise achieves.
Posted: 01 May 2015 | Published: 30 Nov 2014

Absolute Software

Securing Your Content Delivery Network
sponsored by Limelight Networks, Inc.
WHITE PAPER: In this brief white paper, you'll discover an in-network detection and attack mitigation solution that takes all the headaches out of content delivery network security.
Posted: 15 May 2015 | Published: 15 May 2015

Limelight Networks, Inc.

Windows Server 2012: Security in the Enterprise
sponsored by Dell and Microsoft
WHITE PAPER: In the following technology brief, learn about the various security challenges brought about by cloud and virtual desktop practices. Access now and learn how to handle these security deficiencies, including how to leverage Windows Server 2012 to help aid in the process.
Posted: 18 May 2015 | Published: 18 May 2015

Dell and Microsoft
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement