IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

Protecting America's Critical Infrastructures

RSS Feed    Add to Google    Add to My Yahoo!
Protecting America's Critical Infrastructures White Papers (View All Report Types)
 
Report: The Impact of Security Threats on Business
sponsored by Radware
WHITE PAPER: In the following report, executives underscore just how expensive it is to recover from a cyber-attack. Learn where organizations are continuing to take action despite major revenue losses, and what more can be done.
Posted: 20 Sep 2016 | Published: 20 Sep 2016

Radware

The Security Fabric of The Cloud
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper explores the 5 traits every cloud environment has to have to ensure its safety. The first three things you need to be are: scalable, to meet volume and performance demands, aware, for deep visibility of the traffic traveling your network, and actionable, in order to be able to adapt to any discovered threat.
Posted: 22 Sep 2016 | Published: 22 Apr 2016

Fortinet, Inc.

To Pay or Not to Pay: Ransom-Based Cyber-Attacks on the Rise
sponsored by Radware
WHITE PAPER: Organizations need to proactively prepare their networks for ransomware attacks. Learn now about three key considerations for tools and strategies designed to mitigate these incidents, how to detect a fake ransom letter, and the consequences of giving into these threats.
Posted: 20 Sep 2016 | Published: 20 Sep 2016

Radware

Five Key Trends That Are Shaping How We Manage Enterprise Content
sponsored by ASG
WHITE PAPER: The ECM landscape is changing and 5 trends are determining how enterprise architecture (EA) professionals approach new challenges. This Forrester research report analyzes these key ECM trends to help EA pros prioritize content management investments during these changes.
Posted: 14 Sep 2016 | Published: 29 Feb 2016

ASG

A New Direction for IT User Support: Enabling An Omnichannel Experience in the Cognitive Era
sponsored by IBM
WHITE PAPER: This white paper describes omnichannel IT support, and why it has become critical for a superior personalized user experience. Explore ways you can begin incorporating this more cognitive strategy into your IT support organizations.
Posted: 02 Sep 2016 | Published: 29 Feb 2016

IBM

Why App Stores Cannot Protect Enterprises from Malware and Dangerous Apps
sponsored by Proofpoint, Inc.
WHITE PAPER: Attackers have adapted to the mobile environment. Discover 18 examples of how curated app stores are failing to protect enterprises from malware and dangerous apps, and cannot provide compliance or privacy protection.
Posted: 20 Sep 2016 | Published: 20 Sep 2016

Proofpoint, Inc.

Gain Complete Control of Your Digital Ecosystem
sponsored by Entrust, Inc.
WHITE PAPER: Learn how to move beyond the vulnerability of passwords and tokens to deliver frictionless experiences to all of your users, without having to invest in hardware, software, or any large infrastructure deployment.
Posted: 14 Sep 2016 | Published: 14 Sep 2016

Entrust, Inc.

How a School District Swiftly Detects and Remediates Internal and External Threats
sponsored by Cisco Systems, Inc.
WHITE PAPER: Learn how the Council Rock School District approached their massive network security blind spot and reduced their threat reaction time from months to detect and resolve to mere minutes. Discover what did and what did not work for them, how they also improved their capacity planning, and more.
Posted: 07 Sep 2016 | Published: 07 Sep 2016

Cisco Systems, Inc.

Digital Business: CFOs and CIOs Find Success Through Collaboration
sponsored by SAP/Lenovo/Intel
WHITE PAPER: As digitalization and connectivity continue to change IT's function, CIOs are taking responsibility for leading innovation. Learn how to reenergize the CIO/CFO dynamic to both advance the interests of the business, as well as drive digital innovation.
Posted: 06 Sep 2016 | Published: 31 Dec 2015

SAP/Lenovo/Intel

Secure your Mobile Enterprise
sponsored by Unisys
WHITE PAPER: How can organizations better secure their mobile environment to confidently secure access from employee-owned or third party mobile devices? Access this white paper and discover a new, innovative security approach that can secure the entire data path and conceal endpoints.
Posted: 31 Aug 2016 | Published: 31 Aug 2016

Unisys
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement