IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

Protecting America's Critical Infrastructures

RSS Feed    Add to Google    Add to My Yahoo!
Protecting America's Critical InfrastructuresWhite Papers (View All Report Types)
 
Comparing 6 Web Application Firewall Solutions
sponsored by Fortinet, Inc.
WHITE PAPER: This helpful resource from NSS Labs provides detailed comparisons and analyses of web application firewalls from Barracuda, Citrix, F5, Fortinet, Imperva, and Sangfor.
Posted: 20 Oct 2014 | Published: 20 Oct 2014

Fortinet, Inc.

Delivering Threat Intelligence to Security Technology Providers and Large Organizations
sponsored by Webroot
WHITE PAPER: One of the best ways to address poor incident detection and incident response is with greater use of information-driven security based upon internal security analytics and external threat intelligence. So what technology and strategies do you need to enable this insight? Read this white paper to find out now.
Posted: 09 Oct 2014 | Published: 09 Oct 2014

Webroot

Journey to the Hybrid Cloud
sponsored by VMware
WHITE PAPER: Access this whitepaper for insight into the hybrid cloud service provider landscape and key considerations for choosing a provider. Additionally, find out more about how hybrid cloud implementations enable many capabilities and business benefits.
Posted: 20 Oct 2014 | Published: 30 Sep 2014

VMware

Bay Cove Human Services Achieves HIPAA Compliance on Google Apps & BYOD
sponsored by BitGlass
WHITE PAPER: This short white paper details how Bay Cove Human Services collaborated with BitGlass to achieve HIPAA compliance while still enabling the company to utilize Google Apps as their productivity backbone.
Posted: 09 Oct 2014 | Published: 09 Oct 2014


Prolexic Quarterly Global DoS Attack Report
sponsored by Akamai Technologies
WHITE PAPER: The following case study intends to illustrate global view of security threats, vulnerabilities and trends surrounding DDoS attacks. In addition, it covers the feasibility of building botnets through the compromise of large installs of commonly used frameworks.
Posted: 08 Oct 2014 | Published: 08 Oct 2014

Akamai Technologies

Device Fingerprinting – Low-Friction, BYOD Authentication
sponsored by SecureAuth
WHITE PAPER: This white paper introduces SecureAuth's Device Fingerprinting, which features the flexibility, security, and convenience required to increase layers of authentication without creating high friction for users.
Posted: 20 Oct 2014 | Published: 20 Oct 2014

SecureAuth

Three Kinds of Chaos: Establishing collaboration and control in a chaotic world
sponsored by Clearswift
WHITE PAPER: This white paper reveals why collaboration and control are both equally important, especially with evolving security threats.
Posted: 15 Oct 2014 | Published: 01 Mar 2014

Clearswift

Shavlik Protect: Everything You Need to Patch the OS, VMware and Third-Party Applications
sponsored by Shavlik Technologies
WHITE PAPER: This exclusive whitepaper explores a patching solution that can keep every Windows machine in your organization current with the latest software.
Posted: 14 Oct 2014 | Published: 14 Oct 2014

Shavlik Technologies

All the Unusual Suspects
sponsored by Software AG
WHITE PAPER: This exclusive whitepaper breaks down the who, what, where, when, and why of automated surveillance in the financial market.
Posted: 15 Oct 2014 | Published: 15 Oct 2014

Software AG

Taming Shadow IT
sponsored by BitGlass
WHITE PAPER: This white paper offers an in-depth guide book to IT security in regards to cloud computing and applications.
Posted: 21 Oct 2014 | Published: 21 Oct 2014

 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement