IT Management  >   Systems Operations  >   Security  >  

Public Safety

RSS Feed    Add to Google    Add to My Yahoo!
Public Safety White Papers (View All Report Types)
 
Is DNS Your Security Achilles Heel?
sponsored by Akamai Technologies
WHITE PAPER: This white paper explains how many attackers take advantage of recursive DNS, which almost every action on the internet relies on. Uncover 6 best practices you can follow to mitigate the risks.
Posted: 19 Sep 2017 | Published: 31 Jul 2017

Akamai Technologies

A Unified Approach to Rugged Device Management
sponsored by VMware
WHITE PAPER: This whitepaper delves into the evolution of rugged devices, the management challenges associated with these deployments, and how unified endpoint management addresses these challenges to enable a fully connected environment that is both manageable and secure.
Posted: 07 Sep 2017 | Published: 07 Sep 2017

VMware

The 12 Critical Questions you Need to Ask when Choosing an AD Bridge Solution
sponsored by One Identity
WHITE PAPER: Most enterprises today have heterogeneous IT environments, with Microsoft Active Directory (AD) providing Windows access for most users. Read this white paper to identify a number of key questions to ask when evaluating which AD bridge solution is right for you.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

One Identity

Flash Technology: Unlocking Innovations that Enable IT Transformation
sponsored by Dell EMC and Intel®
WHITE PAPER: Use this IDC brief to formulate an explicit, long-term flash strategy for your organization in order to migrate existing apps to flash, place all new apps on flash, and more. By downloading now, you'll also learn why flash innovators are much more likely to use it for customer-facing functions than operational purposes.
Posted: 07 Sep 2017 | Published: 31 Mar 2017

Dell EMC and Intel®

Evolution of the Online Battlefield
sponsored by Armor
WHITE PAPER: From botnets to APTs and DDoS attacks, learn more about the history of cyberattacks and how they've shaped the current threat landscape.
Posted: 01 Sep 2017 | Published: 31 Dec 2016

Armor

Single Sign-on for SAP Solution-based Environments
sponsored by One Identity
WHITE PAPER: Authentication Services from One Identity enables many non-Windows systems – including SAP solutions – to participate as "full citizens" in Active Directory, making SSO a reality. Take a look at this white paper to uncover security benefits provided by authentication services.
Posted: 21 Sep 2017 | Published: 21 Sep 2017

One Identity

Top 6 Things Small Businesses Need to Know about Cybersecurity
sponsored by Kaspersky Lab
WHITE PAPER: According to a Kaspersky Lab survey, just one cybersecurity incident can cost small- and medium-sized businesses an average of $86,500. Read this white paper to reveal a list of the top things startups and small businesses need to know about cybersecurity.
Posted: 21 Sep 2017 | Published: 21 Sep 2017

Kaspersky Lab

2017 Midyear Security Roundup: The Cost of Compromise
sponsored by TrendMicro
WHITE PAPER: In the first half of 2017 there have been 83 million total ransomware threats detected, and an average of 28 new families detected. Read this white paper to reveal ransomware attack costs and reviews of threat landscapes, so that enterprises can move forward to protect themselves against WannaCry, Petya and more.
Posted: 21 Sep 2017 | Published: 21 Sep 2017

TrendMicro

Cloud Workload Protection Automates AWS Cloud Security
sponsored by AWS - Symantec
WHITE PAPER: Deploying the automated Symantec Cloud Workload Protection (CWP) security solution on Amazon Web Services (AWS) can help your organization gain better visibility into your entire cloud environment, which often help business agility, reduces risk, and is cost-effective.
Posted: 20 Sep 2017 | Published: 20 Sep 2017

AWS - Symantec

Web Hacking - Network Security Secrets & Solutions
sponsored by Bit9, Inc.
WHITE PAPER: This chapter seeks to outline the scope of the webhacking phenomenon and show you how to avoid becoming just another statistic in the litter of web properties that have been victimized over the past few years.
Posted: 28 Aug 2017 | Published: 09 Jun 2009

Bit9, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement