IT Management  >   Systems Operations  >   Security  >  

Public Safety

RSS Feed    Add to Google    Add to My Yahoo!
Public Safety White Papers (View All Report Types)
 
The Move to Software-based Everything – How Secure is Programmable Infrastructure?
sponsored by Cisco and Dimension Data
WHITE PAPER: Software-based systems promise more flexibility, scalability, and automation.But, how vulnerable is a programmable infrastructure? Access this white paper that discusses the vulnerability of programmable infrastructures and how to properly secure them.
Posted: 25 Jul 2016 | Published: 31 Dec 2014

Cisco and Dimension Data

Analyst Report: 8 Building Blocks to Ensure Successful Digital Transformations
sponsored by Gartner
WHITE PAPER: Discover the 8 essential building blocks of successful digital workplace initiatives in this Gartner report. Find recommendations for everything IT leaders need to enact digital change – from strategic planning to digital workplace technologies to consider.
Posted: 18 Jul 2016 | Published: 27 Feb 2015

Gartner

How Industry Collaboration Mitigates Cybersecurity Risks
sponsored by LogRhythm, Inc.
WHITE PAPER: Discover in this white paper how APAC business leaders can actively share cybersecurity resources, expertise, and best practices to collectively build defenses. Read on to learn how to integrate cybersecurity into HR policies, expansion strategies, staff training processes, and more.
Posted: 22 Jul 2016 | Published: 22 Jul 2016

LogRhythm, Inc.

Working With HR on Digital Workplace Initiatives
sponsored by Gartner
WHITE PAPER: Find out the key challenges and recommendations for smoothly transitioning to today's digital economy with digital workplace initiatives in this Gartner report. Explore how to partner with your HR department to evolve technology practices systematically to streamline the employee experience.
Posted: 21 Jul 2016 | Published: 20 Mar 2015

Gartner

Combating APT in a New Way
sponsored by Exabeam
WHITE PAPER: Discover how to provide a new layer for your enterprise's security analytics and stop data leaks due to Advanced Persistent Threats. Learn the fundamentals of these malicious attacks, how they are changing, and how you can change to combat them.
Posted: 27 Jul 2016 | Published: 27 Jul 2016

Exabeam

The Top Five Security Threats to Your Business
sponsored by Level 3 Communications, Inc.
WHITE PAPER: Cyber security breaches are more common now than they have ever been. And the risks they present are all serious. This infographic details the top five security threats to your business and highlights a network-based security solution that protects against them.
Posted: 08 Jul 2016 | Published: 30 Jun 2016

Level 3 Communications, Inc.

The Benefits of Using an Appliance to Simplify and Accelerate Desktop Virtualization Initiatives
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Discover the market forces spurring the growing demand for desktop virtualization, explore the advantages an appliance has on desktop virtualization deployments, and learn what fundamentals to look for in a desktop virtualization appliance.
Posted: 18 Jul 2016 | Published: 18 Jul 2016

Dell, Inc. and Intel®

Open the Door to Open Applications
sponsored by IBM
WHITE PAPER: Agile IT services for business-critical apps with unparalleled system uptime and data security: That's innovation.
Posted: 01 Jul 2016 | Published: 01 Jul 2016

TOPICS:  IT Management
IBM

Reducing Cyber Risk in the Legal Sector: The Blurred Boundaries of Trust
sponsored by LogRhythm, Inc.
WHITE PAPER: Download this white paper to shore up your legal firm's cybersecurity defenses by adopting security intelligence tools, as well as examine the top five use-cases for centralized monitoring within the legal sector. Learn how to reduce risk through faster detection and response by identifying key areas of vulnerability.
Posted: 22 Jul 2016 | Published: 22 Jul 2016

LogRhythm, Inc.

The Art and Science of Value Realization in the Cloud
sponsored by Infor
WHITE PAPER: Discover how to optimize your enterprise's cloud expense and see just how much business value it creates. See such value added as physical records saving, workforce hours, and streamlined workloads.
Posted: 25 Jul 2016 | Published: 25 Jul 2016

Infor
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement