IT Management  >   Systems Operations  >   Security  >  

Public Safety

RSS Feed    Add to Google    Add to My Yahoo!
Public Safety White Papers (View All Report Types)
 
Addressing the Security Dangers of "Appification"
sponsored by IBM
WHITE PAPER: Identify the key security dangers of mobile apps in the enterprise and find out how to eliminate them. Learn not only what an enterprise can do for data at rest, data in motion, methods of deployment, and more.
Posted: 10 Aug 2016 | Published: 10 Aug 2016

IBM

Magic Quadrant for Enterprise Mobility Management Suites
sponsored by IBM
WHITE PAPER: Discover the strengths and cautions for the vendors in the Enterprise Mobility Management Suites Magic Quadrant.
Posted: 02 Aug 2016 | Published: 02 Aug 2016

TOPICS:  IT Management
IBM

Encrypted Traffic Management
sponsored by Blue Coat Systems
WHITE PAPER: Learn not only solid fundamentals of how SSL/TSL encryption works, but also why so much malicious activity is sneaking past other conventional security measures and what you can do to stop it. Hint: encrypted traffic management solutions now bolster data privacy, compatibility, performance, scalability AND cost effectiveness.
Posted: 25 Jul 2016 | Published: 31 Jan 2016

Blue Coat Systems

IT Leaders Manage Complexity and Reduce Cost with Software-defined Storage
sponsored by Red Hat
WHITE PAPER: This white paper demonstrates how to simplify and scale enterprise workloads with versatile, open, software-defined storage. Access now to modernize your storage architecture consistent with existing infrastructure strategies, and learn how to increase reliability and scalability and unify disparate data silos.
Posted: 11 Aug 2016 | Published: 11 Aug 2016

Red Hat

The Benefits of Agentless Architecture
sponsored by Red Hat
WHITE PAPER: Discover in this white paper the top 12 benefits of implementing agentless IT architecture, utilizing an open source orchestration tool. Read on to learn to effectively manage systems by connecting to them over SSH, and employ a management tool that doesn't impose additional demands on your environment.
Posted: 10 Aug 2016 | Published: 10 Aug 2016

Red Hat

Networking: You Can't Protect What You Can't See
sponsored by Cisco Systems, Inc.
WHITE PAPER: Learn what types of attacker activity are most common and how better visibility helps you identify suspicious network behaviors. Also uncover the "suspicious seven": the top questionable activities that every security team needs to be able to see.
Posted: 15 Aug 2016 | Published: 15 Aug 2016

Cisco Systems, Inc.

Empowering IT to Transform and Take Advantage of Revolutionary Technologies
sponsored by IBM
WHITE PAPER: This white paper investigates the core issues holding IT organizations back from contributing to business innovation. Find out how adopting enterprise-ready, open-source database technology can mitigate strained IT resources, and empower your organization with both improved performance and cost-efficiency.
Posted: 22 Aug 2016 | Published: 29 Jul 2016

IBM

Email Security Strategies for Mid-Sized Enterprises
sponsored by LogicNow
WHITE PAPER: Discover how to create an email strategy to combat not only traditional spam attacks, but also malware, spear/phishing, denial of service, directory harvest attacks, and more. Learn the potential damage these attacks can create and how to mitigate the risks.
Posted: 24 Aug 2016 | Published: 24 Aug 2016

LogicNow

IT Ops and App Development Strategies fit for Governments
sponsored by Red Hat
WHITE PAPER: Application development, deployment, and ongoing IT management doesn't have to be difficult. Discover 5 secure ways to implement DevOps practices using open-source tools, and streamline your IT processes beyond just configuration management.
Posted: 11 Aug 2016 | Published: 11 Aug 2016

Red Hat

Output short-circuit current bearable by the UPS
sponsored by Emerson Network Power
WHITE PAPER: The purpose of this white paper is to clarify the concept of prospective short circuit currently bearable by the UPS, to explain the role of fuses as well as indicate the requirements of the international IEC 62040-1 standard.
Posted: 17 Aug 2016 | Published: 01 Aug 2016

Emerson Network Power
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement