IT Management  >   Systems Operations  >   Security  >  

Public Safety

RSS Feed    Add to Google    Add to My Yahoo!
Public Safety White Papers (View All Report Types)
 
Deploying a Multiā€Gigabit Web Filtering Architecture
sponsored by ContentKeeper
WHITE PAPER: This white paper explores how to redouble web filtering efforts in the face of growing bandwidth and processing requirements. Discover multiple approaches to cultivating a well-managed multi-gigabit architecture, exploring the pros and cons of each, plus uncover tips on how to keep up with one-to-one computing and SSL encrypted sites.
Posted: 08 Feb 2017 | Published: 31 Dec 2016

ContentKeeper

Hybrid Cloud Is About Choice
sponsored by IBM
WHITE PAPER: Hybrid cloud computing integrates cloud resources with traditional IT infrastructure to ensure security, high performance, and accelerated application delivery. Read this resource to discover how you can leverage hybrid cloud to extend IT's agility and support new business models.
Posted: 17 Feb 2017 | Published: 31 Dec 2016

IBM

Financial Technologies Protects its Network From Malware and Other Internet Threats
sponsored by ContentKeeper
WHITE PAPER: Financial Technologies needed help with preventing malware, spoofing, and denial of service attacks. Learn what they did so they can decode, inspect, and filter SSL-encrypted web traffic.
Posted: 03 Feb 2017 | Published: 03 Feb 2017

ContentKeeper

Encryption Key Management Best Practices
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Learn how enterprise encryption key management is fundamentally changing alongside data centers and applications, as well as how to prepare your organization for this revolution in design, function, and efficiency.
Posted: 26 Jan 2017 | Published: 27 Sep 2016

Hewlett Packard Enterprise

Perception vs. Reality: The Apps You Don't Know You're Using Are Vulnerable
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Tackle shadow data in this report on the perceptions versus the reality of how organizations really use cloud applications. Discover the massive backdoor they can often leave in your security policy, and what you can do to mitigate the risk.
Posted: 23 Feb 2017 | Published: 22 Feb 2017

TOPICS:  Security
Symantec & Blue Coat Systems

HOW TO SOLVE DATA RESIDENCY, PRIVACY, AND SECURITY ISSUES IN THE CLOUD
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Learn how to satisfy not only cloud regulations by establishing data residency, addressing privacy issues, and keeping it secure, but also the need to control and manage your cloud presence.
Posted: 23 Feb 2017 | Published: 22 Feb 2017

TOPICS:  Security
Symantec & Blue Coat Systems

How to Get More Signal, Less Noise for Your SIEM
sponsored by ExtraHop
WHITE PAPER: Uncover how adding wire data to your SIEM platforms can reduce the time spent by security teams in collecting and normalizing log data, minimize storage costs, and increase the effectiveness of your SIEM platform by providing better contextual information about threats and incidents.
Posted: 31 Jan 2017 | Published: 31 Jan 2017

ExtraHop

Cyber Threat Analysis For 2017
sponsored by Booz Allen Hamilton
WHITE PAPER: Access this guide to uncover a number of vital security predictions for 2017, including: enterprise environments providing fertile territory for ransomware operators, how IoT can enable DDoS attacks, and more.
Posted: 13 Feb 2017 | Published: 13 Feb 2017

Booz Allen Hamilton

Shake Up Your Infrastructure Strategies for Media Streaming Applications
sponsored by PhoenixNap
WHITE PAPER: In this white paper read why many streaming services are turning towards infrastructure as a service to help improve the cost, availability, and security of their programs. Then learn about a new state-of-the art graphics card designed to meet the needs of consumers both now and in the future.
Posted: 23 Jan 2017 | Published: 23 Jan 2017

PhoenixNap

Worldwide DDoS Attacks & Protection Report
sponsored by Neustar
WHITE PAPER: Learn more about today's DDoS landscape, running trends, lessons learned from previous attacks, and what you can do to protect your company.
Posted: 24 Jan 2017 | Published: 24 Jan 2017

Neustar
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement