Software  >   Systems Software  >   Security Software  >  

Resource Access Control Facility

RSS Feed    Add to Google    Add to My Yahoo!
Resource Access Control Facility White Papers (View All Report Types)
 
Anatomy of a Whaling Attack: Protecting Your Organization from CEO Email Scams
sponsored by Mimecast North America
WHITE PAPER: Learn the anatomy of a whaling attack – an email scam that can threaten every member of your enterprise, from entry-level to the C-suite. Download this e-book now and learn 6 ways to defend against this potentially crippling attack.
Posted: 03 Jan 2017 | Published: 03 Jan 2017

Mimecast North America

Masergy's Unified Enterprise Security Solution
sponsored by MASERGY
WHITE PAPER: This white paper explores how Masergy's Unified Enterprise Security Solution provides an integrated approach to security, combining predictive data sharing with an agile analytics and correlation program. Learn how Masergy can help you build an affordable, multi-layered security infrastructure that causes no additional network latency.
Posted: 18 Oct 2016 | Published: 18 Oct 2016

MASERGY

Open Source Software Support: Top Challenges and Best Practices
sponsored by Rogue Wave Software
WHITE PAPER: This report takes real support data from hundreds of open source software (OSS) packages across different organizations to analyze the statistics, realities, and results of open source in the field. Learn how to provide effective support for OSS by tackling the top challenges identified in the survey's data and uncover 5 OSS support best practices.
Posted: 23 Nov 2016 | Published: 31 Dec 2015

Rogue Wave Software

DevOps and the Bottom Line
sponsored by Chef Software
WHITE PAPER: Access this white paper to see what Nicole Forsgren, PhD has to say about the developing correlation between IT investment and organizational performance, highlighting the positive influence of cultivating a DevOps culture.
Posted: 02 Nov 2016 | Published: 02 Nov 2016

Chef Software

A Whale of a Tale: How to Stop the Rising Tide of Impersonation Attacks
sponsored by Mimecast North America
WHITE PAPER: Learn how whaling works, what the tell-tale signs are, and what can be done to safeguard your organization from its ravages. Read on for an in-depth breakdown of a typical whaling attack and where to look for help for threat protection.
Posted: 03 Jan 2017 | Published: 03 Jan 2017

Mimecast North America

Nine Types of Cyber Threats and How to Stop Them
sponsored by Solarwinds MSP
WHITE PAPER: Learn how to create an effective IT strategy against all unknown and known threats, how to improve security by viewing customers' networks as targets, and more.
Posted: 09 Jan 2017 | Published: 09 Jan 2017

Solarwinds MSP

DevOps Cultural and Technical Values: Leveraging Automation and the Cloud
sponsored by Chef Software
WHITE PAPER: This white paper provides an introduction to the cultural and technical values that are the foundation of DevOps. Discover what pain points you can address faster and more efficiently with this approach, using tools and methods like automation, cloud-based infrastructure, continuous delivery, and more.
Posted: 03 Nov 2016 | Published: 31 May 2015

Chef Software

Network Security: How Miller Paint Saved $150k a Year
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: Learn how Miller Paint managed to save itself over $150k a year on their network security, improve service, and make the upgrade quickly with minimal fuss. Read on to learn what steps were taken to ensure this smooth changeover and what their next steps were.
Posted: 10 Jan 2017 | Published: 10 Jan 2017

WatchGuard Technologies, Inc.

Unlocking the Promise of UTM-Enabled Network Protection
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This white paper compares the efficacy of network security tools vs. unified threat management (UTM). Read more about the roadblocks to UTM adoption and if it's necessary for your organization in order to block malicious network threats.
Posted: 15 Jan 2016 | Published: 02 Dec 2015

WatchGuard Technologies, Inc.

10 Tips to Manage Requirements for the Internet of Things
sponsored by IBM
WHITE PAPER: To navigate complexity and achieve a new approach to managing requirements, this white paper offers 10 tips to help you adapt to the changes brought about by the Internet of Things (IoT) evolution. Learn key facts about traceability, strategic reuse, and more.
Posted: 25 Jul 2016 | Published: 25 Jul 2016

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement