IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Signatures

RSS Feed    Add to Google    Add to My Yahoo!
Signatures White Papers (View All Report Types)
 
Video-Ready - Campus Network
sponsored by Cisco Systems, Inc.
WHITE PAPER: Why should your network be "Video-Ready"? Video applications have enabled enterprises to significantly increase worker productivity, improve collaboration, reduce costs, and streamline and optimize business operations. This paper dicusses the factors that will accelerate adoption of video solutions over the next few years.
Posted: 22 May 2009 | Published: 01 May 2008

Cisco Systems, Inc.

Controlling and Managing Privileged Access
sponsored by One Identity
WHITE PAPER: According to a Black Hat Report, 32% of hackers say accessing privileged accounts is the easiest and fastest way to get at sensitive data. This white paper explores the risks associated with privileged accounts and offers strategic risk mitigation tactics you can take to ensure security.
Posted: 13 Nov 2017 | Published: 13 Nov 2017

One Identity

Red Hat CloudForms Unifies and Improves Service Delivery and Management
sponsored by Red Hat
WHITE PAPER: This paper presents an economic analysis of Red Hat CloudForms, which can automate operational processes and unify service management across multivendor virtual and cloud environments. Read on to streamline service delivery with features such as automated policy enforcement and remediation, and more.
Posted: 31 Oct 2017 | Published: 31 Oct 2016

Red Hat

The Race to Readiness
sponsored by Citrix
WHITE PAPER: According to a study conducted by Verizon, 63% of security breaches involve weak or stolen credentials. This white paper offers 4 steps and explanations to getting a head start on GDPR data security to help your enterprise protect against breaches.
Posted: 24 Oct 2017 | Published: 24 Oct 2017

Citrix

The State of Endpoint Protection & Management
sponsored by Absolute
WHITE PAPER: According to Larry Ponemon of the Ponemon Institute, 67% of enterprises are unable to detect employee use of insecure mobile devices. This white paper aims to answer some of the top questions security and IT operations executives face in regard to endpoint security, mobile security, and overall protection of your enterprise.
Posted: 20 Oct 2017 | Published: 20 Oct 2017

Absolute

Outsmarting Malware
sponsored by Juniper Networks, Inc.
WHITE PAPER: Learn about how you can combine adaptable machine learning algorithms with anti-malware technologies to give you the edge over evolving cyber-threats.
Posted: 06 Nov 2017 | Published: 30 Nov 2016

Juniper Networks, Inc.

5 Ways Virtualization Enhances Security and Productivity
sponsored by Citrix
WHITE PAPER: Download this white paper to discover how virtualization can result in significant security and productivity improvements and cost savings. You'll find five use cases that illustrate how virtualization can make browser apps more secure, accelerate Windows migration, improve efficiency, and more.
Posted: 16 Nov 2017 | Published: 16 Nov 2017

Citrix

A Minute in the Life of Google's Security Infrastructure
sponsored by Google Cloud
WHITE PAPER: Defending the world's largest network against persistent and constantly evolving cyber threats has driven Google to architect, automate, and develop advanced tools to help keep us ahead. This report outlines how we've built and evolved our defenses so you can apply the same architectural decisions to your own business.
Posted: 18 Oct 2017 | Published: 18 Oct 2017

Google Cloud

Economics of DDoS Attacks
sponsored by Arbor Networks
WHITE PAPER: DDoS attacks are cheaper than ever for the perpetrator, extremely lucrative for the attack service provider, and financially devastating for the target. Read this white paper to gain insight into DDoS attacks as a service to prevent your company from having to pay the steep downtime costs and potential legal fees.
Posted: 19 Oct 2017 | Published: 19 Oct 2017

Arbor Networks

Research Report: IoT DDoS Attacks Show the Stakes Have Changed
sponsored by Arbor Networks
WHITE PAPER: How can IT network pros defend against DDoS attacks on IoT devices? In this white paper, uncover the recommendations on how to design your DNS infrastructure for stronger security against botnets. Then find out how Forrester Research believes the business technology ecosystem is changing.
Posted: 19 Oct 2017 | Published: 19 Oct 2017

Arbor Networks
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement