IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Signatures

RSS Feed    Add to Google    Add to My Yahoo!
Signatures White Papers (View All Report Types)
 
Video-Ready - Campus Network
sponsored by Cisco Systems, Inc.
WHITE PAPER: Why should your network be "Video-Ready"? Video applications have enabled enterprises to significantly increase worker productivity, improve collaboration, reduce costs, and streamline and optimize business operations. This paper dicusses the factors that will accelerate adoption of video solutions over the next few years.
Posted: 22 May 2009 | Published: 01 May 2008

Cisco Systems, Inc.

Service Desk in Varde Eliminates Password-Related Calls
sponsored by Fast Pass Corp
WHITE PAPER: This case study explores how Varde Municipality implemented a password management strategy to overcome their issue of receiving password related calls.
Posted: 04 Jan 2018 | Published: 04 Jan 2018

Fast Pass Corp

The State of Security for In-Production Web Applications
sponsored by tCell
WHITE PAPER: In both the 2016 and 2017 Verizon Data Breach Investigations Reports, web application attacks are listed as the number one breach method, by far. Explore this white paper to gain insight into specific web app attacks, including third-party libraries, account takeovers, and more.
Posted: 22 Dec 2017 | Published: 22 Dec 2017

tCell

Extending Security Technology to the Cloud: Threat Detection & Response
sponsored by RSA
WHITE PAPER: According to Gartner, spending on cloud system IaaS will grow from $34 billion in 2017 to $71 billion through 2020. This white paper offers strategies for improving threat detection and response within cloud technologies.
Posted: 03 Jan 2018 | Published: 03 Jan 2018

RSA

Unified Threat Management: A Modern Solution to a Modern Problem
sponsored by Seqrite
WHITE PAPER: Read this white paper to learn why traditional methods of network protection are no longer sufficient to keep your data safe from today's advanced threats. Then, discover unified threat protection which uses a single appliance to perform many security functions.
Posted: 27 Dec 2017 | Published: 27 Dec 2017

Seqrite

Mobile Threat Report
sponsored by Lookout
WHITE PAPER: With mobile threats becoming increasingly sophisticated it's more important than ever for organizations to know what threats they face, and how those threats can cause data loss, compliance infringement, and brand reputation damage. Download this white paper to uncover the latest mobile threats to your organization.
Posted: 15 Jan 2018 | Published: 15 Jan 2018

Lookout

Unmask Evasive Threats
sponsored by McAfee, Inc.
WHITE PAPER: Gain insight into the steps taken and commands used during a malware attack from a destructive ransomware family.
Posted: 20 Dec 2017 | Published: 20 Dec 2017

TOPICS:  IT Management
McAfee, Inc.

The EDR Balancing Act: Impact vs. Ability to Execute
sponsored by McAfee, Inc.
WHITE PAPER: Sometimes it's about finding the right balance. Learn how to tackle endpoint incident and detection with this approach.
Posted: 20 Dec 2017 | Published: 20 Dec 2017

TOPICS:  IT Management
McAfee, Inc.

Building Trust in a Cloudy Sky: Executive Summary
sponsored by McAfee, Inc.
WHITE PAPER: Understand why network security is critical as more companies put their trust in the cloud with these key findings.
Posted: 20 Dec 2017 | Published: 20 Dec 2017

TOPICS:  IT Management
McAfee, Inc.

GDPR: Data-Protection Soul-Searching, Not Just Compliance
sponsored by McAfee, Inc.
WHITE PAPER: Embrace GDPR as an opportunity for data reorganization. Find out why it's important and how to get started.
Posted: 20 Dec 2017 | Published: 20 Dec 2017

TOPICS:  IT Management
McAfee, Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement