IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Signatures

RSS Feed    Add to Google    Add to My Yahoo!
SignaturesWhite Papers (View All Report Types)
 
Strong Authentication: Best Practices and Use Cases
sponsored by Gemalto
WHITE PAPER: This helpful white paper explains how an identity-centric approach to IT security can lock down critical processes and systems and ensure that you have complete control over who has access.
Posted: 06 Nov 2014 | Published: 06 Nov 2014

Gemalto

Video-Ready - Campus Network
sponsored by Cisco Systems, Inc.
WHITE PAPER: Why should your network be "Video-Ready"? Video applications have enabled enterprises to significantly increase worker productivity, improve collaboration, reduce costs, and streamline and optimize business operations. This paper dicusses the factors that will accelerate adoption of video solutions over the next few years.
Posted: 22 May 2009 | Published: 01 May 2008

Cisco Systems, Inc.

Embracing bring your own device (BYOD)
sponsored by Dell, Inc.
WHITE PAPER: Achieve the ideal balance between user freedom and corporate control by viewing this white paper to learn insightful recommendations. Download this resource and discover the steps to maximising the benefits of BYOD and minimising the risks to boost productivity in your organisation.
Posted: 17 Nov 2014 | Published: 04 Nov 2014

Dell, Inc.

Tis the Season for Safer Shopping? Assessing the Security Performance of the Retail Industry
sponsored by BitSight
WHITE PAPER: Last holiday season the security shortcomings of the retail industry were on full display with the Target breach and other high-profile incidents. So, have they made any significant changes to move from the naughty to nice list this year?
Posted: 25 Nov 2014 | Published: 25 Nov 2014

BitSight

A Powerful Foundation for Virtual Environments and Cloud Computing Infrastructure
sponsored by Intel Corporation
WHITE PAPER: Access this white paper to learn how you can virtualize any workload and create a more flexible and secure data center and deliver advanced cloud computing functionality. Read on to find out how this approach allows you to strengthen security and compliance, reduce IT costs, and more.
Posted: 20 Nov 2014 | Published: 28 Feb 2013

Intel Corporation

Modern Infrastructure: The Rocky Road to Hybrid Cloud
sponsored by CDW Corporation
WHITE PAPER: Access this expert resource to learn why the hybrid cloud model could become the chosen method for more organizations moving forward. You'll also learn more about the evolution of social IT, the potential benefits of DCIM, what to expect at the upcoming VMworld conferences, and more.
Posted: 24 Nov 2014 | Published: 24 Nov 2014

CDW Corporation

Pragmatic Approach to Data Center Management – Control and Manageability
sponsored by Avocent
WHITE PAPER: This white paper explores a pragmatic view of data center management and examines the best practices in real-world data centers for over-arching management solutions. Read on to learn how you can control costs and manage complex technology environments while achieving core objectives for availability and security.
Posted: 24 Nov 2014 | Published: 30 Sep 2010

Avocent

HP ServeIT for IT Infrastructure
sponsored by Hewlett-Packard Company
WHITE PAPER: View this white paper to discover the three preconfigured server solutions available to move your business forward offered by industry giants HP and Microsoft. Cut and slash mundane IT task times to open your days to innovation by choosing the ProLiant Gen 8 server sized right for you.
Posted: 20 Nov 2014 | Published: 29 Oct 2014

Hewlett-Packard Company

Raise Backup Success Rates with Data Protection Assessments
sponsored by APTARE
WHITE PAPER: This exclusive whitepaper argues for implementing comprehensive data protection assessments to improve your backup success rates.
Posted: 18 Nov 2014 | Published: 13 Nov 2008

APTARE

Finding the Right Security Assessment Approach for Your Organization
sponsored by Dell SecureWorks
WHITE PAPER: Download this exclusive whitepaper to determine how you should be assessing your security and explore test options.
Posted: 19 Nov 2014 | Published: 13 Nov 2013

Dell SecureWorks
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement