IT Management  >   Systems Operations  >  

System Security

RSS Feed    Add to Google    Add to My Yahoo!
System Security White Papers (View All Report Types)
 
The Top 6 Benefits of Switching to Enterprise Voice UC&C
sponsored by Polycom, Inc.
WHITE PAPER: This white paper highlights the top 6 benefits behind one software-based UC solution that will expedite all your collaborative initiatives. Read on here to learn how to access the following benefits that will lower the total cost of your enterprise communications.
Posted: 21 Aug 2015 | Published: 21 Aug 2015

Polycom, Inc.

5 Tips to Get Your Site Hosting Started
sponsored by Hostway Corporation
WHITE PAPER: Are you considering website hosting? This white paper serves as an end-to-end guide in doing so. Click here to see why web hosting (and email) should be part of your market offering.
Posted: 07 Aug 2015 | Published: 07 Aug 2015

Hostway Corporation

Software-Defined Data Center Meets Micro-Segmentation
sponsored by VMware
WHITE PAPER: This white paper explains how to deploy advanced security inside your data center with micro-segmentation, which will deliver the operational agility of network virtualization.
Posted: 26 Aug 2015 | Published: 13 Dec 2013

VMware

How a New Alliance Addresses the Changing Security Landscape
sponsored by Hewlett-Packard Company
WHITE PAPER: The threats to your company are growing more sophisticated. Learn why you need expert help to be sure your data remains secure and compliant.
Posted: 18 Aug 2015 | Published: 19 Aug 2015

TOPICS:  Security
Hewlett-Packard Company

Security Essentials for CIO's: Responding to Inevitable Incident
sponsored by IBM
WHITE PAPER: This white paper lists a seven-step process you can take to ensure that your enterprise knows exactly what to do when a security incident occurs.
Posted: 28 Aug 2015 | Published: 31 Aug 2012

IBM

Why Application Whitelisting Is Essential For Advanced Threat Defense
sponsored by Digital Guardian
WHITE PAPER: This webinar transcript explores the challenge of securing your endpoints from zero-day attacks and suggests application whitelisting as a solution.
Posted: 18 Aug 2015 | Published: 18 Aug 2015

Digital Guardian

EMM Report Card: 10 Mobility Suites to Keep an Eye On
sponsored by IBM
WHITE PAPER: This white paper examines and compares 10 of the top EMM suites to look out for, highlighting the pros and cons to each. Read on to find out which dynamic suite best stacks up when it comes to the EMM magic quadrant of features.
Posted: 06 Aug 2015 | Published: 06 Aug 2015

IBM

5 Super Powers To Look for When Evaluating DRaaS Providers
sponsored by Assuritive
WHITE PAPER: This white paper outlines and examines the five most indispensable attributes to look for when assessing DRaaS solutions. Read on here to learn how to evaluate using 5 criteria.
Posted: 26 Aug 2015 | Published: 26 Aug 2015

Assuritive

The State Of Data Security: 2014 Through 2015
sponsored by Digital Guardian
WHITE PAPER: In this webinar transcript, a Forrester researcher discusses the state of data security, how things have changed in the past year, and what can be done going forward.
Posted: 17 Aug 2015 | Published: 17 Aug 2015

Digital Guardian

Adapt Your Security to Today's Threats
sponsored by Digital Guardian
WHITE PAPER: This white paper discusses why changes in security strategies are necessary and how you can make these changes.
Posted: 14 Aug 2015 | Published: 14 Aug 2015

Digital Guardian
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement