IT Management  >   Systems Operations  >  

Active Security Solutions

RSS Feed    Add to Google    Add to My Yahoo!
Active Security Solutions Reports
 
Get Real-Time Threat Detection
sponsored by AlienVault
PRODUCT DEMO: A successful unified security management (USM) approach can help you discover all IP-enables assets on your network, identify vulnerabilities and malware quickly, and much more.
Posted: 01 Apr 2016 | Premiered: 01 Apr 2016

AlienVault

Designing Single Sign-On Architecture for Enhanced Security
sponsored by CA Technologies
WHITE PAPER: This white paper describes how single sign-on and session management, across a wide variety of sites using host-only cookies, can make their theft much more difficult by using a centralized star topology. Access now and discover more benefits to this method.
Posted: 12 Apr 2016 | Published: 27 Feb 2015

CA Technologies

AirWatch EMM Gets Windows 10 Support, Security
sponsored by VMware
EGUIDE: This e-guide provides an update on AirWatch's new privacy initiative, and teaches you the benefits of integrating the EMM tool into your business. Access now and also learn how AirWatch added Windows 10 support, and partnered with a number of security software providers to bolster its EMM tool.
Posted: 21 Apr 2016 | Published: 20 Apr 2016

VMware

Wake Up From Device Management Nightmares with User-Centric Approach
sponsored by MicroFocus
PRODUCT OVERVIEW: This white paper details how to overcome this challenge by managing devices by the user. Access now to find out how user-centric management strategies gives users anytime, anywhere access, no matter what device they use, while giving IT automated management that eases time-consuming tasks.
Posted: 30 Mar 2016 | Published: 31 Aug 2015

MicroFocus

Strengthening Cybersecurity at the Tour de France
sponsored by Dimension Data
RESOURCE: From this case study, learn how the Tour de France revolutionized their viewing experience, demonstrating their continued proactive stance on cybersecurity. Read on to discover how they successfully thwarted 1,716 deliberate cyberattacks on their network's perimeter.
Posted: 19 Apr 2016 | Published: 27 Feb 2016

Dimension Data

Server Hosted Virtual Desktops: How the Top Seven Providers Stack Up
sponsored by Citrix
RESEARCH CONTENT: With the many options for VDI, it can be hard to choose which one is suited for your business. So before you jump into a VDI deployment, access this report to assess the state of the VDI vendor market and gain insight into the strengths and weaknesses of the top seven vendors as well as how these vendors stack up against each other.
Posted: 18 Apr 2016 | Published: 18 Sep 2015

Citrix

Becoming a Managed Security Service Provider: Why a Layered Approach to Security is Essential
sponsored by LogicNow
WHITE PAPER: This white paper suggests the kinds of services that a managed service provider (MSP) can offer to clients that will help them develop a managed security service. Access now to explore the kinds of attacks that service providers can help customers avoid.
Posted: 06 Apr 2016 | Published: 06 Apr 2016

LogicNow

Critical Security and Compliance Considerations for Hybrid Cloud Deployments
sponsored by Hewlett Packard Enterprise
ANALYST REPORT: Discover in this extensive report the current state of hybrid cloud security and compliance, and access the most effective approaches to clearing a path for broader hybrid cloud deployments. Read on to overcome compliance challenges in your hybrid cloud infrastructure.
Posted: 12 Apr 2016 | Published: 31 Dec 2015

Hewlett Packard Enterprise

Case Study: Industry’s Largest NFV Deployment
sponsored by Big Switch Networks
CASE STUDY: NFV deployments represent some of the most demanding workloads in OpenStack clouds, yet the economic and operational promise of NFV makes this a high-value technical challenge for service providers worldwide. Access this case study to see how three major companies came together for the industry's largest NFV deployment.
Posted: 13 Apr 2016 | Published: 30 Mar 2016

Big Switch Networks

We’ve Been Breached- Now What?
sponsored by eSentire
WHITE PAPER: This white paper teaches you how to respond after a cyber threat becomes a cyber attack. Access now to learn how to eradicate cyber threats, repair infected systems and restore operations to normal after an attack occurs.
Posted: 14 Apr 2016 | Published: 31 Dec 2015

eSentire
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement