IT Management  >   Systems Operations  >  

Active Security Solutions

RSS Feed    Add to Google    Add to My Yahoo!
Active Security Solutions Reports
 
Simplifying Protection of Critical Assets
sponsored by AVG Technologies
EGUIDE: This expert e-guide lays out a simple strategy you can use to make sure you're optimizing your security resources.
Posted: 20 May 2015 | Published: 20 May 2015

AVG Technologies

Endpoint Security Benefits from Web-Based Platforms
sponsored by Absolute Software
WEBCAST: This brief webcasts highlights which features to look for in endpoint security technology. Tune in, and assess whether or not your current strategy has the following capabilities.
Posted: 07 May 2015 | Premiered: May 7, 2015

Absolute Software

Checklist: Online Security Strategy Key Considerations
sponsored by Melbourne IT
WHITE PAPER: The following white paper provides readers with a checklist designed to help assess your approach to online security and identify if there are any areas of your strategy that require reevaluation. Access now and gain a firm grasp on your online security strategy and learn what steps you can take to improve it.
Posted: 18 May 2015 | Published: 18 May 2015

Melbourne IT

Research Report: The Rise of Mobile Content Management
sponsored by Box
WHITE PAPER: Access this white paper for a buyer's guide to enterprise mobility management providers who are improving their content management features.
Posted: 08 May 2015 | Published: 15 Oct 2014

Box

Delivering Business Value with Enterprise Chat
sponsored by MindLink
EBOOK: This e-book will introduce the persistent Enterprise Chat functionality in Microsoft Lync™ and Skype for Business.
Posted: 27 May 2015 | Published: 27 May 2015

MindLink

Cybersecurity 101: What Coporate Boards Should be Doing
sponsored by Trend Micro
WHITE PAPER: Download and discover how executives can start making a significant impact on enterprise cybersecurity, ensuring that valuable enterprise data is safe from hackers.
Posted: 26 May 2015 | Published: 26 Sep 2014

Trend Micro

How Cyber Attackers Operate and How to Stop them
sponsored by IBM
VIDEO: In this video, discover what separates today's attacks from those of the past and how you can revamp your security to meet modern threats.
Posted: 20 May 2015 | Premiered: 22 Apr 2014

IBM

Rethinking Cloud Content Collaboration in Financial Services
sponsored by Box
WHITE PAPER: Access this white paper to see how cloud-based content collaboration can meet customer demands in financial services while increasing productivity, and allowing the business to get around capacity and speed-to-market issues.
Posted: 20 May 2015 | Published: 20 May 2015

Box

Public sector IT specialist improves council’s flexibility, efficiency, security
sponsored by Colt IT Services
CASE STUDY: Access this case study to learn how one organization adopted a virtual desktop environment based on an infrastructure-as-a-service platform. Find out the benefits of this approach and how they were able to transform their current VDI.
Posted: 22 May 2015 | Published: 31 Dec 2014

Colt IT Services

Using Intrusion Detection Systems for Improving ROI
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, discover how a strong IDS not only enhances your security, but also builds up your ROI.
Posted: 14 May 2015 | Published: 14 May 2015

Hewlett-Packard Company
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement