Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Secure Content Management Software  >  

Ad Blockers

RSS Feed    Add to Google    Add to My Yahoo!
Ad Blockers Reports
 
A 10 Minute Guide to Software Harvesting
sponsored by Snow Software
WHITE PAPER: Securing the funding to get started in Software Asset Management (SAM) or Software License Optimization can sometimes be difficult. One way to get the attention of senior business managers is to provide quick wins that point to greater cost savings over time.
Posted: 11 Mar 2016 | Published: 30 Sep 2014

Snow Software

QRadar SIEM
sponsored by IBM
WHITE PAPER: Protecting today's complex networks against malicious activities is a never-ending task. Learn how you can boost threat protection and compliance by developing security intelligence.
Posted: 15 Jun 2016 | Published: 20 Dec 2013

IBM

Enhancing Security and System Functionality with the Cloud
sponsored by Splunk
CASE STUDY: This case study explores how a marketing company leveraged a cloud service to protect their systems from potential brute force attacks, while lowering operational costs and reducing time resolution for errors.
Posted: 07 Apr 2016 | Published: 07 Apr 2016

Splunk

Cybersecurity to Protect Financial Data
sponsored by Palo Alto Networks
WEBCAST: This webcast discusses the security challenges of legacy network architecture, and how a security platform approach can benefit security managers who are concerned about their enterprise vulnerability.
Posted: 14 Apr 2016 | Premiered: Apr 14, 2016

Palo Alto Networks

Empowering Mobile Security with Policy Management
sponsored by Aruba Networks
WHITE PAPER: Policy management is the key to enforcing mobile security. Discover cost-effective, easier ways to manage the tedious and complex rules associated with legacy authentication, authorization and accounting.
Posted: 10 Jun 2016 | Published: 10 Jun 2016

Aruba Networks

Negotiate with SAP, IBM, Microsoft and Oracle to Make the Most from Your IT Budget
sponsored by Gartner
EGUIDE: When it comes to contract negotiations, CIOs hold more sway than they think. Next time you negotiate with suppliers, ensure you get a better price from likes of SAP, IBM, Microsoft and Oracle. Access this expert guide to discover vendor negotiation tips for midmarket CIOs working with these vendors from Forrester Senior Analyst Duncan Jones.
Posted: 29 Jun 2016 | Published: 28 Jun 2016

Gartner

Why You Should Care about Identity-as-a-Service (iDaaS): An Expert's Perspective
sponsored by Rackspace
WEBCAST: This webcast defines identity-as-a-service in the context of real-world applications, and identifies the key capabilities it can provide, including credential management, claims issuance and acceptance, assurance of compliance, personalization information maintenance, and more.
Posted: 04 May 2016 | Premiered: Dec 31, 2015

Rackspace

Pervasive Monitoring and Security Across Multiple Data Centers
sponsored by Big Switch Networks
CASE STUDY: This case study of a major company was able to reduce the number of tap and tool silos to increase efficiency and security, and economically scale these tools to match the company's global reach, growing cloud, and mobile delivery model.
Posted: 13 Apr 2016 | Published: 28 Dec 2015

Big Switch Networks

Reaping the Benefits of Strong, Smarter User Authentication
sponsored by Symantec Corporation
WHITE PAPER: Discover how the changes in enterprise IT—namely mobility and cloud—affect smart authentication implementation. Access now to learn how you can remain secure against today's evolving security threats with smarter user authentication.
Posted: 13 May 2016 | Published: 31 Dec 2015

Symantec Corporation

Uncover Threats in Network Traffic: The Ultimate Guide to SSL Inspection
sponsored by A10 Networks
WHITE PAPER: Don't let hackers evade your network defenses through encrypted traffic. Access this resource and learn ways to gain insight into encrypted data by decrypting inbound and outbound SSL traffic.
Posted: 12 Feb 2016 | Published: 30 Oct 2015

A10 Networks
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement