Vertical Industries  >  

Information Technology Industry

RSS Feed    Add to Google    Add to My Yahoo!
Information Technology Industry Reports
 
Applying the Top 20 Critical Security Controls to the Cloud
sponsored by CloudPassage
WEBCAST: This webcast discusses how enterprises can apply the 20 Critical Security Controls for Effective Cyber Defense, a list of best practices for IT security, to the new reality of cloud-based or virtualized infrastructures.
Posted: 06 Feb 2015 | Premiered: Feb 6, 2015

CloudPassage

Enterprises Reveal Significant Room for Improvement In Their Security Defenses
sponsored by Hewlett-Packard Company
WHITE PAPER: This resource explores the results of a survey that depicts that lack of confidence that organizations have in their security defenses, and also presents an approach to detecting malware to prevent it from spreading throughout the network.
Posted: 01 Feb 2015 | Published: 01 Feb 2015

Hewlett-Packard Company

Web Application Security for Dummies
sponsored by Qualys
EBOOK: This e-book explains how to quickly locate and remediate vulnerabilities in order to prevent attackers from gaining control over the application and obtaining access to the server, database, and other back-end IT resources.
Posted: 26 Jan 2015 | Published: 30 Dec 2011

Qualys

DevOps Q&A: Essential components, implementation roadblocks
sponsored by Rackspace
WHITE PAPER: This white paper contains insights from technology leaders on the trials and successes of collaboration between Development and Operations teams, and provides suggestions for companies looking to adopt the DevOps mindset.
Posted: 03 Sep 2014 | Published: 29 Aug 2014

Rackspace

5 Steps For Windows Server 2003 End of Life Success
sponsored by Bit9 + Carbon Black
WHITE PAPER: Access this white paper today to learn the 5 steps that your organization needs to take now to ensure that your enterprise is prepared for Microsoft Windows Server 2003's end-of-life in six short months.
Posted: 14 Jan 2015 | Published: 06 Nov 2014

Bit9 + Carbon Black

8 Ways to Better Monitor Network Security Threats in the Age of BYOD
sponsored by Hewlett-Packard Company
WHITE PAPER: This helpful white paper takes a look at a number of ways in which security professionals can gain better control of the BYOD explosion and mitigate risk factors before they impact the enterprise.
Posted: 01 Feb 2015 | Published: 14 Jan 2014

Hewlett-Packard Company

Case Study: A Public School's Access Management Problem
sponsored by Centrify Corporation
WHITE PAPER: This case study details how the one school district implementeda solution for handling authorization and authentication district-wide.
Posted: 04 Feb 2015 | Published: 30 Aug 2013

Centrify Corporation

Next-Generation Firewalls and IPS: Why You Need Both
sponsored by Hewlett-Packard Company
WHITE PAPER: This HP white paper shows how next-generation firewalls and next-generation intrusion prevention systems are complementary security solutions that work together to secure your network.
Posted: 01 Feb 2015 | Published: 11 Dec 2014

Hewlett-Packard Company

Taking Control of File Sharing Services
sponsored by Mimecast
WHITE PAPER: This informative white paper discusses how file sharing services are being used within enterprises; the benefits and risks that they bring; and the factors that organizations should consider in selecting an enterprise-grade service in order to ensure its security.
Posted: 19 Dec 2014 | Published: 30 Apr 2014

Mimecast

SaaS Takes Center Stage in 2014
sponsored by IBM
WHITE PAPER: Learn how subscription-based business applications are expected to make an even bigger impact in 2014 and beyond in this informative infographic.
Posted: 02 Oct 2014 | Published: 29 Jul 2013

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement