IT Management  >   Systems Operations  >   Security  >  

National Security

RSS Feed    Add to Google    Add to My Yahoo!
National SecurityReports
 
MapXTreme Java Edition Data Sheet
sponsored by Pitney Bowes Business Insight
DATA SHEET: MapXtreme Java is a 100% Java mapping engine designed to enable the use of location intelligence on the desktop, over the internet or through your organization intranet or extranet.
Posted: 17 Mar 2008 | Published: 01 Jan 2007

Pitney Bowes Business Insight

What Does the Rise of the 3rd Platform Mean for your Data Center?
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This IDC white paper examines the primary benefits of working with vendors investing in solutions that can process, support, and manage mission-critical workloads for cloud solutions, mobility capabilities, and data analytics initiatives in today's datacenters.
Posted: 22 Sep 2014 | Published: 31 Jul 2014

Dell, Inc. and Intel®

Compliance Tips and Tricks for the Digital Age
sponsored by OpenText
EGUIDE: This expert e-guide reveals four valuable tips to dodge compliance challenges and meet regulatory requirements.
Posted: 22 Sep 2014 | Published: 22 Sep 2014

OpenText

Cloud Workload Migration: Where the Cloud-Based Service Delivery Model Makes Sense
sponsored by Sungard
WHITE PAPER: This white paper explains the advantages that cloud migration offers to businesses today, as well as the options that exist for companies looking to take this critical next step.
Posted: 23 Sep 2014 | Published: 23 Sep 2014

Sungard

How Effective is Cloud-Provided Encryption?
sponsored by CipherCloud
RESOURCE: This blog post points out the issues surrounding cloud-provided encryption, and to keep in mind that not all solutions are created equal.
Posted: 25 Sep 2014 | Published: 22 Jul 2014

CipherCloud

Fighting Mobile Fraud: Protecting Businesses and Consumers from Cybercrime
sponsored by iovation, Inc.
WHITE PAPER: This white paper highlights the continuous fight against mobile fraud, and introduces a solution that protects businesses from online threats in real-time.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

iovation, Inc.

Fighting Banking Fraud Without Driving Away Customers
sponsored by iovation, Inc.
WHITE PAPER: In this white paper, discover a solution that offers advanced device identification and reputation services and improves the overall customer experience with online banking—at the same time.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

iovation, Inc.

Data Breach Risks of Microsoft Lync
sponsored by Actiance
WHITE PAPER: With rapid adoption of Microsoft Lync, new forms of data such as IM, chat, voice, and video are proliferating. Organizations need to deploy industrial strength methods to prevent mounting security risks. Download THIS WHITEPAPER to find out how!
Posted: 22 Sep 2014 | Published: 22 Sep 2014

Actiance

SG North Tackles Chargebacks and Terms of Service Violations
sponsored by iovation, Inc.
CASE STUDY: This case study features an online game development and publishing company who is on a mission to keep their games safe for players, and keep fraudsters away.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

iovation, Inc.

Outsider Threat Protection: Building a Kill Chain Defense
sponsored by Digital Guardian
WHITE PAPER: This white paper reveals the story behind outsider threats and how to defend against these attacks that steal sensitive data.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Digital Guardian
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement