IT Management  >   Systems Operations  >   Security  >  

National Security

RSS Feed    Add to Google    Add to My Yahoo!
National Security Reports
 
MapXTreme Java Edition Data Sheet
sponsored by Pitney Bowes Business Insight
DATA SHEET: MapXtreme Java is a 100% Java mapping engine designed to enable the use of location intelligence on the desktop, over the internet or through your organization intranet or extranet.
Posted: 17 Mar 2008 | Published: 01 Jan 2007

Pitney Bowes Business Insight

Advanced Threat Detection with Machine-Generated Intelligence
sponsored by Prelert
RESEARCH CONTENT: In this resource, you will discover the research results from a survey of 614 IT security practitioners in the U.S., revealing a lack of confidence in their IT security team's ability to defend their organization. Read on to learn why adoption of a machine-generated intelligence will bolster your cyberdefense.
Posted: 29 Jan 2016 | Published: 31 Oct 2015

Prelert

Deliver Total Performance Visibility Over All Network Applications
sponsored by eG Innovations, Inc.
CASE STUDY: In this case study, you will discover how St. Charles improved their patient care and boosted satisfaction by unifying their application performance monitoring. Learn how to streamline your IT service delivery with this platform and accelerate diagnosis of performance issues in virtualized applications by reading on.
Posted: 04 Feb 2016 | Published: 04 Feb 2016

eG Innovations, Inc.

Using Trend Micro’s Cloud & Data Center Security Solution to meet PCI DSS 3.0 Compliance
sponsored by TrendMicro
WHITE PAPER: This white paper examines a platform that delivers a comprehensive set of security controls optimized for modern data centered and the cloud.
Posted: 04 Feb 2016 | Published: 30 Apr 2015


Continuous Third-Party Security Monitoring Powers Business Objectives and Vendor Accountability
sponsored by BitSight
WHITE PAPER: This white paper discusses attitudes and capabilities regarding third-party security compliance of enterprise IT security decision-makers in the US, UK, France and Germany.
Posted: 03 Feb 2016 | Published: 31 Jan 2015

BitSight

Break the Kill Chain: Stop Data Breaches
sponsored by CA Technologies
WHITE PAPER: Data breaches are a fact of life. Learn the benefits of implementing a comprehensive privileged access management strategy to mitigate these attacks.
Posted: 29 Jan 2016 | Published: 29 Jan 2016

CA Technologies

Big Data Security for Dummies
sponsored by Blue Coat Systems
WHITE PAPER: This white paper defines Big Data Security and its underlining security analytics and malware analysis technology.
Posted: 04 Feb 2016 | Published: 31 Dec 2015

Blue Coat Systems

The ABCs of CA Workload Automation
sponsored by CA Technologies
WHITE PAPER: The following white paper has been designed to help those companies utilizing workload automation recognize as many facets of this technology as possible. Access now and gain a better understanding of workload automation and ultimately discover how you can accomplish more than you may have thought possible.
Posted: 29 Jan 2016 | Published: 29 Jan 2016

CA Technologies

40 Question You Should Have in Your Vendor Security Assessment
sponsored by BitSight
WHITE PAPER: In this white paper, you will learn how to get started with your VRM security program and by accessing the most important questions to ask third-party businesses.
Posted: 02 Feb 2016 | Published: 30 Apr 2014

BitSight

Cyber Situational Awareness
sponsored by Digital Shadows
WHITE PAPER: This white paper explores cyber situational awareness and presents a three-staged approach to incorporate cyber situational awareness into your defenses.
Posted: 05 Feb 2016 | Published: 31 Jan 2016

Digital Shadows
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement