IT Management  >   Systems Operations  >   Security  >  

National Security

RSS Feed    Add to Google    Add to My Yahoo!
National SecurityReports
 
MapXTreme Java Edition Data Sheet
sponsored by Pitney Bowes Business Insight
DATA SHEET: MapXtreme Java is a 100% Java mapping engine designed to enable the use of location intelligence on the desktop, over the internet or through your organization intranet or extranet.
Posted: 17 Mar 2008 | Published: 01 Jan 2007

Pitney Bowes Business Insight

Breaches Happen: Be Prepared
sponsored by Symantec Corporation
WHITE PAPER: This exclusive whitepaper will teach you how to protect yourself from damaging attacks and effectively respond to them and unveils the protection and defense life cycle.
Posted: 23 Oct 2014 | Published: 23 Oct 2014

Symantec Corporation

Data Centers at Your Door: Prefabricated Modules from Schneider Electric
sponsored by Schneider Electric
VIDEO: Prefabricated data centers allow you to do just this. Access this video to learn how prefabricated IT and hydronics modules from Schneider Electric allow you to deliver a flexible and efficient data center built specifically for your needs without any of the guesswork.
Posted: 31 Oct 2014 | Premiered: 12 Jun 2014

Schneider Electric

Data Centre Projects: System Planning
sponsored by Schneider Electric
WHITE PAPER: Access this white paper to examine a methodology for planning your data center project that's designed to improve the quality and speed of the results. You'll learn how basing your planning around 4 tasks will allow you to ensure that the right people are able to make the right decisions in the right order to maximize efficiency.
Posted: 30 Oct 2014 | Published: 30 Oct 2014

Schneider Electric

10 Steps to Mitigate a DDoS Attack in Real Time
sponsored by F5 Networks
WHITE PAPER: This brief resource details a 10-step process to stopping distributed denial of service (DDoS) attacks immediately and before critical damage can be made.
Posted: 22 Oct 2014 | Published: 15 Jan 2014

F5 Networks

BYOD and Mobile Security: The Disconnect Between Employers and Employees
sponsored by Webroot
WHITE PAPER: This white paper proposes that there is a disconnect between how employees use mobile security and how organizations implement BYOD policies, and presents the results of a recent study commissioned by Webroot that examines these issues.
Posted: 27 Oct 2014 | Published: 31 Jul 2014

Webroot

Modernize your Active Directory
sponsored by Dell Software
WHITE PAPER: This exclusive white paper takes an in-depth look at Active Directory, which can be used to mitigate risk and reduce costs with security software. Read on to learn more.
Posted: 30 Oct 2014 | Published: 30 Oct 2014

Dell Software

The Definitive Guide to Cloud Adoption
sponsored by Cisco & Fujitsu
WHITE PAPER: This white paper allows you to cut through the market hype, acronyms, and buzzwords to get a clearer understanding of what the various cloud models have to offer. Read on to get best practice and practical approaches to make cloud adoption as simple and beneficial as possible.
Posted: 21 Oct 2014 | Published: 31 Dec 2011

Cisco & Fujitsu

Demo: RSA Security Analytics: SIEM Use Case
sponsored by RSA, The Security Division of EMC
VIDEO: Watch this demo to discover RSA Security Analytics 10.4 in action as it solves a complex security information and event management (SIEM) use case.
Posted: 29 Oct 2014 | Premiered: 29 Oct 2014

RSA, The Security Division of EMC

Implementing Hot and Cold Air Containment in Existing Data Centres
sponsored by Schneider Electric
WHITE PAPER: Data center containment strategies offer a way to improve the predictability and efficiency of traditional data center cooling systems without overhauling your data center hardware.Access this white paper to explore containment methods that allow you to leverage your existing data centers to improve air management and efficiency.
Posted: 28 Oct 2014 | Published: 27 Oct 2014

Schneider Electric
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement