IT Management  >   Systems Operations  >   Security  >  

National Security

RSS Feed    Add to Google    Add to My Yahoo!
National Security Reports
 
MapXTreme Java Edition Data Sheet
sponsored by Pitney Bowes Business Insight
DATA SHEET: MapXtreme Java is a 100% Java mapping engine designed to enable the use of location intelligence on the desktop, over the internet or through your organization intranet or extranet.
Posted: 17 Mar 2008 | Published: 01 Jan 2007

Pitney Bowes Business Insight

A Unified Approach to Rugged Device Management
sponsored by VMware
WHITE PAPER: This whitepaper delves into the evolution of rugged devices, the management challenges associated with these deployments, and how unified endpoint management addresses these challenges to enable a fully connected environment that is both manageable and secure.
Posted: 07 Sep 2017 | Published: 07 Sep 2017

VMware

GDPR Breach Notification Rule Could Complicate Compliance
sponsored by Lepide Software
EGUIDE: Find out what GDPR compliance will entail, and what you can do to avoid the massive fine for failure to comply. Then, explore how the regulation's "breach notification rule" will prompt not just European companies, but those based in the US as well, to more promptly report a data breach.
Posted: 15 Sep 2017 | Published: 12 Sep 2017

Lepide Software

Credit where Credit is Due
sponsored by Armor
CASE STUDY: Read this case study to uncover how Baxter Credit Union overcame its difficulty of accessing financial data easily and securely by implementing cloud-based software.
Posted: 05 Sep 2017 | Published: 05 Sep 2017

Armor

2017 Middle East Salary Survey Infographic
sponsored by ComputerWeekly.com
DATA SHEET: Download this infographic to access Computer Weekly's annual salary survey revealing the average pay for technology professionals in the Middle East region.
Posted: 12 Sep 2017 | Published: 12 Sep 2017

ComputerWeekly.com

Case Study: How Six Flags Overcame the Challenges of Insufficient Bandwidth
sponsored by Akamai Technologies
CASE STUDY: In this case study, find out how Six Flags used a Content Delivery Network (CDN) to overcome the challenges of a wide area network to increase app downloads and customer satisfaction.
Posted: 07 Sep 2017 | Published: 07 Sep 2017

Akamai Technologies

Armor Complete's Intelligent Security Model: A Closed-loop System that Actively Learns how to Combat Threats
sponsored by Armor
WHITE PAPER: In this white paper, discover how an Intelligent Security Model (ISM) delivers a high level of security and compliance while actively learning how to combat threats.
Posted: 05 Sep 2017 | Published: 05 Sep 2017

Armor

Managing the Brainstorm
sponsored by Armor
CASE STUDY: In this case study, find out why ThinkTank sought out a security monitoring technology to protect their clients 'big ideas' and their growing data demands that supports their cloud services platform.
Posted: 05 Sep 2017 | Published: 05 Sep 2017

Armor

Insuring the uninsurable: Is cyber insurance worth its salt?
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This article in our Royal Holloway Information Security Thesis series discusses the risks and benefits of cyber insurance and outlines steps businesses can take to make better informed risk mitigation decisions.
Posted: 12 Sep 2017 | Published: 12 Sep 2017

ComputerWeekly.com

Is DNS Your Security Achilles Heel?
sponsored by Akamai Technologies
WHITE PAPER: This white paper explains how many attackers take advantage of recursive DNS, which almost every action on the internet relies on, and provides 6 best practices you can follow to mitigate the risks.
Posted: 19 Sep 2017 | Published: 31 Jul 2017

Akamai Technologies
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement