IT Management  >   Systems Operations  >   Security  >  

National Security

RSS Feed    Add to Google    Add to My Yahoo!
National Security Reports
 
MapXTreme Java Edition Data Sheet
sponsored by Pitney Bowes Business Insight
DATA SHEET: MapXtreme Java is a 100% Java mapping engine designed to enable the use of location intelligence on the desktop, over the internet or through your organization intranet or extranet.
Posted: 17 Mar 2008 | Published: 01 Jan 2007

Pitney Bowes Business Insight

Connected Manufacturing Ushers in Expanded, Digital Ecosystem
sponsored by Hewlett-Packard Enterprise
VIDEO: With the added complexity of the Internet of Things, how can you maintain visibility and control over your supply chains? Discover the biggest challenges and opportunities posed by connected manufacturing, including areas like customer data management, security, mobility, and analytics.
Posted: 16 May 2016 | Premiered: 26 Jan 2016

Hewlett-Packard Enterprise

E-Waste Is More Than Just Clutter
sponsored by Iron Mountain
WHITE PAPER: Do you dispose of, repurpose or recycle your old IT assets and technology? Explore why and how you should create a secure and frequent IT asset disposal program for your organization to stay compliant, safe, and clutter-free.
Posted: 17 May 2016 | Published: 31 Dec 2015

Iron Mountain

Workplace Mobility, Consumerization, and Cloud Drive End-user Computing Transformation
sponsored by VMware
WHITE PAPER: The presence of mobility in the workplace is going to continue its steady rise and we need to ensure this continues to benefit the enterprise. Read on to learn about how end-users are the driving force in an ongoing mobility transformation and what this means for the future of mobility in the workplace.
Posted: 20 May 2016 | Published: 29 Jan 2016

VMware

Case Study: Fast, Simple, and Smart Hosting Services
sponsored by IBM
CASE STUDY: Find out how Technische Universität München (TUM), one of the world's leading technical universities, deployed an integrated stack to gain the ideal platform for high-performance, ultra-flexible SAP hosting services.
Posted: 26 May 2016 | Published: 29 May 2015

IBM

Managing IT Operations in the Real World: How Customers Use vRealize to Drive Data Center Efficiency
sponsored by VMware
WHITE PAPER: Business demands are growing and the classic siloed data center architecture isn't fast enough to keep up with your competitors. It is time to automate our way to a faster, more agile age. Access this white paper to explore 3 case studies that highlight the benefits of automated IT infrastructures.
Posted: 26 May 2016 | Published: 31 Dec 2014

VMware

Wireless Defense Strategies in the IoT Era
sponsored by Fortinet, Inc.
EBOOK: It's time to reevaluate access layer protection in enterprise WLANs and learn why deploying ad-hoc security is no longer enough to protect against threats. In this e-book, you'll read about new access layer defense strategies, and tips on how to select a secure WLAN solution.
Posted: 20 May 2016 | Published: 20 May 2016

Fortinet, Inc.

Cloud Security Requires Shared Responsibility Model
sponsored by CloudPassage
EGUIDE: When enterprises move data to the cloud, they can't brush their hands of security responsibility entirely. Learn how securing data in the cloud requires organizations to use a shared responsibility model, one where both the cloud provider and the organization are accountable for certain aspects of security.
Posted: 25 May 2016 | Published: 17 May 2016

CloudPassage

Data Masking and Subsetting
sponsored by Oracle Corporation
DATA SHEET: Copying production data for non-production purposes, such as test and development, is increasing the exposure of sensitive data, expanding the security and compliance boundary and the likelihood of data breaches. Learn how masking and subsetting data reduces the exposure of the sensitive production data for non-production environments.
Posted: 19 May 2016 | Published: 30 Oct 2015

Oracle Corporation

Business Intelligence: Enable Flexibility Without Sacrificing Security
sponsored by Pyramid Analytics
RESOURCE: In this infographic, discover a BI platform that can enable flexibility and speed without sacrificing security or control. Learn about easily conducting complex analyses, generating rich visualizations, and scaling to match increased user needs.
Posted: 23 May 2016 | Published: 23 May 2016

Pyramid Analytics
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement