IT Management  >   Systems Operations  >   Security  >  

National Security

RSS Feed    Add to Google    Add to My Yahoo!
National SecurityReports
 
MapXTreme Java Edition Data Sheet
sponsored by Pitney Bowes Business Insight
DATA SHEET: MapXtreme Java is a 100% Java mapping engine designed to enable the use of location intelligence on the desktop, over the internet or through your organization intranet or extranet.
Posted: 17 Mar 2008 | Published: 01 Jan 2007

Pitney Bowes Business Insight

ITIL® 2015 and Beyond: Six Trends Driving the Increased Importance of the Service Desk
sponsored by Global Knowledge
WHITE PAPER: This white paper provides a snapshot of challenges for IT service and support and explains why the Service Desk is now more critical than ever.
Posted: 26 Aug 2014 | Published: 26 Aug 2014

Global Knowledge

The Impact of Data Breaches: Why Application Security is A Business Imperative
sponsored by Veracode, Inc.
WHITE PAPER: 64% of internally developed enterprise applications remain untested for security vulnerabilities. View this informative whitepaper now to learn the impact of security breaches, and the hurdles companies must overcome to develop apps with security as a priority.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

Veracode, Inc.

Protection for Every Enterprise: Maximizing Mobile Security
sponsored by BlackBerry
WHITE PAPER: In this helpful white paper, get the facts on mobile security and the best protections strategies from today's advanced cyber threats.
Posted: 19 Aug 2014 | Published: 19 Aug 2014

BlackBerry

Secure Mobile Devices without Restricting Users
sponsored by Bluebox
VIDEO: In this informativevideo, explore a new mobile security solution which provides mobile security and visibility without forcing users to stop using their preferred apps and devices.
Posted: 20 Aug 2014 | Premiered: 05 Mar 2014

Bluebox

Automating and Securing Healthcare Information with Cloud-Based Fax Messaging
sponsored by OpenText
WHITE PAPER: Learn how this cloud-based fax messaging solution will secure patients' information at a low cost and meets federal regulations.
Posted: 19 Aug 2014 | Published: 31 Dec 2013

OpenText

Woolworths and Google: Innovating together
sponsored by Google
WEBCAST: Tune in to this in-depth webcast to learn how one company was able to implement widespread change within their business with the help of Google Apps for Business. Watch this webcast today, and discover how you can bring serious change to your organization and facilitate innovation within, with Google Apps for Business.
Posted: 19 Aug 2014 | Premiered: Jun 8, 2014

Google

Breaking Down Cloud Archiving Myths
sponsored by Hewlett-Packard Company
WHITE PAPER: This exclusive whitepaper explores the misinformation and misconceptions that are preventing many organizations from taking full advantage of the cloud.
Posted: 25 Aug 2014 | Published: 21 Aug 2013

Hewlett-Packard Company

SAP Process Performance: Mystery Solved!
sponsored by Compuware
EBOOK: This e-book features four stories about IT teams tasked with resolving disruptions to their organizations' operations and distribution systems, which appear to be SAP-related but end up requiring troubleshooting far beyond SAP.
Posted: 26 Aug 2014 | Published: 07 May 2014

Compuware

Mitigating Web Threats with Comprehensive and Pervasive Security
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper explains the challenges regarding Web security, and explores a solution with a durable network-based security architecture that is designed to protect against malicious threats.
Posted: 21 Aug 2014 | Published: 01 May 2013

Cisco Systems, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement