IT Management  >   Systems Operations  >   Security  >  

National Security

RSS Feed    Add to Google    Add to My Yahoo!
National Security Reports
 
MapXTreme Java Edition Data Sheet
sponsored by Pitney Bowes Business Insight
DATA SHEET: MapXtreme Java is a 100% Java mapping engine designed to enable the use of location intelligence on the desktop, over the internet or through your organization intranet or extranet.
Posted: 17 Mar 2008 | Published: 01 Jan 2007

Pitney Bowes Business Insight

The Secret To Reducing False Alerts
sponsored by Prelert
WHITE PAPER: Take a look at this brief article to discover how anomaly detection can lower your rate of false positives.
Posted: 23 Mar 2015 | Published: 22 May 2014

Prelert

Cybercrime 101
sponsored by Global Knowledge
WHITE PAPER: Discover the ways in which cybercrime occurs in three realms: individual, business, and governmental. Learn what you can do to protect yourself and your organization.
Posted: 27 Mar 2015 | Published: 27 Mar 2015

Global Knowledge

How to resolve the Windows Server 2003 migration issue
sponsored by Lenovo
EGUIDE: In this expert e-guide, find out why Windows Server 2003 is not a viable choice for your business anymore, in terms of a virtual infrastructure.
Posted: 19 Mar 2015 | Published: 19 Mar 2015

Lenovo

The Secret To Finding Unknown IT Security Threats
sponsored by Prelert
WHITE PAPER: Read this brief article to discover how predictive analytics and adaptable machine learning can enhance your security and protect you from even the worse threats.
Posted: 24 Mar 2015 | Published: 18 Mar 2014

Prelert

Security Analytics:Anomaly Detection for IT Security
sponsored by Prelert
VIDEO: Watch this video to learn how anomaly detection systems use advanced analytics to uncover even the subtlest cybercriminals.
Posted: 25 Mar 2015 | Premiered: 25 Mar 2015

Prelert

Anomaly Detection in Unstructured Data
sponsored by Prelert
WHITE PAPER: This article introduces an anomaly detection program aimed to aid with the analysis of unstructured data.
Posted: 23 Mar 2015 | Published: 27 Feb 2015

Prelert

BYOD and Beyond: Balancing User and Enterprise Needs in Mobile Security Policy
sponsored by SearchConsumerization.com
EBOOK: Bring your own device policies are a key part of any enterprise mobility strategy, but that's just the start. BYOD policies must address acceptable use, enforcement and privacy.
Posted: 26 Mar 2015 | Published: 26 Mar 2015


Five Questions to Ask Your SaaS Provider Before Putting Sensitive Data in the Cloud
sponsored by SailPoint Technologies
WHITE PAPER: Identity governance helps professionals manage and control user access to sensitive applications and data. Access this white paper to find pertinent information for desicion-makers who are in the proces of considering the deployment of SaaS applications.
Posted: 20 Mar 2015 | Published: 29 Mar 2013

SailPoint Technologies

HR & IT in Collaboration
sponsored by Workday
WHITE PAPER: In this exclusive resource, discover HR technologies are changing and strategies for incorporating them into your organization.
Posted: 26 Mar 2015 | Published: 26 Mar 2015

Workday
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement