IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

PDD 63

RSS Feed    Add to Google    Add to My Yahoo!
PDD 63Reports
 
10 Steps for Implementing Strong Authentication in your Organization
sponsored by Gemalto
WHITE PAPER: This important whitepaper covers 10 crucial steps you must take to implement strong authentication in your organization.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

Gemalto

A Guide to Cloud Services for Production Workloads
sponsored by Peak 10
WHITE PAPER: This guide explores 5 considerations to help you to find a cloud environment suitable for complex enterprise applications, and to find a cloud services provider capable of delivering the requisite cloud infrastructure.
Posted: 21 Nov 2014 | Published: 21 Nov 2014

Peak 10

How To Achieve Security in a World Where Developers Rule
sponsored by Rackspace
VIDEO: This webcast features Rackspace Cloud Solutions Architect Jaret Chiles, and Senior Product Security Engineer Matt Tesauro, who explain how to secure your applications in the cloud.
Posted: 13 Nov 2014 | Premiered: 09 Jun 2014

Rackspace

Enable software-defined security for software-defined infrastructure
sponsored by Intel Corporation
DATA SHEET: Check out this data sheet to explore a software-defined security solution that is designed to accompany a software-defined infrastructure.
Posted: 24 Nov 2014 | Published: 24 Nov 2014

Intel Corporation

Close the Gaps Left By Traditional Vulnerability Management Through Continuous Monitoring
sponsored by Tenable Network Security
WHITE PAPER: This white paper explores the results of a recent Forrester study of 180 security leaders on the current state and effectiveness of vulnerability management.
Posted: 12 Nov 2014 | Published: 28 Feb 2014

Tenable Network Security

How to Enable Secure Mobility & Improve Efficiency
sponsored by Citrix
WHITE PAPER: This exclusive white paper takes an in-depth look at how mobility is changing the way organizations do business. Read on to learn more.
Posted: 17 Nov 2014 | Published: 17 Nov 2014

Citrix

PCI DSS Cloud Compliance Requirements
sponsored by SkyHigh
WHITE PAPER: This exclusive whitepaper serves as a cheat sheet to the ins-and-outs of the payment card industry data security standard.
Posted: 17 Nov 2014 | Published: 17 Nov 2014

SkyHigh

2014 Cost of Cyber Crime Study
sponsored by Hewlett-Packard Company
WHITE PAPER: This exclusive whitepaper covers the results of a survey that analyzed the cost of cyber-crime.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

Hewlett-Packard Company

24/7 Visibility into Advanced Malware on Networks and Endpoints
sponsored by Tenable Network Security
WHITE PAPER: This white paper argues that containing the massive-scale security breaches that many high-profile organizations are experiencing requires a holistic approach that addresses vulnerabilities and threats at the network and system levels, and leverages threat intelligence to accurately identify attacks in progress.
Posted: 12 Nov 2014 | Published: 24 Oct 2014

Tenable Network Security

The Internet of Things: A CISO and Network Security Perspective
sponsored by Cisco
WHITE PAPER: This exclusive whitepaper dives head first into the realities of the Internet of Things, including the security considerations that go along with it.
Posted: 24 Nov 2014 | Published: 14 Oct 2014

Cisco
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement