IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

PDD 63

RSS Feed    Add to Google    Add to My Yahoo!
PDD 63 Reports
 
Interview: One Trust Leader reveals how Security breeds Innovation
sponsored by Unisys
WHITE PAPER: The Chief Trust Officer at Unisys promotes cyber-security, physical security and governance in both online and offline communities. Discover ways his work combines security and innovation, and what this means for your organization.
Posted: 25 Aug 2016 | Published: 29 Jul 2016

Unisys

NetApp Delivers Secure, Seamless Virtualized Desktops and Applications for Nearly 10,000 Users in 12 Days
sponsored by VMware
CASE STUDY: Faced with wanting to increase employee productivity and flexibility while protecting intellectual property and centrally managing desktops and apps, NetApp, a leader in the data storage industry, deployed a virtual desktop environment. Find out the benefits they realized from this approach.
Posted: 19 Aug 2016 | Published: 31 Dec 2015

VMware

Databerg Report Executive Summary: Identify the Value, Risk, and Cost of your Data
sponsored by Veritas
ANALYST REPORT: Explore three attitudes at the strategic, organizational, and individual levels which are driving up operational costs and adding unacceptable levels of risk to modern businesses and discover practical steps to take action and regain control of the databerg.
Posted: 26 Aug 2016 | Published: 26 Aug 2016

Veritas

POWER8: A Processor to Challenge Intel's Dominance
sponsored by IBM
ANALYST REPORT: Outlined in this paper are 6 considerations for IT organizations making a case for transition to the POWER8 processor, designed to be installed in file and print servers for key, high performing workloads. Read on to take advantage of POWER8 to fuel high value analytics and IT's cloud expansion.
Posted: 26 Aug 2016 | Published: 31 Dec 2014

IBM

Unisys' Tom Patterson: 3 Key Steps in Securing Critical Infrastructure
sponsored by Unisys
WHITE PAPER: In this video, Tom Patterson, VP and GM of Unysis Global Security Solutions, discusses the need to protect critical infrastructure systems. Uncover three key tips to get started.
Posted: 26 Aug 2016 | Published: 08 Jan 2016

Unisys

The Current Landscape of Advanced Persistent Threats
sponsored by Proofpoint, Inc.
EGUIDE: In this e-guide, discover not only how to talk about Advanced Persistent Threats within your enterprise, but also uncover what the current landscape looks like in regards to these ever-evolving malicious attacks.
Posted: 24 Aug 2016 | Published: 23 Aug 2016

Proofpoint, Inc.

Extend Your Access Management Regime To Office 365
sponsored by IBM
WHITE PAPER: See how thinking smartly about identity and access management deployment can make all the difference when it comes to securing your enterprise's data on the cloud. Learn common mistakes made when attempting to utilize security measures on Office 365, synchronizing data with its directories, and more.
Posted: 25 Aug 2016 | Published: 25 Aug 2016

IBM

What to Look for in a Security Partner
sponsored by Arbor Networks
WEBCAST: Learn the qualifications that a network security and management partner need to have. Uncover why DDoS is such a major threat, and how to reduce the risk these types of attacks pose to enterprise networks.
Posted: 18 Aug 2016 | Premiered: Mar 28, 2016

Arbor Networks

How to Pass a Security Audit in One Day
sponsored by Above Security
WEBCAST: This webinar helps you understand how an effective, control-based security program can help you address audit requirements. Learn how to implement these controls and how to demonstrate their effectiveness (and not just on paper).
Posted: 23 Aug 2016 | Premiered: Aug 4, 2016

Above Security

Powering the High-Performance Cloud
sponsored by IBM
WHITE PAPER: CSPs must provide reliable storage with consistent performance while reducing operational costs but increasing customer demands can make this a formidable task. Access this white paper to learn about one all-flash storage solution CSPs are using to meet these challenges.
Posted: 16 Aug 2016 | Published: 30 Jun 2016

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement