IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

PDD 63

RSS Feed    Add to Google    Add to My Yahoo!
PDD 63Reports
 
Take Authentication Beyond Passwords with Secure Remote Access
sponsored by HID
VIDEO: This short video describes how you can take authentication beyond passwords with HID Global's ActivID® authentication solutions, which provide secure remote access supporting the latest tablet and mobile devices.
Posted: 20 Oct 2014 | Premiered: 20 Oct 2014

HID

In a World of Cloud and Mobility, Productivity Relies on Application Performance
sponsored by F5 Networks
WHITE PAPER: This white paper examines the advances in technology that are turning application performance into a need for IT departments and how there are beneficial costs associated with better application performance. Learn about how a leading product is helping IT with application optimization.
Posted: 23 Oct 2014 | Published: 30 Sep 2014

F5 Networks

Best Practices for Selecting a Colocation Provider
sponsored by Iron Mountain
WHITE PAPER: This e-guide delves into the finer points of choosing a co-location center that works for your requirements.
Posted: 24 Oct 2014 | Published: 01 Oct 2014

Iron Mountain

The Anatomy of a Top-Down Approach
sponsored by Pangea Systems
WHITE PAPER: This white paper examines how you can take a new approach to service management in order to improve the implementation of critical services while also improving your ability to stay up to date with incidents before they become an issue. Read on to learn more.
Posted: 27 Oct 2014 | Published: 27 Oct 2014

Pangea Systems

Case Study - NVIDIA Enables True SAP Security
sponsored by Onapsis
WHITE PAPER: This whitepaper explains how NVIDIA, a well-known GPU and SOC technology provider, was able to gain the capabilities needed to effectively manage threats to its SAP systems, perform pre and post audit scans of its whole application environment, and conduct basic scans on a regular basis with continuous monitoring and detection of vulnerabilities.
Posted: 22 Oct 2014 | Published: 22 Oct 2014


OpenStack: The Platform of Choice for Cloud
sponsored by Red Hat
WHITE PAPER: This infographic is the outcome of an IDG Connect survey of 200 US enterprise decision makers that includes adoption plans for OpenStack, the platform of choice for private cloud development and deployment.
Posted: 17 Oct 2014 | Published: 06 Jun 2014

Red Hat

DDoS Mitigation Best Practices for a Rapidly Changing Threat Landscape
sponsored by Verisign, Inc.
WHITE PAPER: This exclusive whitepaper explores five best practices for distributed denial of service attack mitigation.
Posted: 29 Oct 2014 | Published: 17 Oct 2012

Verisign, Inc.

BYOD and Mobile Security: The Disconnect Between Employers and Employees
sponsored by Webroot
WHITE PAPER: This white paper proposes that there is a disconnect between how employees use mobile security and how organizations implement BYOD policies, and presents the results of a recent study commissioned by Webroot that examines these issues.
Posted: 27 Oct 2014 | Published: 31 Jul 2014

Webroot

Cisco UCS and Intel Xeon Processors: 100 World-Record Performance Results
sponsored by CISCO & INTEL® XEON® PROCESSOR
WHITE PAPER: If you are looking to get the optimal performance out of your data center processers than you should look no further than Cisco's architecture offerings, which have set performance with their first-to-market results.
Posted: 20 Oct 2014 | Published: 20 Oct 2014

CISCO & INTEL® XEON® PROCESSOR

Best Practices for Deploying Cloud
sponsored by Scalr
EGUIDE: This expert e-guide reveals why cloud industry expert David Linthicum believes clouds are more secure than traditional IT systems, as well as hybrid clouds taking over in the future.
Posted: 22 Oct 2014 | Published: 22 Oct 2014

Scalr
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement