IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

PDD 63

RSS Feed    Add to Google    Add to My Yahoo!
PDD 63 Reports
 
BYOD Security Strategies
sponsored by SHI International Corporation
EGUIDE: This e-guide presents expert advice on BYOD security strategies.
Posted: 26 Jun 2015 | Published: 26 Jun 2015

SHI International Corporation

NetApp Is Accelerating Your Data Protection Strategy to the Clouds
sponsored by NetApp
WHITE PAPER: This informative white paper makes it clear that improving data backup and recovery is a top priority for IT groups in organizations of all sizes.
Posted: 18 Jun 2015 | Published: 01 Jan 2015

NetApp

6 Steps for Preventing Insider Threats
sponsored by Varonis
WEBCAST: This webcast outlines six ways you can stay safe from the ever-present threat of insider attacks.
Posted: 26 Jun 2015 | Premiered: Jun 26, 2015

Varonis

Applying IT Service Management Best Practices To Mobile
sponsored by Good Technology
WHITE PAPER: Access this white paper to discover the keys to mobilizing your ITSM approach to ensure the success of your mobile business initiatives.
Posted: 18 Jun 2015 | Published: 30 Sep 2014

Good Technology

How European Enterprises Are Preparing for Cybercrime
sponsored by Hewlett-Packard Limited
WHITE PAPER: This report reveals the results of a survey assessing Europe's cybercrime readiness.
Posted: 24 Jun 2015 | Published: 24 Jun 2015

Hewlett-Packard Limited

UNC-Chapel Hill builds open development and hosting environment with Red Hat
sponsored by Red Hat
WHITE PAPER: The following case study reveals how by deploying Red Hat OpenShift Enterprise, The Middleware Services Group was able to reach their development and hosting environment goals.
Posted: 01 Jul 2015 | Published: 01 Jul 2015

Red Hat

Protect Your Web Applications from the OWASP Top 10
sponsored by IBM
WHITE PAPER: Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
Posted: 22 Jun 2015 | Published: 31 Aug 2012

IBM

Assessing Mobile Maturity and Developing a Solid IT Model
sponsored by Good Technology
RESOURCE: In this white paper, you'll discover Gartner research into the key aspects of mobile maturity. Read on and learn how you can best evaluate your position in the mobile business world and create an appropriate IT model.
Posted: 18 Jun 2015 | Published: 30 Jun 2014

Good Technology

How to decide on a converged infrastructure
sponsored by Dell, Inc. and Intel®
EGUIDE: In this expert guide, you'll discover the keys to a proper converged infrastructure comparison.
Posted: 25 Jun 2015 | Published: 03 Jun 2015

Dell, Inc. and Intel®

IT Service Optimization Maturity Assessment
sponsored by TeamQuest Corporation
RESOURCE: Access this maturity assessment and find out where your IT organization ranks on the maturity scale. Receive immediate results and tips for moving to the next level.
Posted: 25 Jun 2015 | Published: 25 Jun 2015

TeamQuest Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement