IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

PDD 63

RSS Feed    Add to Google    Add to My Yahoo!
PDD 63 Reports
 
Reaping the Benefits of Strong, Smarter User Authentication
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses what the changes in enterprise IT mean for implementing smart authentication practices.
Posted: 16 Jul 2015 | Published: 31 Oct 2013

Symantec Corporation

NetScaler and XenMobile Solution for Enterprise Mobility Deployment Guide
sponsored by Citrix
PRODUCT LITERATURE: This deployment guide carefully explains how you should go about your setting up your NetScaler and ZenMobile to optimize enterprise mobility in your organization.
Posted: 20 Jul 2015 | Published: 20 Jul 2015

Citrix

Top tips for better ITSM
sponsored by ServiceNow
EGUIDE: This exclusive e-guide outlines best practices to help build a better IT service model. Download now to learn how you can put your IT organization in a better position to compete with outside IT services companies.
Posted: 28 Jul 2015 | Published: 28 Jul 2015

ServiceNow

How Unified Workload Automation Enables IT Staff Productivity
sponsored by CA Technologies.
WHITE PAPER: This white paper explores a unified workload automation system that offers visibility, enables efficiency, and boosts productivity.
Posted: 14 Jul 2015 | Published: 31 Dec 2014

CA Technologies.

Authentication for Today's Threat Landscape
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses the capabilities of an authentication system that would be effective in today's threat landscape.
Posted: 17 Jul 2015 | Published: 31 Dec 2011

Symantec Corporation

Using Open Source Intelligence to Enhance Physical Security
sponsored by Cyveillance, Inc.
WEBCAST: This webinar discusses various types of open source threat data available, and how security professionals can use it to more effectively protect organizations and executives.
Posted: 16 Jul 2015 | Premiered: Jun 18, 2015

Cyveillance, Inc.

How Workload Automation is Evolving to Support Today's Trends
sponsored by CA Technologies.
WHITE PAPER: This white paper explores a workload automation portfolio that is evolving to support the needs of emerging workloads and today's online digital business strategies.
Posted: 14 Jul 2015 | Published: 14 Jul 2015

CA Technologies.

9 Steps to a Secure Printer
sponsored by Nuance
WHITE PAPER: This white paper discusses just how much danger your printer poses to your organization and gives you nine tips for mitigating that danger.
Posted: 21 Jul 2015 | Published: 31 May 2015

Nuance

Mobile Malware: The Hackers' New Playground
sponsored by IBM
WHITE PAPER: This comprehensive white paper outlines how to prevent security breaches in mobile apps. Read on to learn about the intricacies of mobile malware, mobile threat management, how iOS is still vulnerable to attacks, and much more.
Posted: 13 Jul 2015 | Published: 13 Jul 2015

IBM

Secure Content Collaboration on the Go
sponsored by IBM
WHITE PAPER: This white paper discusses the dangers of mobile content sharing and gives advice on what you can do to make it secure.
Posted: 15 Jul 2015 | Published: 15 Jul 2015

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement