Software  >   Systems Software  >   Security Software  >   Data Encryption Software  >   Public Key Encryption Software  >  


RSS Feed    Add to Google    Add to My Yahoo!
PGP Reports
The Merry-Go-Round of Security Testing
sponsored by
EBOOK: In this Insider Edition of Information Security, InfoSec pros will learn about the pros and cons of RASP, the runtime application self-protection method for secure software delivery.
Posted: 08 Apr 2015 | Published: 08 Apr 2015

Special Report: Which SIEM Platform is Best for You?
sponsored by IBM
WHITE PAPER: This Gartner report examines thirteen of the leading SIEM vendors, giving a detailed analysis of each one's strengths and weaknesses.
Posted: 31 Aug 2015 | Published: 20 Jul 2015


Enterprise Development in the Cloud: Top Benefits, Drivers, and Concerns
sponsored by Red Hat
WHITE PAPER: According to a survey of 408 enterprise IT software development professionals, enterprises using the cloud see improvements in time to market as well as higher productivity. Read this white paper for key findings from this survey regarding enterprise development in the cloud.
Posted: 21 Apr 2015 | Published: 17 Jun 2014

Red Hat

Dell XC Web-Scale Converged Appliance for Citrix® XenDesktop®
sponsored by Dell, Inc.
WHITE PAPER: This document addresses the architecture design, configuration, and implementation considerations for the key components required to deliver non-persistent FlexCast virtual desktops via Citrix XenDesktop and XenApp on Microsoft Windows Server Hyper-V 2012 R2 or VMware vSphere 5.5.
Posted: 27 Aug 2015 | Published: 31 Mar 2015

Dell, Inc.

DLP Management and Monitoring
sponsored by IntraLinks, Inc
EGUIDE: This expert guide contains tips for adopting the most effective DLP management and monitoring system possible.
Posted: 06 Jul 2015 | Published: 06 Jul 2015

IntraLinks, Inc

Securing the Supply Chain: 3 Considerations Developers Should Know
sponsored by Rogue Wave Software
WHITE PAPER: Access this white paper to learn 3 strategies for implementing and ensuring secure software development. Also, learn how the roles of automobile manufacturers have shifted to include software security control.
Posted: 05 Aug 2015 | Published: 31 Dec 2014

Rogue Wave Software

When IT Service Management isn’t What it Could Be: The Importance of Kaizen in ITSM
sponsored by Unisys
WHITE PAPER: This whitepaper focuses on how you can combine ITSM best practices with a Kaizen approach to eliminate IT inefficiencies and excess costs while modernising your overall service management framework.
Posted: 06 May 2015 | Published: 01 Oct 2014


A Big Data Approach to Enterprise Security
sponsored by Splunk
WHITE PAPER: This white paper discusses how big data can help you obtain a more advanced level of threat intelligence that can detect new forms of malware.
Posted: 17 Aug 2015 | Published: 31 Dec 2012


Lenovo Flex System eBrochure
sponsored by Lenovo & Intel Xeon
WHITE PAPER: The following eBrochure introduces the Lenovo® Flex System™ — powered by Intel® Xeon® processors — and demonstrates how it perfectly melds blade system hardware with virtualized and software defined infrastructure.
Posted: 15 Sep 2015 | Published: 15 Sep 2015

Lenovo & Intel Xeon

A Zero-Day Agnostic Approach to Defending Against Advanced Threats
sponsored by Digital Guardian
WHITE PAPER: This webinar transcript discusses how information security products have changed and why these changes are essential for tackling advanced threats.
Posted: 14 Aug 2015 | Published: 14 Aug 2015

Digital Guardian
Visit - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
PGP White Papers | PGP Multimedia | PGP IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement