Software  >   Systems Software  >   Security Software  >   Data Encryption Software  >   Public Key Encryption Software  >  

PGP

RSS Feed    Add to Google    Add to My Yahoo!
PGP Reports
 
Six Steps to SIEM Success
sponsored by AlienVault
WEBCAST: Discover 6 steps to utilize any SIEM solution and maximize your network's security. Learn how to break down the evaluation, deployment, and management of your SIEM.
Posted: 26 Jul 2016 | Premiered: Jul 26, 2016

AlienVault

Cybersecurity Predictions for 2016
sponsored by Global Knowledge
WHITE PAPER: Discover 10 cybersecurity predictions for 2016. Read on to prepare your enterprise for: digital extortion becoming fully automated, the inevitability of digital payment systems becoming compromised, wearables leading to data leaks, and more.
Posted: 16 Jun 2016 | Published: 16 Jun 2016

Global Knowledge

Negotiate with SAP, IBM, Microsoft and Oracle to Make the Most from Your IT Budget
sponsored by Gartner
EGUIDE: When it comes to contract negotiations, CIOs hold more sway than they think. Next time you negotiate with suppliers, ensure you get a better price from likes of SAP, IBM, Microsoft and Oracle. Access this expert guide to discover vendor negotiation tips for midmarket CIOs working with these vendors from Forrester Senior Analyst Duncan Jones.
Posted: 29 Jun 2016 | Published: 28 Jun 2016

Gartner

CW@50 - What was making the news in May
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: The National Museum of Computing has trawled the Computer Weekly archives for another selection of articles highlighting significant articles published in the month of May over the past five decades.
Posted: 10 May 2016 | Published: 09 May 2016

ComputerWeekly.com

Clusters Your Way: 8 Ways to Make Clusters Easy to Use and Easy to Own
sponsored by SIOS Technology Corp
WHITE PAPER: This white paper explores the new virtual and cloud options that can save IT managers time and money, as well as explaining how SAN-less clusters can protect your business-critical applications.
Posted: 29 Jun 2016 | Published: 18 Apr 2014

SIOS Technology Corp

DELIVER BETTER ORACLE APPLICATION PERFORMANCE
sponsored by Pure Storage
WHITE PAPER: Now, you don't have to wait for an app to be fully deployed to find out how your code will perform. Learn how you can put your applications through the paces by testing at scale, deploying production data quickly and inexpensively in your test environment.
Posted: 13 Jun 2016 | Published: 13 Jun 2016

Pure Storage

Enterprise cloud applications – can we trust them?
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series examines the more significant risks involved when an enterprise uses line-of-business applications hosted in the cloud.
Posted: 27 Jul 2016 | Published: 27 Jul 2016

ComputerWeekly.com

Encrypted Traffic Management
sponsored by Blue Coat Systems
WHITE PAPER: Learn not only solid fundamentals of how SSL/TSL encryption works, but also why so much malicious activity is sneaking past other conventional security measures and what you can do to stop it. Hint: encrypted traffic management solutions now bolster data privacy, compatibility, performance, scalability AND cost effectiveness.
Posted: 25 Jul 2016 | Published: 31 Jan 2016

Blue Coat Systems

Samsung Research America Secures Intellectual Property from Advanced Mobile Threats
sponsored by Check Point Software Technologies Ltd.
CASE STUDY: Discover how Samsung Research America handled the security of their mobile devices with a single, sweeping threat prevention strategy. Discover how they gained an in-depth threat defense, peace of mind, and more.
Posted: 11 Jul 2016 | Published: 11 Apr 2016

Check Point Software Technologies Ltd.

Secure Browser for Mobile Enterprise Devices
sponsored by IBM
WHITE PAPER: Discover how to address and reduce vulnerabilities from risky websites with a mobile browser solution. Read on to find how it uses a centralized management platform to deploy protected access to intranet and internet sites, controls the mobile internet experience though granular security policies, prevents attacks and malware, and more.
Posted: 17 Jun 2016 | Published: 17 Jun 2016

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
PGP White Papers | PGP Multimedia | PGP IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement