IT Management  >   Systems Operations  >   Security  >  

Perimeter Security

RSS Feed    Add to Google    Add to My Yahoo!
Perimeter Security Reports
 
Workplace Mobility, Consumerization, and Cloud Drive End-user Computing Transformation
sponsored by VMware
WHITE PAPER: The presence of mobility in the workplace is going to continue its steady rise. We need to ensure that this is remains a benefit rather than a hinderance. Read on to learn about how end-users are the driving force in an ongoing mobility transformation and what this means for the future of mobility in the workplace.
Posted: 20 May 2016 | Published: 29 Jan 2016

VMware

Gartner Magic Quadrant for Mobile Data Protection Solutions
sponsored by Intel Security
ANALYST REPORT: Access now to learn the pros and cons of mobile security vendors as Gartner's Magic Quadrant for Mobile Data Protection Solutions dissects the current MDP vendor landscape so you can best understand which company can most effectively help you out if you're looking to bolster your mobile data protection initiatives.
Posted: 12 May 2016 | Published: 01 Oct 2015

Intel Security

How to Create a Culture of Compliance in IT
sponsored by Verizon
WHITE PAPER: Navigating compliance issues is no easy task – and the cost of noncompliance is high. Learn how to create a culture of compliance at your enterprise, and get tips on balancing your mobile strategy with compliance, protecting customer data, and more.
Posted: 16 May 2016 | Published: 31 Dec 2015

Verizon

Micro-Segmentation Builds Security Into Your Data Center’s DNA
sponsored by VMware
WHITE PAPER: Micro-segmentation is an adaptive technology that narrows your data center security's focus to overcome threats faster than ever. Access this white paper to learn more about the security and protection micro-segmentation will provide your data center.
Posted: 06 May 2016 | Published: 27 Apr 2016

VMware

Five Critical Rules for Firewall Management: Lessons from the Field
sponsored by Dell SecureWorks
WHITE PAPER: This white paper will teach you five things to consider when managing your firewall, and will present you with real life examples of how these five things have helped other organizations improve their firewall management.
Posted: 11 May 2016 | Published: 08 Jun 2011

Dell SecureWorks

Mobile is the New Playground for Thieves
sponsored by IBM MaaS360
WHITE PAPER: You need to modernize your security with a robust way to proactively detect, analyze and remediate new mobile threats. Learn the true cost of a data breach and how to best implement your own BYOD policy.
Posted: 18 May 2016 | Published: 31 Dec 2015

IBM MaaS360

The MSP’s Complete Guide to Cyber Security
sponsored by Intronis
WHITE PAPER: Don't put off security talks until after it's too late. This white paper gathers stats and facts about cybersecurity in regards to SMBs. Learn about common cybersecurity mistakes SMBs constantly make and tips on how to approach cloud security.
Posted: 11 May 2016 | Published: 01 Apr 2016

Intronis

Managed IT Services Can Help Small Businesses Boost Productivity
sponsored by CDW
ANALYST BRIEF: IT workers are spending their days performing routine tasks. What if they were able to focus their efforts on solving business problems instead? Read on to learn how managed IT services will free your IT team to work more strategically and five keys to look for when choosing a service.
Posted: 13 May 2016 | Published: 19 May 2016

CDW

Beyond CLM and MDM: Why your Organization needs Unified Endpoint Management (UEM)
sponsored by Matrix42
WHITE PAPER: Unified endpoint management (UEM) combines mobile device management with client lifecycle management to create a new central management environment. Read on to learn more about how UEM works and its benefits for businesses, IT and users.
Posted: 19 May 2016 | Published: 30 Dec 2015

Matrix42

Re-Architecting the Enterprise: The Time is Now
sponsored by Juniper Networks, Inc.
WHITE PAPER: Cloud. Mobility. Applications that eat up bandwidth. Advanced security threats. None of these are going away and you need to re-design your enterprise network and security infrastructure with them in mind. Read on to learn more about why you need to do this now and goals to keep in mind when doing so.
Posted: 09 May 2016 | Published: 31 Dec 2015

Juniper Networks, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement