IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

Protecting America's Critical Infrastructures

RSS Feed    Add to Google    Add to My Yahoo!
Protecting America's Critical InfrastructuresReports
 
Enabling devices and device management for your mobility/BYOD program
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Explore this in-depth resource to learn how to enable your workers to get the most out of a BYOD policy by increasing flexibility without compromising compliance. This small guide provides tips and best practices to address compliance and manage your mobile environment effectively.
Posted: 11 Jul 2014 | Published: 28 Feb 2014

Dell, Inc. and Intel®

Securing Your PKI Building Trust You Can Depend On
sponsored by Thales
WHITE PAPER: Discover several security risks of typical enterprise and government PKIs and why higher assurance solutions are vital for security purposes.
Posted: 16 Jul 2014 | Published: 01 Feb 2013

Thales

Live Demo: How to Detect a Cryptolocker Infection
sponsored by AlienVault
WEBCAST: This informative webcast explains how CryptoLocker, a type of ransomware, gains access to your computer, and how to use a Unified Security Management platform to monitor and detect these dangerous threats.
Posted: 23 Jul 2014 | Premiered: Jul 23, 2014

AlienVault

Cisco Unified Access Technology Overview: Converged Access
sponsored by Cisco India
WHITE PAPER: This white paper details one company's approach to unified access, an integrated, simplified, and intelligent network platform that streamlines the IT department's task of running a multitude of separate networks.
Posted: 21 Jul 2014 | Published: 31 Jan 2013

Cisco India

CIO’S Best Practices for Rogue IT
sponsored by LANDesk Software
EGUIDE: In this e-guide, learn how some modern CIO's are monitoring and responding to tech outside of the IT. Examine how to identify "healthy" versus "unhealthy" rogue IT as a means of mitigating risks.
Posted: 18 Jul 2014 | Published: 18 Jul 2014

LANDesk Software

Enterprise Mobility & BYOD: Four Biggest Challenges— And How to Solve Them
sponsored by FrontRange Solutions Inc.
WHITE PAPER: Discover four key challenges associated with enterprise mobility and how to solve them usingthe most effective EMM solution.
Posted: 18 Jul 2014 | Published: 18 Jul 2014

FrontRange Solutions Inc.

Five Tips to Improve a Threat and Vulnerability Management Program
sponsored by Alert Logic
EGUIDE: This expert e-guide explains how to improve your enterprise's threat and vulnerability management program in 5 simple steps.
Posted: 11 Jul 2014 | Published: 11 Jul 2014

Alert Logic

Improve the Confidence in Your Big Data with IBM InfoSphere
sponsored by IBM
WHITE PAPER: This informative white paper discusses how organizations can use information governance to improve the confidence in big data.
Posted: 17 Jul 2014 | Published: 17 Jul 2014

IBM

Memory corruption attacks
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series argues that the lack of diversity in software and operating systems has left a large number of computers vulnerable to memory program attacks.
Posted: 22 Jul 2014 | Published: 22 Jul 2014

ComputerWeekly.com

Enterprise File Synchronization and Sharing
sponsored by Accellion, Inc.
WHITE PAPER: This white paper discusses the current maturation of the enterprise file synchronization and sharing (EFFS) market, which will benefit organizations looking for solutions to support their increasingly mobile workforce and support BYOD initiatives.
Posted: 11 Jul 2014 | Published: 02 Jul 2014

Accellion, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement