IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

Protecting America's Critical Infrastructures

RSS Feed    Add to Google    Add to My Yahoo!
Protecting America's Critical Infrastructures Reports
 
Reduce Open Source Security Risk: Strategies, Tactics and Tools
sponsored by Rogue Wave Software
WHITE PAPER: Discover the tools and services you need to create an open source software (OSS) management strategy for your organization. Implementing an OSS strategy may take time, but when you consider the risks involved with unprotected OSS, it's easy to see the value it brings.
Posted: 22 Nov 2016 | Published: 31 Oct 2016

Rogue Wave Software

Corridor Warrior: How IT Empowers the Future-Ready Workforce
sponsored by Dell, Inc. & Intel®
WHITE PAPER: Is your IT meeting its user requirements? Learn how to implement an end-to-end IT management strategy that encapsulates the needs of the modern, mobile, dynamic workforce. Read on to assess your hardware and software, and ensure your IT supports productivity.
Posted: 05 Dec 2016 | Published: 05 Dec 2016

Dell, Inc. & Intel®

Building the Business Case for Strong Authentication
sponsored by HID
WHITE PAPER: With more than 1 billion mobile banking users last year, mobile banking is more vulnerable than ever. Learn the evolution of strong authentication in online banking and what factors you should look for to balance security and convenience.
Posted: 29 Nov 2016 | Published: 07 Oct 2016

HID

IaaS and Storage-as-a-Service: Delivering Powerful Storage Infrastructure
sponsored by Hewlett-Packard Enterprise
CASE STUDY: Explore how the Australian Centre for Advanced Computing and Klikon Solutions leveraged IaaS and storage-as-a-service to overcome older disparate platforms, shrinking their storage footprint and guaranteeing better uptime. Discover how they resolved issues with disaster recovery, planned incremental updates, freed up key IT resources, and more.
Posted: 06 Dec 2016 | Published: 31 Aug 2016

Hewlett-Packard Enterprise

Solving the DLP Puzzle: Learnings for a Successful Deployment
sponsored by Intel Security
PODCAST: What's steps do you take to implement a mature DLP solution? What are some of the best practices for long term DLP success? And how are data breaches evolving? In this podcast, a security industry veteran answers these questions and more so you can solve the DLP puzzle. Ensure successful DLP deployment now.
Posted: 22 Nov 2016 | Premiered: Sep 8, 2016

Intel Security

Big Data: Understanding its Scope and Importance
sponsored by LogicNow
WHITE PAPER: This white paper explores the concept of big data and how to tackle some of its tougher challenges for not only your own data but your clients' too. Discover how to leverage a big data toolset in order to optimize your ability to manage data and extract gainful insights using critical business metrics.
Posted: 06 Dec 2016 | Published: 06 Dec 2016

LogicNow

Top 5 Reasons Public Sector Looks to the Cloud
sponsored by Accenture
WHITE PAPER: As businesses continue to deal with digital transformation, public sector organizations have more requirements to deal with than those in the private sector. Discover the 5 key areas that make cloud the best option for public sector digital transformations.
Posted: 21 Nov 2016 | Published: 21 Nov 2016

Accenture

A CIO’s Guide for Reducing Security Anxiety
sponsored by BitSight
WHITE PAPER: Discover how to get the full picture of your organization's security performance compared to your peers. Learn why benchmarking is so critical for today's CIOs and how to clearly communicate benchmarking data to your board.
Posted: 28 Nov 2016 | Published: 31 Oct 2016

BitSight

Eat Your Own Dog Food: Migration Shores Up Core Competencies
sponsored by Hewlett-Packard Enterprise
RESOURCE: Following its move to Office 365, HPE Services applies valuable lessons learned to client migration projects.
Posted: 06 Dec 2016 | Published: 06 Dec 2016

TOPICS:  IT Management
Hewlett-Packard Enterprise

Reducing Attack Surface: SANS' Survey on Continuous Monitoring Programs
sponsored by IBM
RESOURCE: Discover how continuous monitoring (CM) is slowly, but surely improving security practices and shifting the focus of today's security teams. Because CM programs do not necessarily call for new resources, learn what you can do right now to improve your existing CM program or establish a new one.
Posted: 05 Dec 2016 | Published: 30 Nov 2016

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement