IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

Protecting America's Critical Infrastructures

RSS Feed    Add to Google    Add to My Yahoo!
Protecting America's Critical InfrastructuresReports
 
Computer Weekly – 9 December 2014: The most influential people in UK IT
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we unveil the 50 most influential people in UK IT for 2014, and interview the winner of our UKtech50 list, Unilever's global CIO, Jane Moran. We examine how Cisco is responding to software-defined networking. And we hear from IT chiefs successfully implementing identity and access management. Read the issue now.
Posted: 05 Dec 2014 | Published: 05 Dec 2014

ComputerWeekly.com

A powerful defense against denial of service attacks
sponsored by Citrix
WHITE PAPER: As cybercrime continues to grow, denial of service (DoS) attacks have become far more prevalent. This guide explores the current landscape of DoS attacks and what you can do to protect your network.
Posted: 16 Dec 2014 | Published: 27 Dec 2013

Citrix

Securing the Path to Consolidation in Today's Data Center
sponsored by SafeNet, Inc.
WHITE PAPER: This white paper explores how multi-layer encryption and centralized key management can enable enterprises to accelerate cloud, virtualization, and data center consolidation initiatives, while retaining the controls they need to protect sensitive data and adhere to internal and external compliance regulations.
Posted: 11 Dec 2014 | Published: 11 Dec 2014

SafeNet, Inc.

How Would Self-Reset Password Solutions Impact Enterprises Around the World?
sponsored by Tools4ever
WHITE PAPER: This white paper explores the results of a survey on self-reset password solutions and the impact that they could have on IT helpdesks.
Posted: 08 Dec 2014 | Published: 08 Dec 2014


Unlock New Pathways to Network Security Architecture
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Dave Shackleford offers advice on how your organization can make the right network security architecture decisions when it comes to network isolation and segmentation to create a multi-layer attack surface.
Posted: 12 Dec 2014 | Published: 12 Dec 2014

Hewlett-Packard Company

Protect Your Organization by Thinking Like an Attacker
sponsored by Core Security Technologies
VIDEO: Download this exclusive video now to learn about a solution that helps you think like an attacker while consolidating, prioritizing, and normalizing threats.
Posted: 10 Dec 2014 | Premiered: 10 Dec 2014

Core Security Technologies

Enriching online and social media interaction with a scalable cloud environment
sponsored by IBM
WHITE PAPER: This case study examines how Wimbledon was able to deploy new cloud software to support a highly agile and scalable cloud environment, rapidly provisioning and deprovisioning servers as needed. Read on to learn how this solution accelerates service deployment by 50% and delivers the agility necessary to respond to massive changes in demand.
Posted: 08 Dec 2014 | Published: 31 Jul 2014

IBM

Orchestration Simplifies and Streamlines Virtual and Cloud Data Center Management
sponsored by IBM
WHITE PAPER: Access this white paper to examine how advanced automation and orchestration solutions are helping IT data center operations teams effectively manage increasingly complex enterprise computing environments. It also looks at a new solution that is addressing emerging IT management priorities.
Posted: 12 Dec 2014 | Published: 31 Jan 2013

IBM

Exclusive Security Webcast: Targeted Attacks
sponsored by Vectra Networks
WEBCAST: This exclusive webcast takes an in-depth look at targeted attacks on the network and how to defend against them. View now to learn more.
Posted: 10 Dec 2014 | Premiered: Dec 10, 2014

Vectra Networks

UKtech50: The most influential people in UK IT 2014 revealed
sponsored by ComputerWeekly.com
EGUIDE: UKtech50 returned for its 5th year, showcasing the most influential people in UK IT and the rising stars in the industry. Read on to find out the top 50...
Posted: 10 Dec 2014 | Published: 10 Dec 2014

ComputerWeekly.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement