IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

Protecting America's Critical Infrastructures

RSS Feed    Add to Google    Add to My Yahoo!
Protecting America's Critical Infrastructures Reports
 
The Cloud is Only as Secure as its Provider
sponsored by QTS
WHITE PAPER: In this white paper, discover the top concerns for CIOs surrounding cloud computing, and explore the challenges many businesses face when moving to cloud.
Posted: 29 Mar 2015 | Published: 29 Mar 2015

QTS

The Enterprise Mobile Security Technology Buyer's Guide
sponsored by Dropbox for Business
WHITE PAPER: In this research report, Forrester Research, Inc., defines the use cases, business value, and outlook for the 14 technologies at the heart of mobile security.
Posted: 30 Mar 2015 | Published: 13 Dec 2013

Dropbox for Business

Top 5 IT security trends to watch in 2015
sponsored by Dimension Data
WHITE PAPER: Download this brief white paper to discover the five major changes to expect in 2015 and what these changes could mean for you.
Posted: 23 Mar 2015 | Published: 30 Nov 2014

Dimension Data

Focus on learning, not technology
sponsored by Dell, Inc.
CASE STUDY: Access this case study to find out how one school district opted for a virtualized desktop PC environment in the classrooms and take-home laptops for freshmen. Learn how implementing desktop virtualization via thin clients and a private cloud enabled them to ease IT data center management while optimizing access to learning resources.
Posted: 23 Mar 2015 | Published: 29 Nov 2013

Dell, Inc.

Distilling Alert Noise to Find Real Problems
sponsored by Prelert
WHITE PAPER: Read this brief article to discover how anomaly detection programs can lower your rates of false positives and make security management much more efficient.
Posted: 24 Mar 2015 | Published: 04 Mar 2015

Prelert

Best Practices for Incident Detection and Response
sponsored by SurfWatch Labs
WEBCAST: This webcast teaches you how to get the most from your threat intelligence by presenting the best practices for incident detection and response.
Posted: 30 Mar 2015 | Premiered: Feb 20, 2015

SurfWatch Labs

How to Ensure Your IP Address Management is Working Properly
sponsored by Efficientip
WHITE PAPER: Access this white paper for several guidelines designed to make your network's IP addressing environment as manageable, flexible, secure, reliable and responsive as possible.
Posted: 23 Mar 2015 | Published: 31 Dec 2014

Efficientip

Empower a Mobile Workforce with Secure App Delivery
sponsored by Citrix
WEBCAST: In this webcast, discover several top use cases for application virtualization, complete with real world customer examples. Additionally, learn about common business challenges facing the industry today.
Posted: 27 Mar 2015 | Premiered: Mar 27, 2015

Citrix

Your Guide to: Tackling the Top 3 IT Service Management Challenges
sponsored by ServiceNow
WHITE PAPER: There are three main areas that can quickly become headaches in an IT organization: request management, asset tracking, and reporting. Read this white paper to learn how to reach IT service prominence in these areas by rethinking your approach to all of them.
Posted: 30 Mar 2015 | Published: 30 Mar 2015

ServiceNow

A Comprehensive Security Intelligence Platform
sponsored by IBM
WHITE PAPER: Download this paper to discover the pros and cons of an SIEM platform and to determine if this is the one that meets your needs.
Posted: 23 Mar 2015 | Published: 30 Sep 2014

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement