IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

Protecting America's Critical Infrastructures

RSS Feed    Add to Google    Add to My Yahoo!
Protecting America's Critical Infrastructures Reports
 
Ensuring Security and Compliance in Today's Threat Landscape
sponsored by Splunk
VIDEO: In this video, an expert in security technology discusses what makes a piece of security software effective in today's threat landscape.
Posted: 20 Aug 2015 | Premiered: 19 Jan 2014

Splunk

Antivirus and Antimalware Solutions for VARs
sponsored by Webroot
WHITE PAPER: This white paper discusses the challenges VARs face when providing endpoint security and suggests offering cloud-based endpoint security as an alternative.
Posted: 27 Aug 2015 | Published: 27 Aug 2015

Webroot

Economic Benefits of Private Cloud
sponsored by Dell and Microsoft
DATA SHEET: Access this brief datasheet to examine the economic benefits of the private cloud.
Posted: 26 Aug 2015 | Published: 26 Aug 2015

Dell and Microsoft

Top 5 Cloud Data Protection Challenges. Solved.
sponsored by Commvault
WHITE PAPER: This white paper serves as guide with which you can realize the full potential of your next cloud project. Read on to see how the following 5 challenges may impact your cloud integration strategy.
Posted: 24 Aug 2015 | Published: 24 Aug 2015

Commvault

Case Study: A SIEM Effective Enough for a Government Contractor
sponsored by Splunk
WHITE PAPER: This white paper describes how a technology integration business found a SEIM solution strong enough to protect the sensitive government information it manages.
Posted: 24 Aug 2015 | Published: 24 Aug 2015

Splunk

Strong Authentication: Securing Identities and Enabling Productivity
sponsored by SafeNet, Inc.
WHITE PAPER: Access this informative white paper to learn how strong authentication methods like USB tokens and smart cards are helping organizations to stay ahead of the security curve.
Posted: 20 Aug 2015 | Published: 20 Aug 2015

SafeNet, Inc.

Achieve Immediate Value from your ITSM Investment, Without the Hassle
sponsored by Unisys
WHITE PAPER: This white paper offers the information you need to install, manage, maintain and optimize your ITSM application management investment. Learn how to achieve the lowest possible total cost of ownership and the highest level of availability.
Posted: 26 Aug 2015 | Published: 30 Jun 2015

Unisys

How One Ukrainian Bank Secures High-Risk Online Transactions
sponsored by SafeNet, Inc.
CASE STUDY: This case study reveals the solution that enabled Prominvestbank, one of the largest banks in Ukraine, to securely authenticate their online banking customers and accept transaction signatures online. Read on to learn about the benefits that these security services could bring to your organization.
Posted: 19 Aug 2015 | Published: 19 Aug 2015

SafeNet, Inc.

Five Top Use Cases for Desktop as a Service
sponsored by VMware
WHITE PAPER: Access this white paper to discover five top use cases where cloud-hosted virtual desktops are making an immediate impact and learn how they can benefit your organization.
Posted: 27 Aug 2015 | Published: 27 Aug 2015

VMware

Magic Quadrant for Mobile Application Development Platforms
sponsored by Mendix
RESEARCH CONTENT: The mobile app development platform market continues to grow, evolve and mature in response to escalating customer requirements. This resource helps identify the major vendors to help enable enterprise IT developers, architects and mobile development leaders to select the right partners.
Posted: 26 Aug 2015 | Published: 26 Aug 2015

Mendix
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement