IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

Protecting America's Critical Infrastructures

RSS Feed    Add to Google    Add to My Yahoo!
Protecting America's Critical Infrastructures Reports
 
TVH Case Study on increasing Mobile Security Solutions
sponsored by MobileIron
CASE STUDY: This case study details how TVH found a trustworthy EMM solution that was able support multiple operating systems. Learn how they were able to: maximize employee productivity while containing IT costs, automatically assign individuals network permissions best-suited to their needs, allow for easy-access to third-party productivity apps, and more.
Posted: 19 Sep 2016 | Published: 19 Sep 2016

MobileIron

An Initiation into Infrastructure Automation Tools and Methods
sponsored by VMware
EGUIDE: IT infrastructure automation without proper forethought, training and support only makes a small mess bigger. This expert e-guide provides tips and examples of how to use workflow orchestration, automated alerts, configuration management tools and more to successfully automate the IT infrastructure.
Posted: 20 Sep 2016 | Published: 19 Sep 2016

VMware

IT Workload Automation (WLA): Market Providers on the Radar
sponsored by CA Technologies
WHITE PAPER: Discover a complete evaluation of one leading workload automation (WLA) portfolio provider, and in it, learn how to centrally manage a vast variety of enterprise workflows and align resources to meet real-time business demands. Additionally, assess this WLA tool along 5 critical criteria.
Posted: 23 Sep 2016 | Published: 31 Mar 2016

CA Technologies

Case study : How the French Ministry of Education strengthens front-end security
sponsored by Forcepoint
CASE STUDY: Learn how the largest employer in France, the Ministry of Education, updated its massive network to include a powerful next-gen firewall (NGFW) that could support standard central services but also decentralized campus structures and data centers.
Posted: 13 Sep 2016 | Published: 13 Sep 2016

Forcepoint

Adapting IT for Cloud Success
sponsored by VMware
EGUIDE: Enabling line organizations to undertake IT projects on their own, cloud computing is pressuring IT professionals to rethink their approach to application deployment and IT resource planning. In this eGuide, find tips on how to adapt to the cloud environment and address security and compliance risks.
Posted: 21 Sep 2016 | Published: 19 Sep 2016

VMware

Automated Malware Analysis Tools and Technology: The Security Architecture and Operations Playbook
sponsored by Palo Alto Networks
WHITE PAPER: The following report features a 36-criteria evaluation of automated malware analysis providers. Discover ways each provider measures up so you and your team can make the right choice.
Posted: 20 Sep 2016 | Published: 21 Apr 2016

Palo Alto Networks

Trusted Identities in Digital Business The Benefits of PKI
sponsored by Entrust, Inc.
ANALYST BRIEF: Uncover the changing nature of trust in business, how it will affect your enterprise, and how to create business value using identity. Learn how to manage identity and access more effectively, saving your teams time, effort, and resources.
Posted: 15 Sep 2016 | Published: 15 Sep 2016

Entrust, Inc.

Rx for Embedding Security into Vulnerable Healthcare Systems
sponsored by Certified Security Solutions (CSS)
WEBCAST: Learn how organizations have to revisit considerations for products and services already in use to protect data. Discover how they are satisfying regulatory or compliance requirements, remediating issues, preserve reputations and promoting a competitive advantage.
Posted: 21 Sep 2016 | Premiered: Sep 21, 2016

Certified Security Solutions (CSS)

Benchmarking Your Internal IT Costs: Building Your IT Infrastructure Service Baseline
sponsored by Windsor Group
WHITE PAPER: This analytic white paper introduces the importance of benchmarking your internal IT costs by keeping track of your IT service baseline. Doing this can define your current IT infrastructure service cost and output, as well as act as a measurement tool for continuous improvement.
Posted: 16 Sep 2016 | Published: 01 Jul 2016

Windsor Group

The Changing Workforce: Automation & the Role of Ex-Hackers
sponsored by Radware
WHITE PAPER: The wave of automation is forcing companies to think differently about how they structure their security resources. Learn what your peers are doing to keep the network impermeable, including employing ex-hackers, automating security models, and more.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

Radware
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement