IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

Protecting America's Critical Infrastructures

RSS Feed    Add to Google    Add to My Yahoo!
Protecting America's Critical Infrastructures Reports
 
VMware NSX The Platform for Network Virtualization
sponsored by VMware
WHITE PAPER: Current network and security solutions are rigid, complex and often vendor-specific. Consult this white paper to find out more on how VMware NSX can bring your data center and networking strategies to the next level.
Posted: 22 May 2015 | Published: 22 May 2015

VMware

Get the Scoop on the True Native Hybrid Cloud™
sponsored by Peer1
VIDEO: Tune into this video to learn about a specific type of hybrid cloud that allows customers to provision bare metal servers, virtual cloud servers, network devices and security devices all from a single web based portal.
Posted: 20 May 2015 | Premiered: 20 May 2015

Peer1

2015 Cyberthreat Defense Report
sponsored by Citrix
WHITE PAPER: In this report, discover what security professionals had to say about mobile security, endpoint security, and other important trends in the cybersecurity landscape.
Posted: 12 May 2015 | Published: 12 May 2015

Citrix

How US Cellular Used Next-Gen Firewalls for 4G Rollout
sponsored by Dell Software
CASE STUDY: US Cellular needed a network security solution for its expansion to 4G. Learn how NGFWs met their data and budget needs.
Posted: 12 May 2015 | Published: 12 May 2015

TOPICS:  IT Management
Dell Software

Data Security for the Most Sensitive Materials
sponsored by IntraLinks, Inc
WHITE PAPER: Download and discover how you can make even the most sensitive data safe from falling into the wrong hands while simplifying business processes and cutting costs.
Posted: 20 May 2015 | Published: 26 Dec 2014

IntraLinks, Inc

Best Practices for FTP in the Enterprise
sponsored by IBM
EGUIDE: In this expert guide, you'll find the information you need to decide whether or not it's time to move on from FTP. Additionally, this guide offers tips for achieving best practice if you do stick with FTP.
Posted: 21 May 2015 | Published: 21 May 2015

IBM

SCB Builds a Defense Against Malware
sponsored by Malwarebytes Corporation
WHITE PAPER: In this case study, learn the story of an architectural firm that dramatically decreased malware attacks while increasing productivity.
Posted: 08 May 2015 | Published: 08 May 2015


The Rise in Cybercrime: A Report on the Current Threat Landscape
sponsored by IBM
WHITE PAPER: This white paper examines why and how cybercrime is increasing and suggests practices for maintaining security.
Posted: 21 May 2015 | Published: 30 Jun 2014

IBM

Security Strong Enough for Today's Threats
sponsored by IBM
VIDEO: In this brief video, discover the essential components of a security system strong enough for today's threat landscape.
Posted: 21 May 2015 | Premiered: 09 Sep 2014

IBM

Uncover Advanced Attacks and Detect Hidden Breaches
sponsored by Hewlett-Packard Limited
WHITE PAPER: In this white paper, discover how you can gain greater visibility into the state of both active and live threats hidden within your network.
Posted: 22 May 2015 | Published: 30 Apr 2015

Hewlett-Packard Limited
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement