IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

Protecting America's Critical Infrastructures

RSS Feed    Add to Google    Add to My Yahoo!
Protecting America's Critical Infrastructures Reports
 
Case Study: Meeting Compliance with Secure Document Capture and Printing
sponsored by Nuance
WHITE PAPER: Read this case study to discover how the VHA implemented secure document and print management solutions for improved security, compliance, and quality of care.
Posted: 27 Jul 2015 | Published: 31 Dec 2014

Nuance

4 Secrets to Security: Engaging a Meaningful Dialogue
sponsored by Citrix
WHITE PAPER: Board meetings can be an opportunity to engage your company's most senior leaders in a strategic dialogue not only about security, but about mobility, cloud computing, and the evolution of the workplace. This white paper highlights 4 ways to engage your board of directors in a meaningful discussion about security-related risks.
Posted: 30 Jul 2015 | Published: 30 Jul 2015

Citrix

The Trouble With Instant Messaging On The Move
sponsored by BlackBerry
WHITE PAPER: Access this white paper to learn about the challenges with mobile IM security tools and discover a mobile IM security solution that provides organizations with enhanced security over corporate data in IM environments.
Posted: 28 Jul 2015 | Published: 30 Jun 2015

BlackBerry

Business-Critical Documents: Printing You Can Count On
sponsored by Nuance
WHITE PAPER: Improving your cost-effective printing is crucial. Whether printing from a desktop, mobile device or back office system, you can ensure critical and confidential documents are printed at the right place and time.
Posted: 28 Jul 2015 | Published: 27 Sep 2014

Nuance

Enterprise Mobility Strategies: Steps to Success
sponsored by Data#3
WEBCAST: With the expansion of your mobile enterprise, it is ever-important to have mobility management solutions that support flexible work practices and enhance user experience. This webcast provides a framework for developing and implementing a successful enterprise mobility strategy.
Posted: 30 Jul 2015 | Premiered: Jul 30, 2015

Data#3

5 Best Practices to Make Security Everyone's Business
sponsored by Citrix
WHITE PAPER: This white paper presents the five steps you can take to help your end users advance your security strategy instead of hindering it.
Posted: 30 Jul 2015 | Published: 30 Jul 2015

Citrix

NetScaler and XenMobile Solution for Enterprise Mobility Deployment Guide
sponsored by Citrix
PRODUCT LITERATURE: This deployment guide carefully explains how you should go about your setting up your NetScaler and ZenMobile to optimize enterprise mobility in your organization.
Posted: 20 Jul 2015 | Published: 20 Jul 2015

Citrix

An Inside Look into CA Workload Automation
sponsored by CA Technologies.
VIDEO: This video and accompanying demonstration offer an inside look into a workload automation tool that allows you to manage business processes from a single point of control.
Posted: 13 Jul 2015 | Premiered: 13 Jul 2015

CA Technologies.

Authentication for Today's Threat Landscape
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses the capabilities of an authentication system that would be effective in today's threat landscape.
Posted: 17 Jul 2015 | Published: 31 Dec 2011

Symantec Corporation

Beyond Malware: Detecting the Undetectable
sponsored by CrowdStrike
WHITE PAPER: This report details how successful attacks targeting high-profile government and corporate entities are able to easily bypass traditional defenses.
Posted: 27 Jul 2015 | Published: 27 Jul 2015

CrowdStrike
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement