IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

Protecting America's Critical Infrastructures

RSS Feed    Add to Google    Add to My Yahoo!
Protecting America's Critical InfrastructuresReports
 
It is Critical to Become an IdP to Mitigate New Security Risks
sponsored by SecureAuth
WHITE PAPER: This white paper addresses the reasons enterprises should become Identity Providers (IdPs), what becoming an IdP involves, and why you should consider automating this process as much as possible.
Posted: 24 Oct 2014 | Published: 24 Oct 2014

SecureAuth

Networks That Know Security
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper explains why a multidimensional approach to network security is crucial to minimize any potential risks.
Posted: 29 Oct 2014 | Published: 01 Aug 2014

Juniper Networks, Inc.

Shell Eco-marathon Widens its Horizons
sponsored by Hewlett-Packard Company
WHITE PAPER: This case study covers how Shell Eco-marathon now allows organizers to explore and serve data quickly and efficiently to improve event management.
Posted: 28 Oct 2014 | Published: 31 Aug 2014

Hewlett-Packard Company

How to Woo Employees to Enterprise File Sync & Share: The Dropbox Breakup
sponsored by Code42
WHITE PAPER: Read this whitepaper to find out more about the dangers of personal cloud sharing and the benefits of enterprise-ready file sync and share.
Posted: 21 Oct 2014 | Published: 21 Oct 2014

Code42

Be a Superhero: Use Application & Infrastructure Visibility to Gain Competitive Advantage
sponsored by IBM
VIRTUAL ENVIRONMENT: Access this resource to learn how IBM can help you with the Operations, Performance, Analytics, Automation and Delivery of your IT services in today's complex on-prem, hybrid and cloud environments. You'll be access a wide array of content in different media format to help you make smarter decisions now and for your organization's future.
Posted: 28 Oct 2014 | Premiered: 28 Oct 2014

IBM

DDoS Malware
sponsored by Verisign, Inc.
WHITE PAPER: Check out this valuable whitepaper now to learn about five specific types of DDoS attacks, how they work, what you can do to prevent them, and much more.
Posted: 28 Oct 2014 | Published: 09 Oct 2013

Verisign, Inc.

Secure Access to Sensitive Data on the Move
sponsored by HID
VIDEO: This short video introduces HID Global's ActivID® authentication solutions, which incorporate integrated device identification technology to make location- and risk-based decisions.
Posted: 21 Oct 2014 | Premiered: 21 Oct 2014

HID

IDC: GHY International: Linux, Key Workloads, Density and Efficiency with IBM Power Systems; Apr 2013
sponsored by IBM
WHITE PAPER: In this white paper, IDC explores the business benefits realized by GHY in implementing key business workloads on Linux on Power Systems. The value Power provided to GHY allows them to focus precious IT resources on projects that grow revenue.
Posted: 31 Oct 2014 | Published: 31 Oct 2014

IBM

How Alert Logic Enabled bfw Advertising to Better Secure Clients' Websites
sponsored by Alert Logic
WHITE PAPER: This white paper describes how bfw Advertising, an agency that builds and manages websites and applications for B2B clients, worked with Alert Logic to implement a Web Application Firewall (WAF) to filter out suspicious web traffic.
Posted: 22 Oct 2014 | Published: 22 Oct 2014

Alert Logic

10 Steps to Mitigate a DDoS Attack in Real Time
sponsored by F5 Networks
WHITE PAPER: This brief resource details a 10-step process to stopping distributed denial of service (DDoS) attacks immediately and before critical damage can be made.
Posted: 22 Oct 2014 | Published: 15 Jan 2014

F5 Networks
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement