IT Management  >   Systems Operations  >   Security  >  

Public Safety

RSS Feed    Add to Google    Add to My Yahoo!
Public Safety Reports
 
MapXTreme Java Edition Data Sheet
sponsored by Pitney Bowes Business Insight
DATA SHEET: MapXtreme Java is a 100% Java mapping engine designed to enable the use of location intelligence on the desktop, over the internet or through your organization intranet or extranet.
Posted: 17 Mar 2008 | Published: 01 Jan 2007

Pitney Bowes Business Insight

How to Make Better Strategic Cloud Choices
sponsored by Microsoft
WHITE PAPER: Learn about a partnership built on years of experience and expertise to make cloud adoption simple, fast and effective.
Posted: 23 May 2016 | Published: 23 May 2016

TOPICS:  IT Management
Microsoft

Top 10 Security Priorities For US Healthcare Organizations
sponsored by Absolute
WHITE PAPER: This report by Gartner reveals the main security challenges the healthcare industry faces. Unveil the top 10 security priorities for US healthcare organizations so that you can address the industry's most difficult challenges.
Posted: 24 May 2016 | Published: 22 Oct 2015

Absolute

Measuring the Business Impact of IT Through Application Performance
sponsored by Riverbed Technology, Inc.
WHITE PAPER: Clearly demonstrating its business impact can help IT secure funding for application performance optimization. Explore strategies that quantify the business value of these tools, so you can pave the way for better investments and innovations.
Posted: 18 May 2016 | Published: 18 May 2016

Riverbed Technology, Inc.

Application Awareness: The Critical Enabler in Virtualized Networks
sponsored by Ipoque
WHITE PAPER: Application awareness delivers information about traffic patterns and user behavior, quite important for SDN and network function virtualization. Discover the key role of application awareness in providing essential network intelligence that enables more efficient routing of applications and vital analytics to drive new NFV/SDN service deployments.
Posted: 17 May 2016 | Published: 29 Apr 2016

Ipoque

What Are the Best Ways to Improve SMB Security?
sponsored by CDW
EGUIDE: Expert Mike O. Villegas advises SMBs on security defenses. Uncover control measures to improve security, such as: defining data breach notification requirements, using firewalls, antivirus software, and up-to-date patches, and more.
Posted: 19 May 2016 | Published: 18 May 2016

CDW

Accenture: Case Study: Bacardi's Hybrid System Architecture
sponsored by Microsoft
WEBCAST: Learn how high-performance analytics allowed Bacardi to improve reporting performance and reduce data load latency.
Posted: 23 May 2016 | Premiered: May 23, 2016

TOPICS:  IT Management
Microsoft

Identity-Driven Micro-Segmentation Everywhere you Work
sponsored by Unisys
RESOURCE: Discover how micro-segmentation can defend your data in public and private clouds, so you can securely expand your business. Access now and you'll also learn how cryptography can cloak your data and servers from dangerous cyber-attacks.
Posted: 23 May 2016 | Published: 23 May 2016

Unisys

Wireless Defense Strategies in the IoT Era
sponsored by Fortinet, Inc.
EBOOK: Reevaluate access layer protection in enterprise WLANs and why deploying ad-hoc security is no longer enough to protect against threats. You'll also see why a secure access architecture will be required to survive the data threats of the future.
Posted: 20 May 2016 | Published: 20 May 2016

Fortinet, Inc.

Anatomy of a Cyber-Attack
sponsored by Dell Software
WHITE PAPER: You need to understand the enemy -- and their malware -- before you can defeat them. Discover a comprehensive strategy to counter every stage of cyber-attacks and eliminate every type of malware from disrupting your network.
Posted: 20 May 2016 | Published: 20 May 2016

Dell Software
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement