IT Management  >   Systems Operations  >   Security  >  

Public Safety

RSS Feed    Add to Google    Add to My Yahoo!
Public Safety Reports
 
MapXTreme Java Edition Data Sheet
sponsored by Pitney Bowes Business Insight
DATA SHEET: MapXtreme Java is a 100% Java mapping engine designed to enable the use of location intelligence on the desktop, over the internet or through your organization intranet or extranet.
Posted: 17 Mar 2008 | Published: 01 Jan 2007

Pitney Bowes Business Insight

7 Ways to Find Rogue Users
sponsored by Prelert
WHITE PAPER: This article gives you seven foolproof steps towards setting up insider security with less disruption and better accuracy.
Posted: 23 Mar 2015 | Published: 03 Apr 2014

Prelert

The significance of Windows Server in a changing IT landscape
sponsored by Lenovo
EGUIDE: Access this expert e-guide to discover how the changing IT landscape is affecting the role of Microsoft Windows Servers within organizations. Find out how Microsoft is trying to integrate these new market trends by optimizing existing platforms to support cloud, mobile, and virtual machine environments.
Posted: 20 Mar 2015 | Published: 20 Mar 2015

Lenovo

Making Smart Decisions in Evaluating and Selecting a Supplier of Converged Infrastructure
sponsored by Dell, Inc. and IntelĀ®
WHITE PAPER: This expert resource gives insight into what to look for in a converged infrastructure supplier. You'll also examine a converged infrastructure approach built to reduce complexity, scale across a wide range of applications and workloads, and deliver superior price/performance ratios.
Posted: 25 Mar 2015 | Published: 25 Mar 2015

Dell, Inc. and IntelĀ®

The Secret To Reducing False Alerts
sponsored by Prelert
WHITE PAPER: Take a look at this brief article to discover how anomaly detection can lower your rate of false positives.
Posted: 23 Mar 2015 | Published: 22 May 2014

Prelert

Security Best Practices for Amazon Web Services
sponsored by AlienVault
WHITE PAPER: In this white paper, learn how to be a smart user of AWS with tips for security best practices.
Posted: 31 Mar 2015 | Published: 12 Jan 2015

AlienVault

Your Guide to: Tackling the Top 3 IT Service Management Challenges
sponsored by ServiceNow
WHITE PAPER: There are three main areas that can quickly become headaches in an IT organization: request management, asset tracking, and reporting. Read this white paper to learn how to reach IT service prominence in these areas by rethinking your approach to all of them.
Posted: 30 Mar 2015 | Published: 30 Mar 2015

ServiceNow

How to Reap the Benefits of a Flexible ITSM Platform
sponsored by ServiceNow
EGUIDE: This eguide explains how to remain business-aligned, operationally controlled and cost-effective with an evolving ITSM.
Posted: 29 Mar 2015 | Published: 29 Mar 2015

ServiceNow

Managing the High Demands of Today's Workloads
sponsored by Hewlett-Packard Company
WHITE PAPER: Consult the following white paper to learn how to take full advantage of the cutting edge infrastructure technology that can ensure you are able to meet the demands of today's workloads and gain the significant benefits that a modern IT infrastructure can bring.
Posted: 26 Mar 2015 | Published: 26 Mar 2015

Hewlett-Packard Company

Mitigate Your Biggest Security Risk: Business Users
sponsored by ObserveIT
WHITE PAPER: Do you know who poses the greatest security risk to your organization? Surprisingly, the answer is people closer than you think: your business users. In this white paper, discover five reasons why business users with access to critical applications are so risky.
Posted: 21 Mar 2015 | Published: 21 Mar 2015

ObserveIT
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement