IT Management  >   Systems Operations  >   Security  >  

Public Safety

RSS Feed    Add to Google    Add to My Yahoo!
Public Safety Reports
 
MapXTreme Java Edition Data Sheet
sponsored by Pitney Bowes Business Insight
DATA SHEET: MapXtreme Java is a 100% Java mapping engine designed to enable the use of location intelligence on the desktop, over the internet or through your organization intranet or extranet.
Posted: 17 Mar 2008 | Published: 01 Jan 2007

Pitney Bowes Business Insight

How to Address Key SSL Security Issues and Vulnerabilities
sponsored by A10 Networks
EGUIDE: Don't compromise your website security. Explore this expert e-guide to reveal the new SSL security landscape and uncover emerging security issues within SSL technology.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

A10 Networks

Best Practices for Privileged Access Management
sponsored by Centrify Corporation
RESEARCH CONTENT: In this research report, gain a better understanding of the best practices when deploying privileged access management (PAM) tools to achieve regular compliance and prevent security breaches.
Posted: 20 Sep 2017 | Published: 12 Sep 2017

Centrify Corporation

Top 6 Things Small Businesses Need to Know about Cybersecurity
sponsored by Kaspersky Lab
WHITE PAPER: According to a Kaspersky Lab survey, just one cybersecurity incident can cost small- and medium-sized businesses an average of $86,500. Read this white paper to reveal a list of the top things startups and small businesses need to know about cybersecurity.
Posted: 21 Sep 2017 | Published: 21 Sep 2017

Kaspersky Lab

Enterprise Network Protection Against Cyberattacks Primer: Business Email Compromise
sponsored by TrendMicro
WHITE PAPER: Business email compromise (BEC) schemes have been increasingly successful, as they have become more pervasive. Take a look at this white paper to discover recommendations against BEC.
Posted: 21 Sep 2017 | Published: 21 Sep 2017

TrendMicro

Report: Lack of SSL Traffic Inspection Poses Threat to Enterprises
sponsored by A10 Networks
EGUIDE: Most companies fall short when it comes to SSL traffic inspection, according to Ponemon Institute. Read this e-guide to reveal an expert report that recognizes how lack of SSL traffic inspection is putting companies at risk.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

A10 Networks

Sweden: Internet Security Threat Profile in Numbers
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Which industries in Sweden experience the most email attacks, including: malware, phishing, and spam?
Posted: 14 Sep 2017 | Published: 31 Mar 2017

Symantec & Blue Coat Systems

Magic Quadrant for Enterprise Mobility Management Suites
sponsored by IBM
RESEARCH CONTENT: With so many enterprise mobility management vendors, in a rapidly changing market, it can be difficult to decide which option best meets the needs of your organization. Download this report to see where different EMM vendors stand in the market, and compare the features that each has to offer.
Posted: 22 Sep 2017 | Published: 06 Jun 2017

IBM

The 12 Critical Questions you Need to Ask when Choosing an AD Bridge Solution
sponsored by One Identity
WHITE PAPER: Most enterprises today have heterogeneous IT environments, with Microsoft Active Directory (AD) providing Windows access for most users. Read this white paper to identify a number of key questions to ask when evaluating which AD bridge solution is right for you.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

One Identity

Encrypted Traffic Analytics
sponsored by Cisco Systems, Inc.
WHITE PAPER: Access this white paper to learn about the current state of encryption technology, predictions, and how you can leverage it to turn your network into an advanced security sensor.
Posted: 20 Sep 2017 | Published: 30 Jun 2017

Cisco Systems, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement