IT Management  >   Systems Operations  >   Security  >  

Public Safety

RSS Feed    Add to Google    Add to My Yahoo!
Public Safety Reports
 
MapXTreme Java Edition Data Sheet
sponsored by Pitney Bowes Business Insight
DATA SHEET: MapXtreme Java is a 100% Java mapping engine designed to enable the use of location intelligence on the desktop, over the internet or through your organization intranet or extranet.
Posted: 17 Mar 2008 | Published: 01 Jan 2007

Pitney Bowes Business Insight

Comparative Overview of File Sync and Share Platforms
sponsored by Hitachi Data Systems
WHITE PAPER: Discover a fully-integrated, on-premises platform for safe, secure file sharing and synchronization to allow employees to safely create and share content from mobile devices without compromising data security. Also, gain access to a comparative guide which looks at key categories of file sync and share tools.
Posted: 27 Sep 2016 | Published: 30 Jan 2015

Hitachi Data Systems

Modern Infrastructure E-zine – September 2016
sponsored by SearchITOperations
EZINE: The stand-alone server market finds itself overmatched by a variety of converged systems that might just be more equipped to handle today's infrastructure. This Modern Infrastructure e-zine details the impact of converged systems on the server market and explores motivation behind a multicloud strategy, basics of immutable infrastructure, and more.
Posted: 20 Sep 2016 | Published: 20 Sep 2016


A Practical Guide to Efficient Security Response
sponsored by ServiceNow
WHITE PAPER: Learn how the disconnect between security and IT tools can lead to seemingly lackadaisical security responses to serious breaches. Access this resource to compare security response approaches, and get a short checklist to evaluate how the right security operations solution can support your enterprise.
Posted: 26 Sep 2016 | Published: 26 Sep 2016

ServiceNow

How Glassdoor Blocks Unwanted Bad Bots
sponsored by Distil Networks
CASE STUDY: Learn how Glassdoor ensured their site metrics by proactively reducing bad bot traffic. Discover how they implemented a proactive (and not after-the-fact) strategy, ensured 99.9% of advertising platform traffic comes from real humans, and avoided driven up infrastructure costs.
Posted: 16 Sep 2016 | Published: 16 Sep 2016

Distil Networks

Inside the 2016 Verizon Data Breach Investigations Report
sponsored by Intel Security
WEBCAST: Join Marc Spitler, Senior Manager at Verizon Security Research, and Raj Samani, CTO for EMEA at Intel Security, as they go over findings from this year's Data Breach Investigation Report.
Posted: 26 Sep 2016 | Premiered: Sep 26, 2016

Intel Security

Bringing IT and Security Together for Better Breach Response
sponsored by ServiceNow
WHITE PAPER: Untangle the vital reasons why security response times are so slow, and how to efficiently address them. Also learn what steps you can take today to make your remediation efforts quicker and more efficient, while improving the clarity of your network security status.
Posted: 26 Sep 2016 | Published: 26 Sep 2016

ServiceNow

Get Smarter Control of Your Certificates and User Keys Right Now
sponsored by Certified Security Solutions (CSS)
WEBCAST: In this webinar IT experts Ted Shorter and Matthew McKenna join forces to outline common enterprise challenges, risks, and best practices related to controlling digital certificates and SSH user keys. Learn how to reduce risk, meet and exceed audit requirements, and streamline disparate complex IT and security workflows.
Posted: 22 Sep 2016 | Premiered: Jun 22, 2016

Certified Security Solutions (CSS)

The Changing Workforce: Automation & the Role of Ex-Hackers
sponsored by Radware
WHITE PAPER: The wave of automation is forcing companies to think differently about how they structure their security resources. Learn what your peers are doing to keep the network impermeable, including employing ex-hackers, automating security models, and more.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

Radware

Is FDE Enough to Thwart "Evil Maid" Attacks?
sponsored by Dimension Data
EGUIDE: In this e-guide learn why the traditionally accepted full disk encryption (FDE) isn't enough to protect enterprise data in case an attacker steals your device.
Posted: 23 Sep 2016 | Published: 21 Sep 2016

Dimension Data
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement