IT Management  >   Systems Operations  >   Security  >  

Public Safety

RSS Feed    Add to Google    Add to My Yahoo!
Public SafetyReports
 
IT, IG and Compliance: The New World Order for Data Management
sponsored by SearchCompliance.com
VIRTUAL TRADESHOW: Join ARMA, SearchCompliance, and hundreds of your peers online for this look at information governance processes in the age of big data. Hear expert opinions on information governance strategies and best practices to keep mobile data secure, stay regulatory compliant and even make data management processes more efficient in the big data era.
Posted: 10 Oct 2013 | Premiered: Oct 13, 2013

SearchCompliance.com

MapXTreme Java Edition Data Sheet
sponsored by Pitney Bowes Business Insight
DATA SHEET: MapXtreme Java is a 100% Java mapping engine designed to enable the use of location intelligence on the desktop, over the internet or through your organization intranet or extranet.
Posted: 17 Mar 2008 | Published: 01 Jan 2007

Pitney Bowes Business Insight

Secure File Transfer: Send it Fast, but Send it Safely
sponsored by SearchSecurity.com
EBOOK: FTP gets big files to colleagues and clients fast, but as the headlines remind us, the threat of electronic break-in is real. This guide to secure file transfer show how best to cure that sense of FTP insecurity.
Posted: 16 Apr 2014 | Published: 14 Apr 2014

SearchSecurity.com

Unlock the Mystery of Effective Strategic Planning
sponsored by CA Technologies.
WHITE PAPER: This informative infographic illustrates four key tips to more effective planning, and introduces a project portfolio management (PPM) suite that gives you the capabilities and best practices you need to optimize PPM and make more strategic investments.
Posted: 15 Apr 2014 | Published: 31 Jan 2014

CA Technologies.

The Critical Incident Response Maturity Journey
sponsored by RSA, The Security Division of EMC
WHITE PAPER: This paper focuses on defining levels of critical incident response maturity and how organizations can continually improve their incident response capabilities to help reduce the risk of experiencing a damaging incident.
Posted: 16 Apr 2014 | Published: 31 Dec 2013

RSA, The Security Division of EMC

Signature-less Malware Detection: Finding an Evil in the Haystack
sponsored by EMC Corporation
WHITE PAPER: Explore this exclusive resource to discover how one industry leading vendor is fighting against advanced threats, and learn how your business can build a top-notch defense against potentially business-ending security threats.
Posted: 15 Apr 2014 | Published: 31 Dec 2012

EMC Corporation

EMC Video Surviellance Storage Solution
sponsored by EMC & Arrow
WEBCAST: Watch this concise webcast to uncover the key features of an industry-leading storage solution which has been specifically designed to support your video surveillance systems.
Posted: 16 Apr 2014 | Premiered: Apr 16, 2014

EMC & Arrow

Authentication Management: Ensuring Security for Remote Workers
sponsored by RSA, The Security Division of EMC
WHITE PAPER: This guide explores one company's authorization management tool and how it can enable secure access to employees working from home or other off-site locations.
Posted: 14 Apr 2014 | Published: 31 Dec 2013

RSA, The Security Division of EMC

10 Network Security Tools and Tests Everyone Should Use
sponsored by Global Knowledge
WHITE PAPER: This paper provides a list of 10 security tools or tests that will help you check out suspicious issues and keep ahead of new risks and threats.
Posted: 14 Apr 2014 | Published: 14 Apr 2014

Global Knowledge

IT industry outlook 2014
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from CompTIA provides an overview of the size, shape and growth factors of the information technology (IT) industry.
Posted: 17 Apr 2014 | Published: 17 Apr 2014

ComputerWeekly.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement