IT Management  >   Systems Operations  >   Security  >  

Public Safety

RSS Feed    Add to Google    Add to My Yahoo!
Public SafetyReports
 
MapXTreme Java Edition Data Sheet
sponsored by Pitney Bowes Business Insight
DATA SHEET: MapXtreme Java is a 100% Java mapping engine designed to enable the use of location intelligence on the desktop, over the internet or through your organization intranet or extranet.
Posted: 17 Mar 2008 | Published: 01 Jan 2007

Pitney Bowes Business Insight

How to Stop Online and Mobile Banking Fraud
sponsored by iovation, Inc.
WHITE PAPER: This white paper reveals how to utilize a multilayered fraud prevention solution that doesn't sacrifice the overall customer experience.
Posted: 24 Sep 2014 | Published: 24 Sep 2014

iovation, Inc.

Deloitte CIO Survey 2014
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Deloitte's second global CIO survey assesses CIO's role in innovation, spending and technology priorities, and their relationship with the business.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

ComputerWeekly.com

Computer Weekly – 23 September 2014: Nato and business join forces to tackle cyber security threats
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at how Nato wants to work with businesses to tackle their common cyber security threat. Is Amazon becoming the new Microsoft? We examine the historic similarities between the two suppliers. And airline easyJet talks about putting hybrid cloud into action. Read the issue now.
Posted: 22 Sep 2014 | Published: 23 Sep 2014

ComputerWeekly.com

The Story Behind The PCI Data Security Standard 3.0
sponsored by CDW Corporation
WEBCAST: This webcast reveals how PCI DSS has changed and several ways to manage compliance.
Posted: 29 Sep 2014 | Premiered: May 30, 2014

CDW Corporation

Enterprise Security: Attacking the problems of application and mobile security
sponsored by Orasi
WHITE PAPER: Mobile devices, applications, and the network infrastructure are particularly vulnerable to attack and intrusion – and can all too often be the weak link in an otherwise secure enterprise infrastructure. This in-depth resource dives into trends in enterprise security, focusing on mobile systems and malware.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

Orasi

Preventing Today's Mega-DDOS Attacks
sponsored by Solutionary
EGUIDE: In this expert eGuide, get an inside look at the mechanics of DDoS attacks and how organizations can best detect and prevent them.
Posted: 24 Sep 2014 | Published: 24 Sep 2014

Solutionary

How to Mitigate the Risk of Insider Threats
sponsored by Digital Guardian
WHITE PAPER: This white paper explains how to successfully ward off insider threats by altering the operating environment.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

Digital Guardian

IT Leaders Look Towards Implementing an Enterprise Mobility Strategy
sponsored by CA Technologies.
WHITE PAPER: The following survey detailed mobile information compiled from 1,300 senior IT decision makers from 21 different countries worldwide.
Posted: 24 Sep 2014 | Published: 24 Sep 2014

CA Technologies.

Mutual Fund Giant Securely Encrypts Multiple Customer Applications in the Cloud
sponsored by CipherCloud
CASE STUDY: This case study features a Boston-based investment services company, and reveals how they made the switch to cloud applications successfully.
Posted: 23 Sep 2014 | Published: 23 Sep 2014

CipherCloud
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement