IT Management  >   Systems Operations  >   Security  >  

Public Safety

RSS Feed    Add to Google    Add to My Yahoo!
Public SafetyReports
 
MapXTreme Java Edition Data Sheet
sponsored by Pitney Bowes Business Insight
DATA SHEET: MapXtreme Java is a 100% Java mapping engine designed to enable the use of location intelligence on the desktop, over the internet or through your organization intranet or extranet.
Posted: 17 Mar 2008 | Published: 01 Jan 2007

Pitney Bowes Business Insight

The Current State of Identity and Access Management
sponsored by RSA, The Security Division of EMC
VIDEO: This video explains the major shift with Identity and Access Management (IAM) in the past few years.
Posted: 08 Sep 2014 | Premiered: 13 Aug 2014

RSA, The Security Division of EMC

10 Ways Wire Data Can Help You Conquer IT Complexity
sponsored by ExtraHop
WHITE PAPER: Wire data is the record of everything that is happening in your IT environment in real time, but it's historically been untapped. This white paper highlights 10 ways wire data can help you conquer IT complexity.
Posted: 15 Sep 2014 | Published: 30 Nov 2013

ExtraHop

How To Make A Business Case For Data Investment
sponsored by Scribe Software Corporation
WHITE PAPER: This research from Forrester will guide you through the ways you can use design thinking to solve business challenges and make the case for data investment.
Posted: 10 Sep 2014 | Published: 10 Jan 2014

Scribe Software Corporation

Cloud IAM catching on in the enterprise
sponsored by IBM
EGUIDE: This expert e-guide explains why the market for cloud-based IAM is growing.
Posted: 12 Sep 2014 | Published: 12 Sep 2014

IBM

451 Research Report: AlienVault USM - A Security Operations Center for the SMB
sponsored by AlienVault
WHITE PAPER: This in-depth 451 Research analysis examines AlienVault, a security vendor tailored for small and midsize businesses.
Posted: 05 Sep 2014 | Published: 05 Sep 2014

AlienVault

Gartner: The rise of the Chief Data Officer and what it means for IT leaders
sponsored by ComputerWeekly.com
ANALYST BRIEF: CIOs should view the Chief Data Officer as a peer and a partner who will enable them to focus on the job they already have, says Gartner analyst Debra Logan.
Posted: 09 Sep 2014 | Published: 09 Sep 2014

ComputerWeekly.com

The Definitive Guide to Establishing A Security Operation Center
sponsored by AlienVault
WHITE PAPER: In this informative white paper, discover how establishing a security operations center (SOC) can enable your organization to develop a fast, coordinated, and effective response to any and all cyber threats.
Posted: 09 Sep 2014 | Published: 09 Sep 2014

AlienVault

In the Age of BYOD, How Do You Secure the Workforce?
sponsored by Imation Corp.
WHITE PAPER: In this white paper, explore the impact of the BYOD trend by implementing this strategy within your own business.
Posted: 12 Sep 2014 | Published: 31 Dec 2013

Imation Corp.

How Malware Analysis Benefits Incident Response
sponsored by Solutionary
WHITE PAPER: In this white paper, learn why malware analysis is a critical component of incident response, and how it helps mitigate vulnerabilities exposed by malware and limits further compromise.
Posted: 04 Sep 2014 | Published: 31 May 2013

Solutionary
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement