Business of Information Technology  >   Business Management  >   Risk Management  >   Public Health Emergencies  >  

Severe Acute Respiratory Syndrome

RSS Feed    Add to Google    Add to My Yahoo!
Severe Acute Respiratory Syndrome Reports
Preparing the Enterprise for a Pandemic
sponsored by Avaya Inc.
WHITE PAPER: This article suggests that enterprises need to look externally as much as internally to understand the impact a pandemic might have, and to prepare an appropriate response.
Posted: 09 Jun 2008 | Published: 01 Sep 2006

Avaya Inc.

Case Study: Local Government Finds Cybersecurity that Meets its Budget
sponsored by AlienVault
WHITE PAPER: This white paper tells the story of how the IT managers for the City of Lewiston found a security solution that worked for them, keeping their network secure without incurring additional costs or requiring additional manpower.
Posted: 26 Oct 2015 | Published: 26 Oct 2015


How to Stop Today's Advanced Hackers
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This white paper discusses how you can protect against any threat today's advanced hackers throw at you.
Posted: 13 Nov 2015 | Published: 19 Aug 2015

Check Point Software Technologies Ltd.

Outrunning the Bear: 5 Critical Ways To Take a More Collaborative Approach To IT Security
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This white paper examines the challenges inhibiting faster threat response and suggests five critical steps organizations can take to turn security intelligence into action.
Posted: 12 Nov 2015 | Published: 29 May 2015

Hewlett Packard Enterprise

Special Report: Incident Response Capabilities Needed
sponsored by Hewlett Packard Enterprise
WHITE PAPER: The SANS 2015 survey of the incident response capabilities found both good news and bad news. Read on to discover what the survey found and what those results mean for your organization.
Posted: 24 Nov 2015 | Published: 31 Aug 2015

Hewlett Packard Enterprise

Protect Against Threat Propagation and Damage in the Internal Network
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper examines how to add an additional security layer to your network with an internal segmentation firewall. Learn how to segment the access of potential threats vectors to critical resources, and limit potential breach damage in your internal network.
Posted: 28 Oct 2015 | Published: 28 Oct 2015

Fortinet, Inc.

Tracking Change & Malicious Activity in Critical Technologies
sponsored by Dell, Inc.
WHITE PAPER: This white paper can help you to make the most of your critical technologies' native auditing capabilities and to supplement those capabilities when they don't provide enough security.
Posted: 11 Nov 2015 | Published: 11 Nov 2015

Dell, Inc.

InfoSec Monitoring & Analytics in the Age of IoT and Digital Transformation
sponsored by Symantec Corporation
WEBCAST: In this webcast, an experienced security professional discusses how you can integrate monitoring and analytics into your security strategy to better defend against advanced threats.
Posted: 11 Nov 2015 | Premiered: Nov 11, 2015

Symantec Corporation

Bolster Your Enterprise Risk Management with Network-wide Protection
sponsored by Palo Alto Networks
CASE STUDY: In this case study, you will examine how Tennis Australia was able to implement next-generation firewall technology to seamlessly identify and prevent potential threats to their wide area network (WAN). Access this study now to learn how to deploy intrusion prevention.
Posted: 16 Oct 2015 | Published: 18 May 2013

Palo Alto Networks

Protective Monitoring and the UK Public Services Network
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper addresses the specific security concerns of government organizations and discusses why protective monitoring is essential for keeping your citizens safe.
Posted: 03 Nov 2015 | Published: 03 Nov 2015

LogRhythm, Inc.
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement