IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Signatures

RSS Feed    Add to Google    Add to My Yahoo!
Signatures Reports
 
Strong Authentication: Best Practices and Use Cases
sponsored by Gemalto
WHITE PAPER: This helpful white paper explains how an identity-centric approach to IT security can lock down critical processes and systems and ensure that you have complete control over who has access.
Posted: 06 Nov 2014 | Published: 06 Nov 2014

Gemalto

Video-Ready - Campus Network
sponsored by Cisco Systems, Inc.
WHITE PAPER: Why should your network be "Video-Ready"? Video applications have enabled enterprises to significantly increase worker productivity, improve collaboration, reduce costs, and streamline and optimize business operations. This paper dicusses the factors that will accelerate adoption of video solutions over the next few years.
Posted: 22 May 2009 | Published: 01 May 2008

Cisco Systems, Inc.

Case Study: Hospital I.T. Infrastructure
sponsored by CDW Healthcare
CASE STUDY: Building a brand new, state-of-the-art medical campus from the ground up requires an I.T. infrastructure capable of supporting newer, more advanced healthcare applications and the massive volumes of digital data generated by these systems. Read this white paper to learn how CDW Healthcare helped a Michigan medical campus to accomplish their goals.
Posted: 28 Jul 2010 | Published: 28 Jul 2010

CDW Healthcare

A Checklist for Deploying Highly Efficient Infrastructure for Windows Server® 2012
sponsored by Lenovo
WHITE PAPER: View this whitepaper for a checklist of five key elements to delivering significant improvement in the operational efficiency of your Windows Server 2012 environment.
Posted: 17 Apr 2015 | Published: 31 Oct 2013

Lenovo

Website Security for Dummies
sponsored by White Hat Security
EBOOK: Read this eBook to discover the best practices for secure site development, configuration, setup, and maintenance.
Posted: 14 Apr 2015 | Published: 31 Dec 2014

White Hat Security

Understanding what your endpoint security policy needs
sponsored by GeoTrust, Inc.
EGUIDE: This expert guide examines the effectivenss of anti-virus software in the age of advanced threats.
Posted: 13 Apr 2015 | Published: 13 Apr 2015

GeoTrust, Inc.

Electronic Prescribing of Controlled Substances: Establishing a Secure, Auditable Chain of Trust
sponsored by Imprivata
WHITE PAPER: Access this white paper to learn about the regulations surround the prescribing of controlled substances, and how to make sure you're complying with regulations.
Posted: 10 Apr 2015 | Published: 10 Apr 2015

Imprivata

How Will Digital Transformation and the New Style of IT Impact Your Business?
sponsored by Hewlett-Packard Limited
VIDEO: In this video, Paul Evans, an expert on application transformation at HP, explains the keys to keeping pace with growing end user expectations for instantaneous, relevant, and robust customer experiences.
Posted: 15 Apr 2015 | Premiered: 30 Dec 2014

Hewlett-Packard Limited

Top Things to Know for Windows Server 2003 End-Of-Life
sponsored by Lenovo
EGUIDE: Inside this expert e-guide, explore top tips to successfully upgrade from Windows Server 2003 and find out what the next steps are following Server 2003 end-of-life.
Posted: 16 Apr 2015 | Published: 20 Mar 2015

Lenovo

Leveraging Traffic Visibility and IPS for Comprehensive Continuous Monitoring
sponsored by Gigamon
WHITE PAPER: In this white paper, you will discover one powerful solution that can leverage traffic visibility and an intrusion protection system for continuous monitoring of the network.
Posted: 14 Apr 2015 | Published: 26 Dec 2014

Gigamon
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement