IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  


RSS Feed    Add to Google    Add to My Yahoo!
Signatures Reports
Video-Ready - Campus Network
sponsored by Cisco Systems, Inc.
WHITE PAPER: Why should your network be "Video-Ready"? Video applications have enabled enterprises to significantly increase worker productivity, improve collaboration, reduce costs, and streamline and optimize business operations. This paper dicusses the factors that will accelerate adoption of video solutions over the next few years.
Posted: 22 May 2009 | Published: 01 May 2008

Cisco Systems, Inc.

Case Study: Hospital I.T. Infrastructure
sponsored by CDW Healthcare
CASE STUDY: Building a brand new, state-of-the-art medical campus from the ground up requires an I.T. infrastructure capable of supporting newer, more advanced healthcare applications and the massive volumes of digital data generated by these systems. Read this white paper to learn how CDW Healthcare helped a Michigan medical campus to accomplish their goals.
Posted: 28 Jul 2010 | Published: 28 Jul 2010

CDW Healthcare

Is Identity Governance Automation Necessary?
sponsored by RSA
SOFTWARE DOWNLOAD: This free download allows you to try RSA's access governance platform to see if it delivers the benefits it promises.
Posted: 01 Oct 2015 | Premiered: 02 Sep 2015


Secure, Efficient File-Sharing
sponsored by FinalCode
VIDEO: This brief video looks at a security system that keeps files safe without changing the way employees share them.
Posted: 05 Oct 2015 | Premiered: 29 May 2015


Collaborating in the Cloud: Leaders Report Significant Benefits from a Cloud-Based Approach
sponsored by Cisco
WHITE PAPER: This white paper explains the business value that can be expected from collaborating in the cloud. Discover survey results that reveal the cloud to be an effective means of leveraging collaborative technologies.
Posted: 05 Oct 2015 | Published: 05 Oct 2015


Case Study: Securing Files Anywhere in the World
sponsored by FinalCode
WHITE PAPER: By using a case study of one successful corporation, this white paper examines what you can do to maintain the confidentiality of all your files, no matter who has access to them.
Posted: 05 Oct 2015 | Published: 30 Apr 2015


Simplifying Security for Software-Defined Data Centers
sponsored by HyTrust
WHITE PAPER: Save time on compliance and audit reporting and speed time to resolution for trouble shooting with advanced reporting on NSX admin access and changes.
Posted: 07 Oct 2015 | Published: 07 Oct 2015


Achieving Endpoint Protection with SANS Critical Security Controls
sponsored by Dell, Inc.
WHITE PAPER: This white paper presents twenty security controls suggested by the SANS Institute that will help you maintain endpoint security in today's complex IT environment.
Posted: 01 Oct 2015 | Published: 01 Oct 2015

Dell, Inc.

The New Reality of Mac in Business
sponsored by JAMF Software
WHITE PAPER: This resource explores the state of Mac adoption among enterprises. Access and learn how Macs went from being routinely ignored by corporate IT to being widely considered as a good fit for many organizations.
Posted: 06 Oct 2015 | Published: 06 Oct 2015

JAMF Software

Vulnerability Remediation: If you Ranked It, You Should Have Put a Patch on It
sponsored by WhiteHat Security
WEBCAST: Access this webcast now for an in-depth review of the various web security vulnerabilities you need to protect yourself from, and also discover a step-by-step guide for remediating these threats. View it now to uncover the truth about web security.
Posted: 01 Oct 2015 | Premiered: Apr 13, 2015

WhiteHat Security
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement