Software  >   Applications Software  >   Enterprise Applications Software  >   Manufacturing Software  >   Process Control Software  >  

Supervisory Control and Data Acquisition Systems

RSS Feed    Add to Google    Add to My Yahoo!
Supervisory Control and Data Acquisition Systems Reports
Advanced cyber-security intelligence
sponsored by
ANALYST REPORT: Analysts Bob Tarzey and Clive Longbottom look at the business case for rolling out next security information and event management tools.
Posted: 31 Aug 2012 | Published: 05 Jul 2012

Breaches on the Rise in Control Systems: A SANS Survey
sponsored by Qualys
WHITE PAPER: This report contains the results of a survey that reveals how vulnerable most industrial control systems are and what you can do to ensure that yours isn't.
Posted: 16 Oct 2015 | Published: 30 Apr 2014


E-Book: NERC Compliance
sponsored by
EBOOK: presents a comprehensive guide to NERC compliance. Our experts cover all the angles in order to help your efforts in meeting compliance with the information security standards established by the North American Electric Reliability Corporation.
Posted: 24 Sep 2010 | Published: 24 Sep 2010

EFT Server to Replace USB for SCADA; EFT Server Enterprise Helps to Reduce Risks through Multi-Zone Architecture
sponsored by GlobalScape
WHITE PAPER: This whitepaper explains that USB drives have been used to transport viruses and malware, both on purpose and accidentally.
Posted: 06 Mar 2014 | Published: 31 Dec 2012


IBM Service Management for the Intelligent Utility Network
sponsored by IBM
WHITE PAPER: The current utilities environment requires companies to decrease costs while increasing the ability to control utility assets. One key challenge is how to take advantage of new technologies to better manage the delivery of service to customers today and into the future. IBM Service Management for the IUN provides a blueprint for getting started.
Posted: 06 Dec 2010 | Published: 06 Dec 2010


Information Security Ezine- Europe
sponsored by
EZINE: This e-zine presented by will give key tips on how to comply to data protection regulations, and will help you find a product that is right for your business.
Posted: 02 Jun 2011 | Published: 02 Jun 2011

Stuxnet Under the Microscope
sponsored by ESET
WHITE PAPER: This report is devoted to the analysis of the notorious Stuxnet worm (Win32/Stuxnet) that suddenly attracted the attention of virus researchers this summer. This report is primarily intended to describe targeted and semi-targeted attacks, and how they are implemented, focusing mainly on the most recent, namely Stuxnet.
Posted: 04 Oct 2010 | Published: 04 Oct 2010


A Report on the Critical Capabilities Required for High-Security Mobility Management
sponsored by Good Technology
ANALYST REPORT: In this exclusive analyst report, you will learn how to achieve increased protection in mobile markets using a hybrid mix of enterprise mobility management (EMM), platform and security vendors. Read on to ensure your EMM vendor will support business processes without disruptions.
Posted: 23 Nov 2015 | Published: 29 Jul 2015

Good Technology

The Rise of the Anytime-Anywhere Mobile Worker
sponsored by Good Technology
WHITE PAPER: In this white paper, you will learn how to harness the power of your anytime-anywhere workforce by viewing 8 key considerations to evaluate mobile platforms. Discover how to securely mobilize your enterprise, while also considering mobile data protection, app development, and more.
Posted: 23 Nov 2015 | Published: 31 Dec 2014

Good Technology

A Digital Upgrade Hits the Campus
sponsored by Unit4
WHITE PAPER: This detailed white paper discusses an enterprise software system that replaces legacy student information systems and provides solutions for meeting institutional growth aspirations. Access now to see how this student management system can help you meet your students' expectations and increase your ROI.
Posted: 24 Nov 2015 | Published: 24 Nov 2015

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement