IT Management  >   Systems Operations  >  

System Security

RSS Feed    Add to Google    Add to My Yahoo!
System Security Reports
 
Five Questions to Ask Your SaaS Provider Before Putting Sensitive Data in the Cloud
sponsored by SailPoint Technologies
WHITE PAPER: Identity governance helps professionals manage and control user access to sensitive applications and data. Access this white paper to find pertinent information for desicion-makers who are in the proces of considering the deployment of SaaS applications.
Posted: 20 Mar 2015 | Published: 29 Mar 2013

SailPoint Technologies

Choosing a Safe and Secure Service Delivery Platform
sponsored by Citrix
WEBCAST: Graham Melville, Senior Director, Product Marketing, NetScaler introduces the new capabilities of NetScaler MobileStream technologies.
Posted: 25 Mar 2015 | Premiered: May 6, 2014

Citrix

Is Your Network Truly Secure? A Solution to Full Network Visibility and Protection
sponsored by Great Bay
WHITE PAPER: This white paper explains how one company was able to implement a simple solution to increase their network visibility and improve network security.
Posted: 01 Apr 2015 | Published: 01 Apr 2015

Great Bay

Strengthen Desktop Virtualization Security by Minimizing Endpoint Attack Surfaces
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Access this white paper to explore why IT professionals are increasingly adopting desktop virtualization paired with thin client solutions to significantly reduce risks and improve protection at endpoints. Examine thin client solutions to help you select one that can best support enhanced endpoint security for your organization.
Posted: 19 Mar 2015 | Published: 19 Mar 2015

Dell, Inc. and Intel®

Windows Server 2003: Why You Should Get Current
sponsored by Hewlett-Packard Limited & Intel® (Procesor Intel® Xeon®)
WHITE PAPER: Access this white paper to discover helpful tips on a successful Windows Server 2003 migration, including two migration options that are available to customers and how to develop a strategy for mitigating and modernizing existing Windows Server 2003 and related application installations.
Posted: 20 Mar 2015 | Published: 31 Jul 2014

Hewlett-Packard Limited & Intel® (Procesor  Intel® Xeon®)

Take Control of Your Business Environment With Several Integrated Solutions
sponsored by Novell Ltd.
WHITE PAPER: Access this white paper to discover a new strategy designed to facilitate and accelerate endpoint management.
Posted: 25 Mar 2015 | Published: 01 Oct 2014

Novell Ltd.

What Does Fast IT Mean for Service Providers?
sponsored by Cisco Systems, Inc.
RESOURCE: View this resource to discover a platform designed to help service providers provide new services to businesses and consumers alike.
Posted: 19 Mar 2015 | Published: 11 Jun 2014

Cisco Systems, Inc.

Breach Detection: 6 quick tips to strengthen your response plan
sponsored by Alert Logic
WHITE PAPER: This guide tells you the 6 essential steps needed for successful incident response.
Posted: 16 Mar 2015 | Published: 31 Dec 2014

Alert Logic

Securing Your Applications and Protecting Your Systems
sponsored by WhiteCryption
EGUIDE: Access this expert e-guide to explore the pros and cons of replication and erasure coding to help you determine which method of data protection is best for your data center. Also, learn why applications experts say frameworks that enforce secure coding provides a better way for developers to write apps that can withstand attacks.
Posted: 16 Mar 2015 | Published: 16 Mar 2015

WhiteCryption

Deep Security AWS Success
sponsored by Trend Micro
CASE STUDY: This case study highlights how one organization integrated a security platform into their virtualized environment to ensure compliance for public cloud and AWS to provide secure gaming, social networking, and e-commerce services to its customers.
Posted: 27 Mar 2015 | Published: 31 Dec 2014

Trend Micro
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement