IT Agents  >   IT Workforce  >   Information Technology Professionals  >  

Technical Leads

RSS Feed    Add to Google    Add to My Yahoo!
Technical Leads Reports
 
Point-of-Sale Security for Dummies
sponsored by Bit9 + Carbon Black
BOOK: This eBook will teach you how to secure your POS systems, minimize your risk, achieve PCI DSS compliance, protect cardholder data, and more.
Posted: 15 Jan 2015 | Published: 15 Jan 2015

Bit9 + Carbon Black

Protection Storage Architecture: What, Why, and How?
sponsored by EMC Corporation
WHITE PAPER: This white paper explores how a Protection Storage Architecture enables backup teams to solve immediate tactical challenges, helps IT teams keep business applications running, and supports them as they evolve to support strategic services-oriented business models.
Posted: 19 Nov 2014 | Published: 28 Feb 2014

EMC Corporation

Infographic: Is Your DNS Really Protected?
sponsored by Cloudmark
RESOURCE: View this informative infographic now to learn more about the consequences of DNS attacks, and how you can prevent them within your enterprise.
Posted: 22 Jan 2015 | Published: 22 Jan 2015

Cloudmark

Engage Audit Professionals for Better Security Assessment Outcomes
sponsored by IBM
WHITE PAPER: This white paper explains how to leverage your internal audit team's resources and expertise to develop a more efficient, sustainable compliance program
Posted: 22 Jan 2015 | Published: 26 Jun 2013

IBM

Point of Sale (POS) Systems and Security
sponsored by Bit9 + Carbon Black
WHITE PAPER: This white paper explains why organizations need more than the PCI DSS compliance stamp in order to truly secure their POS systems; describes how to secure your POS systems against common attacks; and discusses the Council on CyberSecurity's top 20 suggestions for protecting payment card information.
Posted: 16 Jan 2015 | Published: 31 Oct 2014

Bit9 + Carbon Black

Why the Centralization of Content is Critical to Cloud Security
sponsored by Box
EBOOK: This white paper explores how a new generation of enterprise cloud services can mitigate the security challenges created by decentralized computing.
Posted: 02 Dec 2014 | Published: 17 Jun 2014

Box

How to Meet the Growing Demands on IT: Four Steps Along the Path
sponsored by Rackspace
WHITE PAPER: Read this white paper to uncover how outsourcing opens up possibilities for your IT staff to work on more strategic projects while increasing business agility. Discover the four configurations for managing your IT staff and how to transform them into service brokers to advance your organization.
Posted: 17 Nov 2014 | Published: 11 Jul 2014

Rackspace

Next-Generation Firewalls and IPS: Why You Need Both
sponsored by Hewlett-Packard Company
WHITE PAPER: This HP white paper shows how next-generation firewalls and next-generation intrusion prevention systems are complementary security solutions that work together to secure your network.
Posted: 11 Dec 2014 | Published: 11 Dec 2014

Hewlett-Packard Company

Leaders in IT
sponsored by ComputerWeekly.com
EGUIDE: This PDF gives you an insight into the daily lives of IT leaders and the challenges they face on a day to day basics. With technology constantly changing, they are expected to be on top of this and ensure that the workforce is up to date with the latest applications.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

ComputerWeekly.com

Security Intelligence Is the Smart Way to Keep the Cloud Safe
sponsored by IBM
WHITE PAPER: Find out how an integrated IBM suite of intelligence solutions consolidates and analyzes data from across the cloud to provide organizations with visibility and control, to help better secure cloud environments.
Posted: 08 Oct 2014 | Published: 31 Oct 2013

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement