IT Management  >   Systems Operations  >   Contingency Planning  >  

Y2K

RSS Feed    Add to Google    Add to My Yahoo!
Y2KReports
 
Post Breach Industry Report: A Real-world View of Ongoing Cyber Security Attacks
sponsored by Vectra Networks
WHITE PAPER: This informative report uses real-world data to reveal what attackers do within a network once they evade perimeter defenses.
Posted: 25 Nov 2014 | Published: 25 Nov 2014

Vectra Networks

Are You Fully Prepared for Shellshock?
sponsored by Dell Software
WEBCAST: Join this webinar for technical insight into Shellshock, and learn what you can do to protect networks and Linux-based devices from attacks.
Posted: 25 Nov 2014 | Premiered: Nov 25, 2014

Dell Software

Sleeping Through the Alarm: What Breaches Should be Telling Us, and Why the Message is Missed
sponsored by SafeNet, Inc.
WHITE PAPER: This white paper reports the findings of an extensive SafeNet survey of security professionals around the world, offering insights into current market realities and their implications for security executives.
Posted: 12 Dec 2014 | Published: 11 Nov 2013

SafeNet, Inc.

Take Inventory of your Open Source Software Security
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Michael Cobb explains why enterprise development teams should create in-house repositories to mitigate the risks of applications built on open source code.
Posted: 25 Nov 2014 | Published: 25 Nov 2014

Hewlett-Packard Company

Relocating or Colocating Your Data Center in the Washington, DC/Baltimore Metro Area?
sponsored by CompuDynamics
RESOURCE: Access this resource to learn how colocation can help you handle these issues. You'll also get insight into whether you should consider retail or wholesale colocation or build your own new data center. Read on to evaluate your requirements and determine the best option for you.
Posted: 12 Dec 2014 | Published: 12 Dec 2014


IT and Executive Perspective on ITaaS
sponsored by EMC
WHITE PAPER: This white paper details a survey that compares two competing perspectives on various IT topics.
Posted: 01 Dec 2014 | Published: 01 Dec 2014

EMC

Examining the converged architecture solutions
sponsored by Presidio Network Solutions
EGUIDE: Access this white paper to explore why converged infrastructures are gaining popularity and a comparison of different converged infrastructure options and the benefits they can provide.
Posted: 09 Dec 2014 | Published: 09 Dec 2014

Presidio Network Solutions

Email Security Checklist: Eight Steps for Healthcare Organizations
sponsored by Mimecast
WHITE PAPER: This white paper explains how you can embrace email as a core communication tool while still adhering to HIPAA guidelines.
Posted: 18 Dec 2014 | Published: 18 Dec 2014

Mimecast

How Would Self-Reset Password Solutions Impact Enterprises Around the World?
sponsored by Tools4ever
WHITE PAPER: This white paper explores the results of a survey on self-reset password solutions and the impact that they could have on IT helpdesks.
Posted: 08 Dec 2014 | Published: 08 Dec 2014


NHS Migration Alert
sponsored by 1e Inc
WHITE PAPER: This white paper explores the dangers of failing to migrate away from Windows XP and gives tip to ease the migration. Read on to learn more.
Posted: 10 Dec 2014 | Published: 28 Aug 2014

1e Inc
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
Y2K White Papers | Y2K Multimedia | Y2K IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement