Search Results for: Property-

Preventing Security Risks in real time
This resource investigates why developing security intelligence – the ability to predict, identify, and react to potential threats – is a key priority in today's evolving threat landscape.

IBM

Secure the Enterprise with Confidence
This informative paper examines how organizations are addressing this increase in security threats and how today's mainframe can be used as a secure application platform.

IBM

Should You Opt for Low-Code for Application Development?
This is a detailed report on the shifting trends of Application Development and how the Low-Code Approach is taking over the industry for an efficient and swift application development process. The report further explores the possibilities of Enterprise Low-Code Platforms and the potential of Low-Code development.

TOPICS: .NET
Damco Solutions Inc

Chapter 1: Security and Risk Management
In this 174-page chapter download from McGraw Hill, learn everything you need to know about the first domain, security and risk management, to help you excel at your CISSP exam.

McGraw Hill

IT Connects Customers to Brands
Paul Gillin, author of three social media marketing books, reveals how CIOs are becoming the designated guardians of intellectual property. As the use of social media tools grows, Gillen recommends how a CIO can stay in front of the widespread access and create enhanced customer experiences.

Cisco Systems, Inc.

Marin County Upgrades Tax System While Reducing the Costs of the Mainframe
The property tax system for Marin County, California, was increasingly expensive to maintain; furthermore, it was not possible to integrate it with newer modern technologies. Read this case study to learn how they updated and modernized this critical application without losing valuable IT assets embedded in the current system.

Micro Focus, Ltd

Virtualizing 3D professional graphics Key Project Design Guide
This whitepaper covers the value of virtualizing 3D professional graphics and provides an in-depth look and one solution's architecture.

NVIDIA

Threat Detection Technologies Technical Guide
This TechGuide will provide analysis of APT and ways to determine whether your organization risks exposure to targeted attacks. The chapters explore detection technologies, how to monitor insider threats and how to effectively use threat intelligence to defend against a targeted attack before it happens.

TechTarget Security

Information Governance for Business Value
In this expert e-guide, brought to you by searchCompliance.com, learn how incorporating IT compliance and information governance policy best practices can provide huge benefits to overall corporate strategy.

IBM

Sharing Sensitive Corporate Documents without Compromising Security and Governance
This informative resource discusses how your organization can utilize an IP security system built on a strong inter-enterprise document-sharing foundation to share sensitive documents without compromising security and governance.

IntraLinks, Inc