IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Degaussing

RSS Feed   
Degaussing White Papers (View All Report Types)
 
Taking Advantage of Multicore/Multiprocessor Technologies to Meet Today's Storage Needs
sponsored by Oracle India Pvt. Ltd
WHITE PAPER: This comprehensive white paper explores how Oracle's Sun ZFS Storage Appliances can perform complex processing for compression, deduplication, real-time storage analytics, and other advanced data services without slowing down I/O throughput and without costing more than competing solutions.
Posted: 17 May 2013 | Published: 24 Jun 2012

Oracle India Pvt. Ltd

Early Adopters Driving Smart Operations with IoT
sponsored by Mendix
WHITE PAPER: It’s been projected that IoT drive operations could generate up to $11.1 trillion per year by 2025 – so the urgency for businesses to explore this opportunity has become ever clearer. Use this whitepaper to review and evaluate real world IoT uses, top IoT industries, potential IoT applications, and more.
Posted: 19 Nov 2019 | Published: 19 Nov 2019

Mendix

Red Hat Ansible Tower Provides Powerful Automation to Simplify and Manage IT Systems
sponsored by Red Hat
WHITE PAPER: Dive into this report overview to take a closer look at the quantifiable – and unquantifiable – benefits of Red Hat Ansible Tower as a method for introducing powerful automation into IT systems management workflows.
Posted: 02 Dec 2019 | Published: 31 Jul 2018

Red Hat

Behavioral Biometrics: The Intelligent Safeguard Against Online Fraud
sponsored by Buguroo
WHITE PAPER: Behavioral biometrics can help users identify people by the unique way they interact with different devices, including computers (keyboard and mouse use), tablets or smartphones. Read on to learn how you can utilize behavioral biometrics techniques and AI deep learning algorithms to detect and predict cybercriminal activities at your organization.
Posted: 19 Nov 2019 | Published: 19 Nov 2019

Buguroo

Defining a Shared Responsibility Model for Amazon Web Services (AWS)
sponsored by Alert Logic
WHITE PAPER: In this e-book, discover a 5-step plan for using the AWS Shared Security Responsibility Model (SSRM) as a foundation for building a "cloud-first" cybersecurity defense plan.
Posted: 21 Nov 2019 | Published: 21 Nov 2019

Alert Logic

The Business Case for SOAR
sponsored by Siemplify
WHITE PAPER: Security orchestration, automation and response (SOAR) platforms are rapidly becoming a must-have solution for SOC teams to enable more effective and efficient detection, triage, investigation and remediation of threats. This resource details the various ways SOAR solutions can save security operations organizations millions. Read on to learn more.
Posted: 07 Nov 2019 | Published: 07 Nov 2019

Siemplify

CIS Critical Security Controls
sponsored by Splunk
WHITE PAPER: In this e-book, you'll learn what security professionals find suitable to support access controls. Discover ways to verify incoming data, execute the requirements needed, and support human activities associated with a control.
Posted: 15 Nov 2019 | Published: 31 Dec 2016

Splunk

Discover Hidden API Security Vulnerabilities and How to Defend Against Them
sponsored by Ping Identity Corporation
WHITE PAPER: Already an attractive target for bad actors, APIs are predicted to soon become the top attack vector. And while APIs may hold the key to compliance with regulations like GDPR, PSD2 and CDR, they also expose potential vulnerabilities. Read this white paper to gain a deeper visibility into your API activity today.
Posted: 13 Nov 2019 | Published: 13 Nov 2019

Ping Identity Corporation

Quantifying the Point Solution Nightmare
sponsored by Tanium
WHITE PAPER: Forrester, in partnership with Tanium, conducted research into the current state of security and operations tools, teams, and trends to quantify the complexity of endpoint security management and integration. Read on to uncover the results and conclusions.
Posted: 22 Nov 2019 | Published: 31 May 2019

Tanium

IBM Identity and Access Management Services: Costs and Benefits
sponsored by IBM
WHITE PAPER: Forrester recently partnered with IBM in a study designed to better understand the benefits, costs, and risks associated with identity-as-a-service (IDaaS), a cloud-based IAM deployment method. Read on to uncover the key findings from this study.
Posted: 14 Nov 2019 | Published: 30 Jun 2019

IBM
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement