Public Policy Making

RSS Feed   
Public Policy Making White Papers (View All Report Types)
25 Matches
MicroScope September 2013: A special issue covering the public sector
sponsored by MicroScope
EZINE: A themed issue examining the potential revenue opportunities for resellers that focus on the public sector.
Posted: 05 Sep 2013 | Published: 06 Sep 2013

MicroScope

Focus: IT for government and public sector
sponsored by ComputerWeekly.com
EGUIDE: It's been a busy few months for government IT as plans for a post-Brexit Britain are being drawn up. In this e-guide we look at the government's ideas for a prosperous post-Brexit Britain, and its ambitious 5G strategy.
Posted: 27 Mar 2017 | Published: 27 Mar 2017

ComputerWeekly.com

Government IT strategy & challenges in Australia
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, you can read more about the challenges that Australia's government is facing in bringing the country's national fibre network up to speed, its plans to push ahead with decryption laws and what it is doing to safeguard critical infrastructure from cyber-attacks.
Posted: 30 Aug 2017 | Published: 30 Aug 2017

ComputerWeekly.com

Energy Efficiency, Public Policy, Utilities and Data Center
sponsored by Dell, Inc. and Intel®
WHITE PAPER: While CIOs are focusing on managing services offerings, managing data center risks and keeping total costs down, forces are at play that will require the CIO to pay significantly more attention to data center energy efficiency and resource consumption. Read this paper to learn more.
Posted: 28 Jul 2010 | Published: 28 Jul 2010

Dell, Inc. and Intel®

The Public Sector Guide to Text Messaging Policy and Retention
sponsored by Smarsh
WHITE PAPER: Sending text messages between mobile devices is now public business, and by law, the records need to be preserved. This white paper contains steps that will help public sector organizations develop a text message policy and retention strategy to protect against the risk involved with use of this popular, universal form of communication.
Posted: 18 Dec 2018 | Published: 18 Dec 2018

Smarsh

Make Group Policies Do More and Reach Further
sponsored by Dell Software
WHITE PAPER: This white paper introduces the latest desktop management platform that can help expand the benefits of Group Policy and overcome its various deficiencies. Explore the advantages it can provide and review the advanced features it offers.
Posted: 25 Jun 2012 | Published: 20 Jun 2012

Dell Software

Cloud Security: A process, not a product
sponsored by Red Hat
PRESENTATION TRANSCRIPT: This presentation transcript explores how you can develop a comprehensive cloud security plan and leverage the tools you already have to make your data safe in cloud environments.
Posted: 15 May 2012 | Published: 15 May 2012

Red Hat

Signed, Sealed, and Delivered
sponsored by GlobalSign
EBOOK: Managing digital certificates can be overwhelming and difficult to maintain. In this e-book, learn how automation is making it easier than ever before to centralize and control certificate activity.
Posted: 16 Mar 2020 | Published: 16 Mar 2020

GlobalSign

Making Sense of Cloud Costs
sponsored by TechTarget
RESOURCE: It's hard enough to keep track of all the different ways you use the cloud. Keeping an eye on the cost of all these services is nearly impossible. In this e-Guide, we assess the state of cloud cost management for you, so your business can make the right cost-effective decision without creating a fuss. Download the e-Guide below to learn more.
Posted: 04 Mar 2020 | Published: 28 Mar 2020

TechTarget

What Makes A Standalone IPS So Effective?
sponsored by Trend Micro
WHITE PAPER: In this white paper, explore the guiding principles security researchers need to follow when designing and developing effective vulnerability filters, with examples of how these filters can be used by an IPS to detect and block the latest threats.
Posted: 12 Mar 2020 | Published: 01 Oct 2019

Trend Micro

How to make the business case for de-perimeterisation
sponsored by ComputerWeekly.com
WHITE PAPER: Computing history can be defined in terms of increasing connectivity over time, starting fromno connectivity and developing to the restricted connectivity we currently have today, withislands of corporate connectivity behind their managed perimeter.
Posted: 20 Oct 2011 | Published: 09 Nov 2010

ComputerWeekly.com

Presentation Transcript: Setting up Security Policies and Procedures for the Cloud
sponsored by Webroot
PRESENTATION TRANSCRIPT: This presentation transcript provides a framework for enterprises to transition to the cloud safely, as well as examines specific considerations for private, public and hybrid cloud initiatives and the controls you'll need to consider for each model.
Posted: 19 Aug 2011 | Published: 19 Aug 2011

Webroot

Revisiting Public Cloud Security
sponsored by Barracuda
WHITE PAPER: From a survey of 300 ITDMs, this report digs into the benefits and challenges of the public cloud and revisits several strategies to strengthen security. Read on to ensure your organization's public cloud security posture is in good standing.
Posted: 25 Apr 2019 | Published: 25 Apr 2019

Barracuda

The Making of a Cloud Security Culture
sponsored by Trend Micro, Inc.
EGUIDE: This e-guide emphasizes the importance of cultivating a cloud security culture and discusses the key benefits and differences between public and hybrid cloud. Access now to learn how your organization can achieve a secure cloud environment.
Posted: 16 Feb 2016 | Published: 11 Feb 2016

Trend Micro, Inc.

PKI Certificates - A Source of Confusion?
sponsored by ArticSoft
WHITE PAPER: If you look inside MS Outlook at the security tab or you visit any of your favorite PKI or CA vendors, you will be educated in the need to understand the certificate.
Posted: 04 Apr 2002 | Published: 19 Feb 2002


Linear Architecture for Municipal Wireless Video Surveillance Solutions
sponsored by Motorola, Inc.
WHITE PAPER: Motorola knows how to build systems that meet the needs of Public Safety professionals now and over the lifetime of the network. No one technology meets the needs of all applications. With a portfolio of specialized solutions, CIOs and network operators can deploy the network that is the best fit to locate the cameras exactly where they are needed.
Posted: 21 Aug 2009 | Published: 20 Aug 2009

Motorola, Inc.

Streamline Compliance & Automate Audit Efforts
sponsored by Onapsis
DATA SHEET: Learn how Onapsis allows you to deliver actionable risk intelligence, continuous threat monitoring, and automated policy and risk governance.
Posted: 27 Aug 2019 | Published: 27 Aug 2019

Onapsis

The Move to Multiple Public Clouds Creates Security Silos
sponsored by Radware
WHITE PAPER: The migration of data to the cloud appears to be a trend that isn’t slowing down. Luckily for security teams, ensuring the protection of this critical data has come a long way. This report highlights the key findings of a study designed to further understand the impact of cloud migration on cybersecurity. Read on to unlock the results.
Posted: 03 Apr 2020 | Published: 03 Apr 2020

Radware

Making an Impact with Security Awareness Training
sponsored by Mimecast
ANALYST REPORT: Employees are the last line of defense against cyberattacks, and in too many cases these defenses fail. In this report, learn how to create a successful security awareness training program.
Posted: 02 Aug 2019 | Published: 15 Oct 2018

Mimecast

Key Considerations when Making the Move to Office 365
sponsored by Smarsh
WHITE PAPER: In this white paper, discover key considerations firms should address to make their Office 365 migration more efficient and cost effective as well as how to deploy Office 365 while maintaining regulatory compliance.
Posted: 26 Sep 2019 | Published: 26 Sep 2019

Smarsh

Addressing Compliance Initiatives with Center for Internet Security Benchmarks
sponsored by Tripwire, Inc.
WHITE PAPER: This whitepaper details the background you need to build an effective compliance program by understanding benchmarks, the basic building blocks of compliance initiatives. You'll learn about the benchmarks specified by the Center for Internet Security (CIS), which are often used as a starting point for creating a compliance initiative.
Posted: 30 Mar 2009 | Published: 01 Jan 2009

Tripwire, Inc.

Automated Compliance: Making the Case and Reaping the Rewards
sponsored by Tripwire, Inc.
PODCAST: Regulatory compliance is a priority that never goes away for banking institutions. In this podcast, learn about the core competencies of regulatory compliance and the regulatory compliance trends to watch for in 2009.
Posted: 30 Mar 2009 | Premiered: Mar 30, 2009

Tripwire, Inc.

The Role of Password Management in Achieving Compliance
sponsored by PistolStar, Inc.
WHITE PAPER: This paper will look at the dramatic impact password management solutions have had on organizations.
Posted: 13 Jun 2008 | Published: 01 Jan 2006

PistolStar, Inc.

Build your Content Security and Document Management Plan
sponsored by Adobe Inc
EGUIDE: In this expert e-guide, we explore how you can create an effective content security and document management strategy. Discover 5 tips for a sound content security policy and learn about the differences between digital signature, e-signature, and digital certificates.
Posted: 27 Feb 2018 | Published: 22 Feb 2018

Adobe Inc

Expert Tips: Enhancing security in a cloud environment
sponsored by SearchSecurity.com
EGUIDE: Security in the cloud is essential and this white paper explores the best ways to protect your critical data. Inside, learn practical steps to understanding cloud security and discover tips for choosing the best cloud vendor.
Posted: 05 Jun 2012 | Published: 05 Jun 2012

SearchSecurity.com
25 Matches

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info