Public Policy Making

RSS Feed   
Public Policy Making White Papers (View All Report Types)
25 Matches
MicroScope September 2013: A special issue covering the public sector
sponsored by MicroScope
EZINE: A themed issue examining the potential revenue opportunities for resellers that focus on the public sector.
Posted: 05 Sep 2013 | Published: 06 Sep 2013

MicroScope

Focus: IT for government and public sector
sponsored by ComputerWeekly.com
EGUIDE: It's been a busy few months for government IT as plans for a post-Brexit Britain are being drawn up. In this e-guide we look at the government's ideas for a prosperous post-Brexit Britain, and its ambitious 5G strategy.
Posted: 27 Mar 2017 | Published: 27 Mar 2017

ComputerWeekly.com

Government IT strategy & challenges in Australia
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, you can read more about the challenges that Australia's government is facing in bringing the country's national fibre network up to speed, its plans to push ahead with decryption laws and what it is doing to safeguard critical infrastructure from cyber-attacks.
Posted: 30 Aug 2017 | Published: 30 Aug 2017

ComputerWeekly.com

Energy Efficiency, Public Policy, Utilities and Data Center
sponsored by Dell, Inc. and Intel®
WHITE PAPER: While CIOs are focusing on managing services offerings, managing data center risks and keeping total costs down, forces are at play that will require the CIO to pay significantly more attention to data center energy efficiency and resource consumption. Read this paper to learn more.
Posted: 28 Jul 2010 | Published: 28 Jul 2010

Dell, Inc. and Intel®

The Public Sector Guide to Text Messaging Policy and Retention
sponsored by Smarsh
WHITE PAPER: Sending text messages between mobile devices is now public business, and by law, the records need to be preserved. This white paper contains steps that will help public sector organizations develop a text message policy and retention strategy to protect against the risk involved with use of this popular, universal form of communication.
Posted: 18 Dec 2018 | Published: 18 Dec 2018

Smarsh

Make Group Policies Do More and Reach Further
sponsored by Dell Software
WHITE PAPER: This white paper introduces the latest desktop management platform that can help expand the benefits of Group Policy and overcome its various deficiencies. Explore the advantages it can provide and review the advanced features it offers.
Posted: 25 Jun 2012 | Published: 20 Jun 2012

Dell Software

Making Sense of Cloud Costs
sponsored by TechTarget
RESOURCE: It's hard enough to keep track of all the different ways you use the cloud. Keeping an eye on the cost of all these services is nearly impossible. In this e-Guide, we assess the state of cloud cost management for you, so your business can make the right cost-effective decision without creating a fuss. Download the e-Guide below to learn more.
Posted: 22 Apr 2020 | Published: 28 Mar 2020

TechTarget

Cloud Security: A process, not a product
sponsored by Red Hat
PRESENTATION TRANSCRIPT: This presentation transcript explores how you can develop a comprehensive cloud security plan and leverage the tools you already have to make your data safe in cloud environments.
Posted: 15 May 2012 | Published: 15 May 2012

Red Hat

Presentation Transcript: Setting up Security Policies and Procedures for the Cloud
sponsored by Webroot
PRESENTATION TRANSCRIPT: This presentation transcript provides a framework for enterprises to transition to the cloud safely, as well as examines specific considerations for private, public and hybrid cloud initiatives and the controls you'll need to consider for each model.
Posted: 19 Aug 2011 | Published: 19 Aug 2011

Webroot

The Making of a Cloud Security Culture
sponsored by Trend Micro, Inc.
EGUIDE: This e-guide emphasizes the importance of cultivating a cloud security culture and discusses the key benefits and differences between public and hybrid cloud. Access now to learn how your organization can achieve a secure cloud environment.
Posted: 16 Feb 2016 | Published: 11 Feb 2016

Trend Micro, Inc.

What Makes A Standalone IPS So Effective?
sponsored by Trend Micro
WHITE PAPER: In this white paper, explore the guiding principles security researchers need to follow when designing and developing effective vulnerability filters, with examples of how these filters can be used by an IPS to detect and block the latest threats.
Posted: 12 Mar 2020 | Published: 01 Oct 2019

Trend Micro

PKI Certificates - A Source of Confusion?
sponsored by ArticSoft
WHITE PAPER: If you look inside MS Outlook at the security tab or you visit any of your favorite PKI or CA vendors, you will be educated in the need to understand the certificate.
Posted: 04 Apr 2002 | Published: 19 Feb 2002


Revisiting Public Cloud Security
sponsored by Barracuda
WHITE PAPER: From a survey of 300 ITDMs, this report digs into the benefits and challenges of the public cloud and revisits several strategies to strengthen security. Read on to ensure your organization's public cloud security posture is in good standing.
Posted: 25 Apr 2019 | Published: 25 Apr 2019

Barracuda

Streamline Compliance & Automate Audit Efforts
sponsored by Onapsis
DATA SHEET: Learn how Onapsis allows you to deliver actionable risk intelligence, continuous threat monitoring, and automated policy and risk governance.
Posted: 27 Aug 2019 | Published: 27 Aug 2019

Onapsis

How to make the business case for de-perimeterisation
sponsored by ComputerWeekly.com
WHITE PAPER: Computing history can be defined in terms of increasing connectivity over time, starting fromno connectivity and developing to the restricted connectivity we currently have today, withislands of corporate connectivity behind their managed perimeter.
Posted: 20 Oct 2011 | Published: 09 Nov 2010

ComputerWeekly.com

Linear Architecture for Municipal Wireless Video Surveillance Solutions
sponsored by Motorola, Inc.
WHITE PAPER: Motorola knows how to build systems that meet the needs of Public Safety professionals now and over the lifetime of the network. No one technology meets the needs of all applications. With a portfolio of specialized solutions, CIOs and network operators can deploy the network that is the best fit to locate the cameras exactly where they are needed.
Posted: 21 Aug 2009 | Published: 20 Aug 2009

Motorola, Inc.

ITProTV | Microsoft AZ 500: Create, Configure, Network, App Security Groups
sponsored by Cornerstone OnDemand
WEBCAST: In this video, learn what Network Security Groups and Application Security Groups are, and explore the 7 steps required to filter network traffic with a network security group using the Azure Portal.
Posted: 25 Jun 2020 | Premiered: Jun 25, 2020

Cornerstone OnDemand

Build your Content Security and Document Management Plan
sponsored by Adobe
EGUIDE: In this expert e-guide, we explore how you can create an effective content security and document management strategy. Discover 5 tips for a sound content security policy and learn about the differences between digital signature, e-signature, and digital certificates.
Posted: 27 Feb 2018 | Published: 22 Feb 2018

Adobe

Addressing Compliance Initiatives with Center for Internet Security Benchmarks
sponsored by Tripwire, Inc.
WHITE PAPER: This whitepaper details the background you need to build an effective compliance program by understanding benchmarks, the basic building blocks of compliance initiatives. You'll learn about the benchmarks specified by the Center for Internet Security (CIS), which are often used as a starting point for creating a compliance initiative.
Posted: 30 Mar 2009 | Published: 01 Jan 2009

Tripwire, Inc.

The Role of Password Management in Achieving Compliance
sponsored by PistolStar, Inc.
WHITE PAPER: This paper will look at the dramatic impact password management solutions have had on organizations.
Posted: 13 Jun 2008 | Published: 01 Jan 2006

PistolStar, Inc.

Key Considerations when Making the Move to Office 365
sponsored by Smarsh
WHITE PAPER: In this white paper, discover key considerations firms should address to make their Office 365 migration more efficient and cost effective as well as how to deploy Office 365 while maintaining regulatory compliance.
Posted: 26 Sep 2019 | Published: 26 Sep 2019

Smarsh

Password Management
sponsored by SailPoint Technologies
VIDEO: Learn how SailPoint makes it easy for users to manage their passwords, while still complying with organizational security policies.
Posted: 21 Jul 2020 | Premiered: 21 Jul 2020

SailPoint Technologies

Analytical reporting: Inside IBM Cognos
sponsored by IBM
WHITE PAPER: The following white paper outlines an analytics solution that can provide a full range of analytic capabilities to your entire organization that will lead to a much stronger competitive presence in today's market.
Posted: 07 Nov 2013 | Published: 07 Nov 2013

IBM

Computer Weekly - 28 February 2012: Taking UK government into the cloud
sponsored by ComputerWeekly.com
EZINE: This week's edition asks, now that the the G-Cloud store is up and running, will the government's cloudstore transform the market for public sector IT buyers and suppliers? It also examines research that has indicated OS upgrades will attract a significant chunk of investment this year.
Posted: 27 Feb 2012 | Published: 28 Feb 2012

ComputerWeekly.com

Your Role in AWS Security
sponsored by SearchAWS
EBOOK: This handbook features how AWS's IAM capabilities, particularly the ability to create groups, form the basis for a secure AWS access policy. Plus, uncover FAQs about AWS security as cloud expert Dan Sullivan examines the role OS's can play in bolstering the security of an AWS environment.
Posted: 25 Aug 2015 | Published: 25 Aug 2015

SearchAWS
25 Matches

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info