Vertical Industries  >  

Defense Industry

RSS Feed   
Defense Industry Reports
 
Computer Weekly – 18 July 2017: Airbus secures critical infrastructure
sponsored by ComputerWeekly.com
EZINE: This week, Computer Weekly explores how to secure industrial control systems, which have often lagged behind the leading edge of IT security and pose serious risks to critical national infrastructure. Airbus believes that despite the vulnerabilities of individual components, industrial control systems as a whole are quite resilient.
Posted: 17 Jul 2017 | Published: 17 Jul 2017

ComputerWeekly.com

Four Key Elements to Improving Systems Engineering in Aerospace and Defense
sponsored by IBM
WEBCAST: This webcast explores four key ways in which A&D companies can improve SE and looks at IBM Rational® solutions and approaches that can help organizations deliver quality products on time and within budget, while increasing efficiency and improving collaboration.
Posted: 13 Dec 2010 | Premiered: Dec 13, 2010

IBM

Creating an Online Parts Catalog to Increase Part Sales and Improve Aftermarket Customer Satisfaction
sponsored by Enigma, Inc.
WHITE PAPER: This white paper documents the experiences of three companies that have implemented Enigma's electronic parts catalogs.
Posted: 11 Mar 2008 | Published: 01 Jan 2008

Enigma, Inc.

Successfully Managing Programs and Risk in the Aerospace and Defense Industry
sponsored by Oracle Corporation
WHITE PAPER: Succeeding in this difficult environment requires an enterprise software solution that enables aerospace and defense companies to plan and execute programs and projects, demonstrate earned value compliance and manage resources and costs. Enterprise project portfolio management (EPPM) applications help meet these challenges.
Posted: 05 Apr 2010 | Published: 19 Feb 2010

Oracle Corporation

Requirements Engineering for the Aerospace and Defense Industry
sponsored by IBM
WHITE PAPER: A requirements engineering approach can help product and systems development organizations work in harmony. Read this white paper for an exploration of requirements engineering and its important role in product development.
Posted: 12 Apr 2010 | Published: 22 Jun 2009

IBM

Computer Weekly – 26 January 2021: 'Salad as a service' – how tech could revolutionise farming
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how new technologies are supporting the rise of vertical farming, and could revolutionise food supply chains. We examine one of the biggest trends in the cloud – serverless computing. And Brexit has not yet ended the debate about UK-EU data protection. Read the issue now.
Posted: 25 Jan 2021 | Published: 26 Jan 2021

ComputerWeekly.com

Computer Weekly – 20 March 2018: Where neuroscience meets technology
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how computer scientists are using data, cloud and virtual reality to understand the brain and improve mental wellbeing. We analyse newly published government documents detailing the early problems with Universal Credit. And we look at how AI can help improve cyber security. Read the issue now.
Posted: 16 Mar 2018 | Published: 16 Mar 2018

ComputerWeekly.com

Measuring the Business Impacts of Effective Data: Chapter One of a Three-Part Study
sponsored by Sybase, an SAP company
WHITE PAPER: This study of over 150 Fortune 1000 firms from every major industry or vertical explores issues associated with the lifeblood of today’s enterprises: data. The findings demonstrate the often dramatic impacts that even marginal investments in information technology can have when that technology addresses data quality, usability, and intelligence.
Posted: 02 Nov 2010 | Published: 02 Nov 2010

Sybase, an SAP company

Small Form Factor (SFF) SAS - Meeting the Demanding Requirements in Specific Markets
sponsored by Xtore
WHITE PAPER: SAS technology has been proven to be the most versatile storage solution in data transfer and high performance. Read this white paper to learn about a solution that renders the necessary performance needed for your client's expanding market requirements.
Posted: 22 Aug 2007 | Published: 01 Aug 2007

Xtore

Analyst's take: Siemens product lifecycle management software solutions for aerospace industry
sponsored by ComputerWeekly.com
WHITE PAPER: Siemens supports solutions for service and sustainment in the aerospace and defense industries that enable companies to reduce service costs and time cycles while increasing profitability across the service life of products.
Posted: 26 Oct 2011 | Published: 17 Jan 2011

ComputerWeekly.com

Defense contractor automates user & machine authentication to secure every digital interaction
sponsored by Axiad
CASE STUDY: Ensuring data and systems are secure is paramount in the aerospace and defense industry. In this case study, discover how a defense contractor was able to secure their digital interactions by automating, unifying and securing their disparate authentication systems.
Posted: 19 May 2021 | Published: 27 Apr 2021

TOPICS:  Cybersecurity
Axiad

Strategies for Profitable Growth - Aerospace & Defense Manufacturing
sponsored by SAP AG
WHITE PAPER: Examine the comprehensive strategies, solutions, and best practices for the aerospace and defense (A&D) manufacturing industry based on technical and business expertise. Learn best practices and strategies for profitable growth in your business.
Posted: 21 Feb 2008 | Published: 01 Jan 2005

SAP AG

Cyber Scouting Case Study with External Innovation Software
sponsored by Ezassi
CASE STUDY: A global management consulting firm in the defense industry was seeking to understand the current state of employment satisfaction among cybersecurity professionals, but their traditional scouting attempts were unsuccessful. Open up this case study to see how Ezassi was able to help the firm with their dilemma.
Posted: 03 Aug 2021 | Published: 03 Aug 2021

Ezassi

Cyber defense: Understanding and combating the threat
sponsored by IBM
WHITE PAPER: The Global Defense Solutions Projects and Defense Exchange Conference (SPADE) is held annually to bring together organizations involved in network-centric operations, intelligence activities and other defense aspects. This resource explains some of the important topics.
Posted: 20 Jul 2012 | Published: 20 Jul 2012

IBM

Industrial Cyber Risk Management White Paper
sponsored by Dragos
WHITE PAPER: Industrial cyber risk has emerged as organizations become increasingly reliant on digital communications channels. This comprehensive e-guide dives head-first into the world of industrial cyber risk management – offering guidance, insights, best practices, and more. Read on to get started.
Posted: 08 Apr 2021 | Published: 08 Apr 2021

TOPICS:  Cybersecurity
Dragos

White Paper Hybrid Ai Offers The Cybersecurity Industry’s Most Effective Defense
sponsored by Arctic Wolf
WHITE PAPER: When it comes to modern cybersecurity, should you turn to human-powered security teams or AI-based tools and processes? This white paper explores each option and introduces hybrid AI – an approach to security that combines the best of both man and machine cyberdefense efforts. Read on to get started.
Posted: 01 Jul 2021 | Published: 01 Jul 2021

Arctic Wolf

Close the Gaps in Your Defenses With Automated Detection, Investigation and Response
sponsored by Splunk
WHITE PAPER: This e-book explores the anatomy of a truly integrated defense, including automated detection, investigation and response. Read on to start thinking about where the gaps might be in your own environment, so you can build a strategy to lock them down for good.
Posted: 21 May 2020 | Published: 21 May 2020

Splunk

Endpoint Defense: Security Controls to Consider Now
sponsored by TechTarget
RESOURCE: The total cost of a successful attack is over $5 million, according to Ponemon Institute's 2017 State of Endpoint Security Risk Report. Simply complete our Endpoint Security Survey to access our complimentary expert guide, Endpoint Defense: Security Controls to Consider Now.
Posted: 03 Mar 2018 | Published: 03 Mar 2018

TechTarget

Endpoint Defense: Security Controls to Consider Now
sponsored by TechTarget
RESOURCE: The total cost of a successful attack is over $5 million, according to Ponemon Institute's 2017 State of Endpoint Security Risk Report. Simply complete our Endpoint Security Survey to access our complimentary expert guide, Endpoint Defense: Security Controls to Consider Now.
Posted: 23 Apr 2020 | Published: 23 Apr 2020

TechTarget

Enable And Protect Your Remote Workforce
sponsored by AT&T Cybersecurity
WHITE PAPER: Download this white paper to learn about the cybersecurity challenges associated with an increasingly remote and virtual workforce, and what to look for in a remote security solution.
Posted: 30 Oct 2020 | Published: 30 Oct 2020

AT&T Cybersecurity

New Mobile Risks Call for a Layered Security Approach
sponsored by SearchCIO.com
EBOOK: As enterprises' mobile footprints grow, so do the security risks. A single-pronged security approach is no longer enough. Download this handbook to discover how to build a layered enterprise mobile security strategy.
Posted: 09 Aug 2016 | Published: 09 Aug 2016

TOPICS:  CIOs
SearchCIO.com

New Requirements to be a U.S. Defense Supplier
sponsored by Interos
WEBCAST: The government is updating industrial regulations including NDAA S. 889, 5G policy, and CMMC for national security and global competitiveness reasons. Complying with these will require a rapid review of supply chains. Watch this webinar to review the new regulations, and the challenges companies are facing to understand and comply with them.
Posted: 04 Mar 2021 | Premiered: Mar 4, 2021

TOPICS:  ERP
Interos

The Custom Defense - Your Answer to APTs
sponsored by Trend Micro
VIDEO: Explore an innovative new technology available to help your organization combat potentially disastrous advanced persistent threats (APTs).
Posted: 17 Apr 2013 | Premiered: 17 Apr 2013

Trend Micro

Presentation Transcript: How Application Whitelisting Can Increase Your Desktop Security
sponsored by Faronics
PRESENTATION TRANSCRIPT: In the past, many security pros relied on one technology to protect their computers and networks. Today, most organizations use several technologies to protect their organization. In this Presentation Transcript, learn how application whitelisting enhances current defenses and covers situations not addressed by firewalls and antivirus utilities.
Posted: 07 Jan 2010 | Published: 07 Jan 2010

Faronics

Layered Security Doesn't Stop Cybercriminals – but VDI Might
sponsored by Dell, Microsoft and Citrix
EGUIDE: This exclusive e-guide discusses ways cybercriminals successfully breach even the most well-secured enterprise defenses. Read on and learn how VDI can offer an enhanced level of security enterprises require.
Posted: 10 Feb 2016 | Published: 03 Feb 2016

Dell, Microsoft and Citrix

IT INDUSTRY OUTLOOK
sponsored by CompTIA
WHITE PAPER: CompTIA's IT Industry Outlook 2021 is a research report that explores the trends shaping the industry, its workforce and its business models. Learn factors that could positively and negatively impact business growth in 2021, 2021 budget projections compared to 2020, and more.
Posted: 12 Feb 2021 | Published: 12 Feb 2021

CompTIA

Building robust defenses with limited resources
sponsored by Kaspersky
WHITE PAPER: 91% of organizations have experienced at least one attack in the course of a year. It has become clear that security, particularly endpoint security, cannot be ignored. In order to get a proper return on investment, your security must be both comprehensive and targeted. Get into this white paper to learn how to maximize your resources.
Posted: 07 Aug 2020 | Published: 07 Aug 2020

Kaspersky

Defense-In-Depth Security: Key to Keeping IT Safe
sponsored by SearchSecurity.com
EBOOK: The enterprise perimeter's demise is in part due to BYOD. Leverage this expert handbook to uncover an effective approach to constructing your IT security "fortress" and replacing the outdated idea of a security perimeter.
Posted: 19 Jan 2018 | Published: 19 Jan 2018

SearchSecurity.com

What's a Better Defense Against Ransomeware
sponsored by Infrascale
QSO INCENTIVE: Take a quick survey to access a white paper outlining the steps needed and the time required to recover your production database from a recent cloud backup and contrast that experience with the recovery process if a DRaaS (Disaster Recovery as a Service) solution was in place.
Posted: 22 Sep 2021 | Published: 22 Sep 2021

TOPICS:  Security
Infrascale
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences