IT Management  >   Systems Operations  >   Security  >  

National Security

RSS Feed   
National Security Reports
 
MapXTreme Java Edition Data Sheet
sponsored by Pitney Bowes Business Insight
DATA SHEET: MapXtreme Java is a 100% Java mapping engine designed to enable the use of location intelligence on the desktop, over the internet or through your organization intranet or extranet.
Posted: 17 Mar 2008 | Published: 01 Jan 2007

Pitney Bowes Business Insight

Webinar: Top 6 Security Needs for APIs and Serverless Apps
sponsored by Data Theorem
VIDEO: In this webinar, discover the top 6 API security needs for APIs and apps across serverless platforms such as AWS Lambda, Google Cloud Functions and Azure Functions.
Posted: 12 Apr 2019 | Premiered: 12 Apr 2019

Data Theorem

Simplify And Automate Data Protection For VMware
sponsored by Dell EMC
WHITE PAPER: The increasing reliance on virtual machines is bringing challenges for data protection, as businesses find themselves utilizing public and private clouds while at the same time moving toward their own software-defined data centers. This white paper outlines a strategy for applying automation and orchestration to automatically protect workloads.
Posted: 11 Apr 2019 | Published: 11 Apr 2019

Dell EMC

Advanced Threat Prevention Appliance
sponsored by Juniper Networks
WHITE PAPER: Organizations worldwide face security and productivity challenges every day. Additionally, security teams often fail to recognize and act on critical incidents. In this white paper, learn how the Juniper Networks Advanced Threat Prevention Appliance can protect organizations from cyberattacks.
Posted: 17 Apr 2019 | Published: 31 Oct 2018

Juniper Networks

Security Automation Best Practices
sponsored by Rapid7
WHITE PAPER: While processes make it possible to get a job done faster, creating ones that solve practical problems and result in measurable efficiency gains can be a time-consuming task. This is where security automation comes in. In this white paper, explore 4 best practices to help ensure your security team is successful with automation.
Posted: 05 Apr 2019 | Published: 05 Apr 2019

Rapid7

The exploitation of flaws in the HTTPS protocol
sponsored by ComputerWeekly.com
RESEARCH CONTENT: For both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.
Posted: 16 Apr 2019 | Published: 16 Apr 2019

ComputerWeekly.com

The Convergence Of Physical And Logical Access: What It Really Means For An Organization's Security
sponsored by HID Global
WHITE PAPER: For many security professionals, recent high-profile data breaches have shifted attention to external cyberthreats. In this white paper, learn how by addressing both physical and logical access in a more unified approach, organizations can reduce their risk for a costly breach while also improving user experience and operational efficiency.
Posted: 10 Apr 2019 | Published: 10 Apr 2019

HID Global

Introducing the Verizon Risk Report
sponsored by Verizon
RESEARCH CONTENT: This Verizon Risk Report uses daily threat cyber-risk intelligence from multiple sources allowing businesses to make data-driven security decisions and focus their security spending on where it will have the most impact.
Posted: 15 Apr 2019 | Published: 15 Apr 2019

Verizon

PCI and GDPR Data Protection Requirements Met with Zero Downtime
sponsored by comForte AG
WHITE PAPER: Bankart is a card payments processing center which has several files and databases in their network that contain cardholder data, all of which need to be protected from threats. In this case study, learn how Bankart was able to protect the sensitive data by using comforte's SecurDPS.
Posted: 15 Apr 2019 | Published: 15 Apr 2019

comForte AG

Shipping Fast
sponsored by Trend Micro, Inc.
WEBCAST: In the security world, you don't normally hear people talking about moving fast. However, a modern and resilient security strategy is just as fast as the rest of your business. In this webcast, listen as Mark Nunnikhoven, VP of Cloud Research at Trend Micro discusses the benefits of reducing the number of security tools your team uses.
Posted: 05 Apr 2019 | Premiered: Apr 5, 2019

Trend Micro, Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement