IT Management  >   Systems Operations  >   Security  >  

National Security

RSS Feed   
National Security Reports
 
MapXTreme Java Edition Data Sheet
sponsored by Pitney Bowes Business Insight
DATA SHEET: MapXtreme Java is a 100% Java mapping engine designed to enable the use of location intelligence on the desktop, over the internet or through your organization intranet or extranet.
Posted: 17 Mar 2008 | Published: 01 Jan 2007

Pitney Bowes Business Insight

Pandemic IT Readiness
sponsored by Advizex
RESOURCE: COVID-19 still has a lot of unknowns, disrupting how individuals engage with businesses and complicating both individual and business plans for the foreseeable future. Luckily, Advizex has some advice. In this resource, learn how to keep your IT strategy pandemic-ready with Advizex’s 3-step solution.
Posted: 15 Sep 2020 | Published: 15 Sep 2020

TOPICS:  IT Management
Advizex

Redefining Enterprise Digital Transformation
sponsored by New Relic
WHITE PAPER: Time and time again, simplicity has proven to be more effective than sophistication. That’s why New Relic’s observability platform focuses on simplifying service delivery with tools for cloud-native applications and easily accessible data visualization. Learn how ANZ Bank benefitted from New Relic’s simplicity here.
Posted: 14 Sep 2020 | Published: 14 Sep 2020

TOPICS:  IT Management
New Relic

Dunkirk Enhances Microsoft 365 Email Security with Vade Secure for Microsoft 365
sponsored by Vade Secure
CASE STUDY: The victim of targeted attacks, the city and urban community of Dunkirk sought to bolster their defenses against email-based cyberattacks. This case study provides an overview of Dunkirk’s selection criteria as well as the results of their email security project – read on to get started.
Posted: 18 Sep 2020 | Published: 18 Sep 2020


Cybersecurity Perceptions vs Reality
sponsored by GoSecure
WHITE PAPER: This 29-page research report provides the key findings from a recent GoSecure survey designed to better understand the biases, gaps and misconceptions surrounding cybersecurity. Read on to learn more about this disconnect and discover how to address and overcome it.
Posted: 16 Sep 2020 | Published: 16 Sep 2020

GoSecure

Improving Online Customer Experience with Identity Management
sponsored by Okta
VIDEO: Does the adoption of identity and access management (IAM) affect organizations and users differently? In this video, join 2 distinguished security experts as they overview the affect that IAM can – and will – have on users across digital interactions.
Posted: 18 Sep 2020 | Premiered: 18 Sep 2020

Okta

Brand Perceptions of Managed Security Service Providers in Canada, 2020
sponsored by GoSecure
ANALYST REPORT: This IDC Market Presentation provides an analysis of Canadian brand perceptions of managed security service providers (MSSPs). Download the PDF presentation to see what criteria customers are using to purchase managed security services.
Posted: 17 Sep 2020 | Published: 17 Sep 2020

TOPICS:  Security
GoSecure

12 Essential Features of Advanced Endpoint Security Tools
sponsored by Claranet
EGUIDE: Endpoint protection of enterprise systems is an efficient method of managing software deployment and enforcing IT security operations' policies. However, it does more than protect a network from malware. Download this e-guide to learn how endpoint security can be used for a number of operation monitoring functions and data backup strategies.
Posted: 17 Sep 2020 | Published: 17 Sep 2020

Claranet

Airbus Cybersecurity Strengthens its Threat Intelligence with ThreatQuotient
sponsored by ThreatQuotient
CASE STUDY: How do you improve an already mature and reliable offering? For Airbus Cybersecurity, the answer was to enrich the threat intelligence service it had been offering customers since 2011 with contextual information at scale. Read this case study to learn how Airbus partnered with ThreatQuotient to achieve this.
Posted: 17 Sep 2020 | Published: 17 Sep 2020

ThreatQuotient

Post-Pandemic- 9 stages to take back control of your assets
sponsored by Livingstone Tech
WEBCAST: COVID-19 has changed the way businesses operate. While many of these operational changes have helped keep businesses afloat throughout this crisis, other temporary strategies have scattered IT. It’s time to take control of IT again. Learn about the 9 stages you can take to get back in control of your assets post-pandemic in this video.
Posted: 23 Sep 2020 | Premiered: Sep 23, 2020

TOPICS:  IT Management
Livingstone Tech
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info