IT Management  >   Systems Operations  >   Security  >  

National Security

RSS Feed   
National Security Reports
MapXTreme Java Edition Data Sheet
sponsored by Pitney Bowes Business Insight
DATA SHEET: MapXtreme Java is a 100% Java mapping engine designed to enable the use of location intelligence on the desktop, over the internet or through your organization intranet or extranet.
Posted: 17 Mar 2008 | Published: 01 Jan 2007

Pitney Bowes Business Insight

Pivot3 Acuity: A High-performance Hyperconverged Platform with Advanced QoS
sponsored by Pivot3
WHITE PAPER: This ESG Lab resource reviews Pivot3 Acuity HCI, which features NVMe PCIe flash and policy-based quality of service to maintain predictable high performance for mixed-application workloads. Read on to see the results of this HCI solution tested on the likes of VDI and database workloads.
Posted: 16 Jan 2019 | Published: 31 Dec 2017


Top 10 Artificial Intelligence stories of 2018
sponsored by
EGUIDE: Some experts believe there are certain problem areas that the AI approaches currently in use cannot easily solve. Problems such as modelling climate change show the limits of AI pattern matching. Instead, something is needed that can combine machine learning with physical modelling. Here are Computer Weekly's top 10 AI stories of 2018.
Posted: 02 Jan 2019 | Published: 02 Jan 2019

Meet the Experts: Open Source Security 101
sponsored by WhiteSource
WEBCAST: According to Forrester, 80% of developers used open source in their applications in the past year. When using open source, you must consider the security of the application. This webinar provides a high level overview of considerations that engineering teams and security officers should keep in mind when tackling open source security issues.
Posted: 14 Jan 2019 | Premiered: Jan 26, 2017


DevSecOps: Key to Expanding the Borders of Critical, Pervasive Visibility in the Digital Age
sponsored by NetScout - Just Media
WHITE PAPER: In this white paper, learn about the need for development, security and operations teams (DevSecOps) to deliver high performance and secure application functionality required of the business and it's end-users.
Posted: 16 Jan 2019 | Published: 16 Jan 2019

NetScout - Just Media

2018 Cybersecurity Report Card: Organizations Rate their Security Posture and Share Best Practices
sponsored by DomainTools
WHITE PAPER: Responses from the 2018 Report Card survey shed light on how cybersecurity practices are evolving, and what the most successful organizations are doing to ensure they stay ahead of the ever-growing and changing threat landscape. This report outlines key findings from the survey and suggests how companies can improve their security efforts.
Posted: 10 Jan 2019 | Published: 31 Dec 2018


Making a DDoS Protection Plan: 8 Best Practices
sponsored by Akamai Technologies
WHITE PAPER: Having a DDoS protection plan in place when an attack strikes will make the difference between organization-wide panic and an orderly and timely response that keeps business as usual. In this white paper, learn about 8 best practices for building and maintaining a DDoS protection plan.
Posted: 27 Dec 2018 | Published: 30 Sep 2017

Akamai Technologies

Web Application Firewalls: 2018 Executive Summary
sponsored by Akamai Technologies
RESEARCH CONTENT: Enterprise security teams considering WAFs should evaluate the pros and cons of stand-alone and cloud-based WAFs for their specific environments. Download this executive summary of the 2018 Gartner Magic Quadrant for Web Application Firewalls for guidance on vendors and specific products in the WAF arena.
Posted: 26 Dec 2018 | Published: 26 Dec 2018

Akamai Technologies

Anderson IT Management Builds World-Class Hosting Platform with Hyperconverged Infrastructure
sponsored by Pivot3
CASE STUDY: Read this study to learn why, after thorough evaluation, Anderson IT chose a hyper-converged system as the foundation for their cloud hosting platform, including the specific benefits HCI brings to private cloud.
Posted: 16 Jan 2019 | Published: 31 Dec 2017


Equifax Breach Lessons: How to Avoid Becoming the Next Victim
sponsored by WhiteSource
WEBCAST: Learn about the story behind the largest data breach to date. Understand the root cause, the timeline and why it was preventable. This webcast offers advice on how to avoid being the next Equifax. Some key suggestions include: implementing the right solution, changing the way you think and deal with application security and acting fast.
Posted: 14 Jan 2019 | Premiered: Nov 9, 2017


About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement