IT Management  >   Systems Operations  >   Security  >  

National Security

RSS Feed   
National Security Reports
MapXTreme Java Edition Data Sheet
sponsored by Pitney Bowes Business Insight
DATA SHEET: MapXtreme Java is a 100% Java mapping engine designed to enable the use of location intelligence on the desktop, over the internet or through your organization intranet or extranet.
Posted: 17 Mar 2008 | Published: 01 Jan 2007

Pitney Bowes Business Insight

GDPR Drives Compliance to Top of Security Project List for 2018
sponsored by OneNeck IT
RESEARCH CONTENT: Learn why compliance was added to the top of the list of pain points and security projects, for companies in 2018.
Posted: 06 Nov 2018 | Published: 03 Oct 2018

OneNeck IT

Cybersecurity Pushed to the Limit
sponsored by Radware
VIDEO: Tune into this webinar for look ahead – predictions and what to prepare for in the future of cyberattacks and security threats.
Posted: 06 Nov 2018 | Premiered: 31 Oct 2018


Demystifying DNS
sponsored by Nominet
RESOURCE: Download this resource to learn about the rise of DNS attacks, as well as how Nominet's NTX platform could give you insights into customer behavior and help you identify and mitigate security risks.
Posted: 09 Nov 2018 | Published: 09 Nov 2018

Insider Threat to Financial Services
sponsored by Recorded Future
WHITE PAPER: Research from leading analysts at Forrester revealed that insiders accounted for 39% of data breaches through accidental and malicious misuse of data. In this white paper, explore current security technologies that are aimed at preventing and detecting insider threats, and learn about the 3 categories to understand the risks they pose.
Posted: 13 Nov 2018 | Published: 13 Nov 2018

Recorded Future

Combining Operations with Development for a Competitive Edge
sponsored by ServiceNow
WHITE PAPER: Read up on how VIVAT – a Netherlands-based insurance group – reimagined its IT service management strategy to better support over 2,500 employees – and ultimately automating over 70% of processes and workflows.
Posted: 14 Nov 2018 | Published: 20 Jun 2018


Executive Summary: A Guide to Protecting Microsoft Office 365 from Security Threats
sponsored by Symantec
RESOURCE: Find out how to transform your security to safely deploy Office 365 and other SaaS apps by learning about how to spot potential vulnerabilities and defend against cloud-based threats.
Posted: 14 Nov 2018 | Published: 31 Aug 2018


DNS Security for Financial Services
sponsored by Nominet
WHITE PAPER: Nearly 92% of malware uses DNS to gain command and control, exfiltrate data or redirect traffic, according to a CISCO report. So, protection at the DNS layer is crucial. Read this white paper to find out how to detect and stop DNS threats.
Posted: 12 Nov 2018 | Published: 12 Nov 2018

SECaaS is Here: Everything you Need to Know
sponsored by Armor
WHITE PAPER: SECaaS, or security-as-a-service, can help organizations like yours, defend against advanced threats, detect intruders, and more. Read on to learn the details.
Posted: 15 Nov 2018 | Published: 15 Nov 2018


4 Steps to Making Better-Informed IT Investments
sponsored by Dell EMC
RESOURCE: Click inside to learn the four ways IT teams can more efficiently leverage data as they plan when, where, and how to invest IT resources in the name of digital transformation.
Posted: 14 Nov 2018 | Published: 14 Nov 2018

Dell EMC

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement