Standards  >   Network Protocols  >   Routing Protocols  >  

Protocol Independent Multicast

RSS Feed   
Protocol Independent Multicast Reports
 
Email+ Enhances PIM Security and Preserves the Native App Experience
sponsored by MobileIron
RESOURCE: Personal information management (PIM) apps are some of the most commonly used apps in the enterprise. But, how can you enhance the security of PIM apps without degrading the native app experience? Download this resource to find out.
Posted: 05 Nov 2018 | Published: 05 Nov 2018

MobileIron

How Secure is your sudo? - The Good, the Bad, and the Ugly of Privileged Identity Management (PIM)
sponsored by BeyondTrust Corporation
WHITE PAPER: This white paper will illustrate certain positive situations where open source solutions like sudo often work in smaller scale enterprises. However, this white paper will also spotlight red flags that relate to larger companies or companies experiencing significant IT growth. Read this paper to learn more.
Posted: 21 May 2010 | Published: 20 May 2010

BeyondTrust Corporation

The Promise of Mobile Unified Communications
sponsored by BlackBerry
WHITE PAPER: Mobile unified communications allows organizations to provide employees with the ability to collaborate and communicate efficiently, as well as access information on-demand.
Posted: 09 Jan 2009 | Published: 09 Jan 2009

BlackBerry

Troubleshooting the Blackberry Enterprise Solution
sponsored by BlackBerry
WEBCAST: This webcast explains about five common troubleshooting areas, that is Enterprise Activation Issues, Mail delivery and latency Issues, Mobile Browsing Issues, PIM Synchronization Issues and Wireless Application Push Issues.
Posted: 07 Jan 2009 | Premiered: Jan 7, 2009

BlackBerry

A Modern Approach to Marketing Product Information
sponsored by Censhare
WHITE PAPER: CMOs are investing in an array of marketing tools, but now need a way to consolidate data into an efficient, easily accessible package. Access this white paper to learn about product information management tools and how they are helping marketing teams work more effectively.
Posted: 19 Sep 2017 | Published: 19 Sep 2017

Censhare

E-Book: Getting Started with Master Data Management (MDM)
sponsored by SearchDataManagement
EBOOK: In this e-book, learn about getting started with MDM programs, including how to sell the idea internally in order to secure funding and how to build a foundation for a successful MDM deployment. In addition, read about MDM trends and some of the challenges that companies can face on MDM implementations.
Posted: 03 May 2010 | Published: 03 May 2010

SearchDataManagement

How to Optimize Your Master Data Management Strategy
sponsored by IBM
EGUIDE: This expert e-guide explores an integrated approach to master data management (MDM) that incorporates an enterprise data governance program. Inside, you'll find out how to optimize your data quality strategy and learn how to garner business support for your MDM initiative.
Posted: 26 Sep 2016 | Published: 21 Sep 2016

IBM

Computer Weekly – 19 March 2013: Delivering software development success
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to IT leaders about successful software development, and how they combine the best of agile and waterfall methods. Drugs giant AstraZeneca talks about how it changed its outsourcing approach to eliminate past mistakes. And we look at a new social media bank that is shaking up the sector. Read the issue now.
Posted: 18 Mar 2013 | Published: 19 Mar 2013

ComputerWeekly.com

Is Your WAF Keeping Pace With Today's Threats?
sponsored by F5 Networks
WHITE PAPER: Cyberattackers are starting to target the application layer, which if breached allows attackers to access the interfaces that hosts use to communicate and access information sent over a network. Read this white paper to learn how to choose a web app firewall (WAF) that protects your network.
Posted: 26 Sep 2018 | Published: 26 Sep 2018

F5 Networks

2018: Snapshot of the Most Important Worldwide Cybersecurity Laws, Regulations, Directives and Standards
sponsored by Radware
RESOURCE: Are you out of breath from the breakneck pace of cyberattacks since the start of 2018? Inside, learn how regulators are stepping in to drive meaningful action, and take an in depth look at 10 noteworthy cybersecurity laws, regulations, directives and standards.
Posted: 21 Jun 2018 | Published: 05 Jun 2018

Radware
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement