Government It Security White PaperWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Government It Security White Paper returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Network Security
 •   Virtualization
 •   Enterprise Data Protection and Privacy
 •   Security Policies
 •   Security Monitoring
 •   Endpoint Security
 •   Application Security
 •   Enterprise Systems Management
 •   Data Center Management

Related Searches
 •   Directory Government
 •   Government Change
 •   Government It Construction
 •   Government It Security Consults
 •   Government It Security Costing
 •   Government It Security Expert
 •   Government Multi
 •   Internet Based Government It Security
 •   Plans Government It
Advertisement

ALL RESULTS
1 - 25 of 492 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Kazeon Data Privacy & Security Solution by Kazeon

November 01, 2006 - (Free Research)
This white paper examines an Information Classification Management (ICM) solution that helps classify and secure your company's sensitive information and overcome the challenges of securing data while complying with federal guidelines. 
(WHITE PAPER)

Navigating Backup and Recovery in VMware Environments - Technical White Paper by HP

July 22, 2011 - (Free Research)
This white paper explores the problems faced by IT administrators when managing the physical and VMware virtual infrastructure, and shows how HP Data Protector simplifies backup and recovery. 
(WHITE PAPER) READ ABSTRACT |

McAfee Total Protection for Secure Business by Insight

August 31, 2010 - (Free Research)
Medium-sized businesses have the dual challenges of enforcing acceptable use policies for email and the web, and ensuring compliance with government data privacy regulations. Read this white paper to learn about security solutions for your medium-sized business. 
(WHITE PAPER) READ ABSTRACT |

Maximizing IT Value by Using High-End Server Processors by Dell, Inc. and Intel®

October 2008 - (Free Research)
Intel IT has standardized on Intel® Xeon® processors with a core frequency of 3 GHz for two-socket servers for design computing and enterprise server virtualization. 
(WHITE PAPER) READ ABSTRACT |

Implementing ITIL Using the PMBOK Guide in Four Repeatable Steps by Global Knowledge

January 2006 - (Free Research)
This white paper provides an overview of the PMBOK® and the key process areas and functions within the IT Infrastructure Library. 
(WHITE PAPER) READ ABSTRACT |

McAfee Total Protection for Secure Business by Insight

March 2010 - (Free Research)
McAfee solutions cover all the critical elements of security medium businesses need: desktop and server protection, data protection, email and web security, and compliance. Total Protection for Secure Business provides comprehensive protection against the most lethal threats and exploits - in one package, from one trusted and proven vendor. 
(WHITE PAPER) READ ABSTRACT |

The Children's Internet Protection Act by NETGEAR Inc.

December 2010 - (Free Research)
Schools and libraries must certify they have complied with, or are in the process of complying with, the CIPA requirements by filing a form with the Federal government in order to receive discounts on the telecommunication charges for access or connection costs. Are you certified? Read this white paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

An Architectural Framework for Enterprise Email Infrastructure & Security: Getting It Right Today, Getting Ready for Tomorrow by Sendmail, Inc.

October 2008 - (Free Research)
This white paper examines the architecture limitations prevalent in today's large-enterprise email networks. 
(WHITE PAPER) READ ABSTRACT |

5 Steps to Secure the Wireless Network by NETGEAR Inc.

October 2010 - (Free Research)
Today’s organizations increasingly rely on the ease and lower cost of wireless networking. Schools and businesses are investing in Wi-Fi to leverage benefits including more flexible network connectivity, improved productivity, and reduced capital expense. Read this white paper to learn how to incorporate wireless connectivity into your everyday. 
(WHITE PAPER) READ ABSTRACT |

Ten Ways Hackers Breach Security by Global Knowledge

January 2007 - (Free Research)
Hacking, cracking, and cyber crimes can wreak havoc on an organization. This white paper discusses ten common methods hackers use to breach your existing security, and what you can do to protect yourself. 
(WHITE PAPER) READ ABSTRACT |

Switching Essentials: An Introduction to Network Switching by Global Knowledge

October 2008 - (Free Research)
In this white paper, we will address the basics of this Layer 2 technology and help you get your network switch up and running. For our examples, we will use Cisco's 2950 switch. 
(WHITE PAPER) READ ABSTRACT |

Router Essentials by Global Knowledge

October 2008 - (Free Research)
Build a basic foundation of knowledge about routers, the devices that allow you to move packets between networks, by reading this white paper. 
(WHITE PAPER) READ ABSTRACT |

Choosing a Network Access Control (NAC) Solution that is Right for Your Network by ForeScout Technologies, Inc.

March 2011 - (Free Research)
This white paper provides a comprehensive overview between a number of available deployment, device interrogation and policy enforcement methods to help you determine which Network Access Control (NAC) solution is right for your company's network. 
(WHITE PAPER) READ ABSTRACT |

Ten Tips for Reducing Storage TCO by LSI Corporation

October 2008 - (Free Research)
This white paper outlines the top ten strategic steps that should be taken to reduce the Total Cost of Ownership (TCO) of a storage infrastructure. 
(WHITE PAPER) READ ABSTRACT |

Windows Server 2008 Backup Tool - A Review of Its Features by Global Knowledge

October 2008 - (Free Research)
This white paper presents some of the more significant pros and cons of the Server 2008 version of the backup tool that debuted in Windows Vista. 
(WHITE PAPER) READ ABSTRACT |

Data Protection for Virtual Server Environments: Exploring Options and Technologies for Backup and Recovery of Virtual Machines by Datalink

November 2008 - (Free Research)
This white paper provides practical advice and considerations surrounding backup and recovery of virtual server infrastructures. 
(WHITE PAPER) READ ABSTRACT |

Risk Management: Bridging Policies and Procedures - Fundamental Security Concepts by Global Knowledge

October 2008 - (Free Research)
This white paper discusses risk management as a key process in designing security architectures, including a better way for security managers to approach the security ROI issue. 
(WHITE PAPER) READ ABSTRACT |

Business Ready Solutions for Virtual Infrastructure Availability Using Dell™ PowerEdge™ Servers, Dell Powervault™ Storage, and VMware vSphere™ by Dell, Inc. and Intel®

July 2009 - (Free Research)
This white paper presents an example configuration and best practices for deploying and configuring a highly available architecture using an example solution configuration and then discussing how the configuration helps in maximizing uptime. 
(WHITE PAPER) READ ABSTRACT |

Big Data Means Big Opportunities by Dell, Inc. and Intel®

December 2013 - (Free Research)
Uncover the ins-and-outs of an industry-leading vendor's Hadoop software that's capable of analyzing, managing and processing the vast amounts of data you must deal with 
(WHITE PAPER) READ ABSTRACT |

The Growing Importance of E-Discovery on Your Business by Google Apps

November 2008 - (Free Research)
The goal of this white paper is to focus on the key issues involved in developing an e-discovery capability and to help organizations plan to become better prepared for the rigors of the e-discovery process. 
(WHITE PAPER) READ ABSTRACT |

Lead Your Enterprise With These Game-Changing Steps by Dell, Inc. and Intel®

December 2013 - (Free Research)
Download this leadership white paper now to find your voice in the C-suite, define a new strategy and change the conversation in your enterprise. 
(WHITE PAPER) READ ABSTRACT |

Measuring End User Susceptibility and Defenses Against Phishing Attacks with CORE Insight by Core Security Technologies

October 2013 - (Free Research)
This white paper contains critical information about spear phishing and how to prepare your users and systems from falling for these targeted attacks being masked as trustworthy content. 
(WHITE PAPER) READ ABSTRACT |

The Use Case for Integrated Vulnerability Management CORE Security by Core Security Technologies

October 2013 - (Free Research)
This white paper emphasizes the importance of an effective vulnerability management infrastructure to avoid data overload challenges and explores how to stay on track by consolidating, analyzing, and prioritizing data for maximum security. 
(WHITE PAPER) READ ABSTRACT |

A holistic approach to your BYOD challenge by Insight

May 2013 - (Free Research)
Ensuring security of business applications on personal devices and maintaining unified wired and wireless visibility and management is key for BYOD. This white paper discusses the most critical requirements for effective BYOD management and offers advice on how IT can successfully manage this trend. 
(WHITE PAPER) READ ABSTRACT |

The 10 Most Dangerous Risks to Microsoft Security by Global Knowledge

May 2009 - (Free Research)
Security has always been an important part of any IT infrastructure. This white paper has tips to help improve your awareness of some of the more important risks threatening your Microsoft infrastructure. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 492 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts