Information Technology


Leveraging Threat Intelligence in Security Monitoring

With today\'s advanced threats and malware evading traditional security controls at an alarming rate, the role of security monitoring...

How to Detect SQL Injection & XSS Attacks using SIEM Event Correlation

Two of the oldest and most common attacks used against web applications, SQL injection attacks and cross-site scripting attacks...

Where to Go Once Your Servers Are Virtualized

The technologies examined reduce operational expenses (OpEx), not capital expenses (CapEx) that has traditionally been the focus of virtualization....

A Guide to Password Use in WebSphere Application Server

Nearly every WebSphere administrator has desired a deeper understanding of how passwords are created, used, stored, and encrypted. Learn...

Learn the Shortfalls of Security Sandboxing and Virtual Execution to Detect Advanced Threats

Detonating malware in a sandbox is one way to prevent threats from entering your network. If you rely solely...

Five Strategies for Email Data Loss Prevention

Are you looking to enhance security and regulatory compliance around email, without having to add staff? SilverSky offers a...

6 Tips for MPS Success, Louella Fernandes

Choosing the right MPS solution takes preparation and careful thought. Download “6 Tips for MPS Success” from Quocirca for...

Top 10 reasons to strengthen information security with desktop virtualization

Explore ten reasons why virtual desktops should be the foundation of your layered approach to information security.

Understanding Network Design Considerations for Gigabit Speed Wi-Fi

Managing a network for your company is a complex proposition. The technology is constantly becoming more complex and...

10 Requirements for Optimizing Your Network for Mobility

Today, the vast majority of work and communication is conducted on mobile and wireless devices and users rarely consider...

Virtual Machine Backup and Recovery: Five Critical Decisions

This paper explores the five critical decisions organizations must adhere to when building a backup and recovery plan to...

Supercharge your Infrastructure

Fusion---iodelivers the world\'s data faster. From e---commerce retailers to the world’s social media leaders and Fortune Global 500 companies,...

5 things you need for a successful collaboration initiative, from Logicalis and Cisco

In business, things are moving faster than ever before, and on an unprecedented global scale. To stay competitive, your...

Why Comprehensive Endpoint Security and Management is a Must-Have for Small and Medium Enterprises

Recent research from Ponemon Institute reveals that malware attacks are increasing and are significantly impacting IT operating expenses. Of...

Securing Top Talent: Finding and Retaining Highly Skilled Technology Professionals

Although the IT field has grown by leaps and bounds in the past decade, qualified IT professionals - especially...

Addressing the “Big Data” Issue: What You Need to Know

These days, you\'re probably hearing a lot of hype about \"big data\". Vendors are currently hawking a wealth of...

Learn How to Create a Data-Driven Culture Right Now

Don\'t be left in the dust. Create a big data culture now. Download the\"Big Data Culture Clash: Unlock the...

Conquering the Top 5 Enterprise Data Protection Challenges

Today\'s datacenters face a gauntlet of challenges including protection of physical and virtual environments, fast recovery of data, reducing...

A Guide to Assessing the Network Benefits and Requirements of Cloud VoIP

The Cloud; software as service across the Internet, is experiencing mass proliferation for everything from banking to CRM. Communications...

Achieving Organizational Transformation with HP Converged Infrastructure Solutions for SDDC

Seeking the business benefits generated by private cloud and to free themselves from the rigid silos of traditional...
 
Page 134 of 162«132133134135136»