RecruitingBlogscom

Follow Us:

 

department defense

Results 1 - 8 of 8Sort Results By: Published Date | Title | Company Name
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"High-profile cyber attacks seem to occur almost daily in recent years. Clearly security threats are persistent and growing. While many organizations have adopted a defense-in-depth strategy — utilizing anti-virus protection, firewalls, intruder prevention systems, sandboxing, and secure web gateways — most IT departments still fail to explicitly protect the Domain Name System (DNS). This oversight leaves a massive gap in network defenses. But this infrastructure doesn’t have to be a vulnerability. Solutions that protect recursive DNS (rDNS) can serve as a simple and effective security control point for end users and devices on your network. Read this white paper to learn more about how rDNS is putting your enterprise at risk, why you need a security checkpoint at this infrastructural layer, how rDNS security solutio Read 5 Reasons Enterprises Need a New Access Model to learn about the fundamental changes enterprises need to make when providing access to their private applications.
Tags : 
rdns, dns, anti-virus, security, network defense
    
Akamai Technologies
Published By: Red Hat     Published Date: Jan 01, 2013
Using Red Hat middleware, virtualization, and platform technologies, consultant Booz Allen Hamilton helped the U.S. Department of Defense save $5.1 million through fiscal year 2015. The solution replaced a complex legacy system that could not scale to meet modern demands.
Tags : 
idc, red hat, department of defense, technology consulting, supports elasticity, flexibility, private cloud, elastic infrastructure, increase agility, increase flexibility, automatic scaling, automatic process execution, configurationg management, monitoring capabilities
    
Red Hat
Published By: Cisco     Published Date: Nov 18, 2015
Transformation doesn’t happen overnight. It takes time, commitment, and an understanding of the operational mission. Today, the Internet of Everything (IoE) is driving transformation by securely extending the network to the tactical edge and providing the Department of Defense (DoD) unprecedented access, agility, and capability.
Tags : 
transformation, network, dod, networking, it management
    
Cisco
Published By: Microsoft Windows     Published Date: Mar 31, 2017
Today’s enterprises and government agencies face new and emerging challenges that range from a constantly shifting threat landscape to managing multiple platforms and devices in the enterprise environment. Because of this, the US Department of Defense (DoD) has joined the ranks of enterprise customers planning swift Windows 10 deployments. Download this paper to learn about some of the security features that are drawing enterprise customers - like the Department of Defense - to Windows 10.
Tags : 
    
Microsoft Windows
Published By: Jive Software     Published Date: Oct 08, 2009
Learn how the Air Force Medical Service connects 20,000 Department of Defense medical personnel on a highly-secure online community -- in hospitals, in remote stations, and on the battlefield.
Tags : 
highly-secure online community, social business software, jive
    
Jive Software
Published By: Cisco     Published Date: Jul 11, 2016
Transformation doesn’t happen overnight. It takes time, commitment, and an understanding of the operational mission. Today, the Internet of Everything (IoE) is driving transformation by securely extending the network to the tactical edge and providing the Department of Defense (DoD) unprecedented access, agility, and capability.
Tags : 
    
Cisco
Published By: Technolytics     Published Date: Oct 05, 2007
Recently, a series of cyber attacks on the Defense Department and Defense contractors in the United States as well as the Ministry of Defense and Parliament in the U.K. have created significant cause-for-concern by computer security experts. It is imperative you read this brief and learn how we're all vulnerable and what is being done to prevent these Cyber Attacks.
Tags : 
spy ops, spy-ops, cyber attack, hacker, hackers, government, internet security, national security, network security, intrusion, intrusion detection, intrusion prevention, trojan, risk management, cyberwarfare, cyber warfare, technolytics
    
Technolytics
Published By: Red Hat     Published Date: Jan 21, 2011
Gunnar Hellekson - Chief Technology Strategist, US Public Sector, Red Hat The government was an early advocate of open source and Red Hat. Red Hat is now ubiquitous, in every state, every branch of the Department Of Defense, and in every cabinet-level agency. After ten years, we no longer hear about security or whether open source is ready for the enterprise. So what's next? How is Red Hat driving the next wave of innovation in government?
Tags : 
red hat virtual tradeshow, live event, us government, public sector, department of defense
    
Red Hat
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top