Web ServicesWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
Browse Directory>   Infrastructure and Systems ManagementWeb Services  What is RSS?
Advertisement

ALL RESULTS
  1 - 25 of 245 | Next Page

E-Book: Technical Guide on Web Application Firewalls by SearchSecurity.com

November 04, 2010 - (Free Research)
Web application firewalls are becoming critical data protection and compliance tools that any security decision maker must understand. SearchSecurity.com presents a comprehensive guide to Web Application Firewalls in which experts examine evaluation criteria, deployment considerations and management issues. 
(EBOOK) READ ABSTRACT |

Reasons to Modernize Your Middleware by Red Hat

June 10, 2013 - (Free Research)
Aging and inflexible middleware can be hindering your organization in more ways than one, especially when it comes to change management. In this white paper, learn the key characteristics of a modern middleware platform and discover how you can benefit by migrating from a legacy middleware infrastructure to a more flexible, modular environment. 
(WHITE PAPER) READ ABSTRACT |

Web Application Security: Protect Your Critical Web Applications by Imperva

August 30, 2010 - (Free Research)
To combat complex and distributed attacks, organizations need to protect their Web sites from new and emerging threats without affecting application performance or uptime. Read this paper to find out so much more. 
(WHITE PAPER) READ ABSTRACT |

Cloud IAM: Is it worth the move? by SearchSecurity.com

February 13, 2012 - (Free Research)
As cloud adoption increases, managers are beginning to consider integrating their IAM infrastructure into cloud architectures. In this e-guide, gain expert insight into cloud IAM including how to use a IAM Maturity model to improve IAM strategy, key considerations before moving to a cloud-based service and much more. 
(EGUIDE) READ ABSTRACT |

E-Guide: IAM in the cloud by SearchSecurity.com

December 22, 2011 - (Free Research)
When bringing your organization into the cloud, there are a few steps that need to be taken in order to ensure security. One of the main areas that needs to be appropriately integrated is identity management. Read this expert E-Guide and discover how to manage identity in the cloud, along with whom and what you can trust in the cloud. 
(EGUIDE) READ ABSTRACT |

Proactive security measures: How to prevent malware attacks by SearchSecurity.com

August 30, 2012 - (Free Research)
Read this expert E-guide to find out what new malware threats can mean for your business. Learn how to stop the malware inside your network and other key tips to evolving your security in order to combat dangerous new forms of malware by consulting this resource. 
(EGUIDE) READ ABSTRACT |

Thwarting Sophisticated Attacks with Today’s Firewalls by SearchSecurity.com

February 17, 2012 - (Free Research)
This expert resource explores modern network security, offering key insight into fighting today’s sophisticated threats as well as the differences between next-generation firewall (NGFW) and unified threat management (UTM). 
(EGUIDE) READ ABSTRACT |

E-Guide: VM in the Cloud by SearchSecurity.com

January 31, 2012 - (Free Research)
Before you move services to the cloud, you must understand how the change in risk will affect your existing security strategy. View this expert resource now to gain best practices for cloud risk management and explore the importance of revisiting risk assumptions, pros and cons of aggregation, tips for pen testing cloud environments, and more. 
(EGUIDE) READ ABSTRACT |

Video conferencing standards and interoperability considerations by SearchSecurity.com

April 27, 2011 - (Free Research)
Before you can successfully implement a video conferencing system into your enterprise, you must first understand the standards involved to ensure your solution will work with others on your network.  This e-guide uncovers standards and interoperability considerations while also providing migration planning tips. 
(EGUIDE) READ ABSTRACT |

Video conferencing adoption: Tracking trends and deployment strategies by SearchSecurity.com

April 27, 2011 - (Free Research)
Managers are looking for ways to incorporate video conferencing into their unified communications (UC) architectures as adoption continues to grow. This e-guide offers top recommendations and best practices to help you through the video decision process while ensuring quality stays a high priority. 
(EGUIDE) READ ABSTRACT |

A closer look at video conferencing solutions, technology and vendors by SearchSecurity.com

April 27, 2011 - (Free Research)
In order to successfully implement your video conferencing solutions, you must understand the physical components of your system.  This e-guide can help you by uncovering the ins and outs of video conferencing architectures while also providing an in-depth look at solutions, technology and vendors. 
(EGUIDE) READ ABSTRACT |

Web-facing applications: Security assessment tools and strategies by SearchSecurity.com

October 08, 2012 - (Free Research)
Read this expert E-guide to find out how you can properly asses web application threats and the tools your organization can use for protection. Learn how to mitigate likely web application threats and how you can ensure your business is protected. 
(WHITE PAPER) READ ABSTRACT |

Exploring new web browser security capabilities by SearchSecurity.com

October 04, 2012 - (Free Research)
New threats are created on a regular basis and businesses need to be prepared for the risks. View this expert E-Guide to explore some of the new security capabilities of web browsers and how they help prevent attacks. Learn more about the features that strengthen the security of Web gateway's by consulting this asset. 
(WHITE PAPER) READ ABSTRACT |

The Pros and Cons of Delivering Web Pages Over an SSL Connection by SearchSecurity.com

December 20, 2012 - (Free Research)
Though Secure Sockets Layer (SSL) offers distinct security advantages, there are drawbacks to this method of webpage delivery, as well. This expert e-guide explores the pros and cons of delivering webpages over an SSL connection. See if this strategy is right for your organization – read on to learn more. 
(EGUIDE) READ ABSTRACT |

Expert Guide to web 2.0 Threats: How to Prevent an Attack by SearchSecurity.com

August 11, 2011 - (Free Research)
A majority of today’s organizations already leverage the benefits of Web 2.0 technologies, or at least wonder how they can take advantage of it. This expert e-guide provides an overview of what Web 2.0 really is and explains how to combat the myriad of threats that accompany this convenient technology. 
(EGUIDE) READ ABSTRACT |

E-Guide: Keys to Protecting Web Applications from Vulnerable Exploits by SearchSecurity.com

July 13, 2011 - (Free Research)
Today’s attackers are stealing substantial amounts of confidential information every day by exploiting vulnerable Web application servers. This expert e-guide highlights the most popular Web application attack methods and offers advice on how to keep your network safe through URL filtering. 
(EGUIDE) READ ABSTRACT |

E-Guide: How to build a toolset to avoid Web 2.0 security issues by SearchSecurity.com

September 17, 2010 - (Free Research)
Collaborative, interactive nature of Web 2.0 technology has great appeal for business, and companies of all sizes and verticals are taking full advantage of social networking sites, free online services and other platforms. Learn how to implement security tools that monitor, prevent, alert, encrypt and quarantine data from leaving your network. 
(EGUIDE) READ ABSTRACT |

How to Succeed at Service-Oriented Architecture by Global Knowledge

June 27, 2013 - (Free Research)
In this helpful resource, discover everything you need to know about succeeding with a service-oriented-architecture (SOA) project. You'll get advice on how to design your service interfaces, your services, your data model, and your business processes, along with other tips and guidelines. 
(WHITE PAPER) READ ABSTRACT |

Leveraging the Cloud to Improve Endpoint Protection – Sept 6th at 10:00am (PDT) live date by Webroot

September 06, 2012 - (Free Research)
Find the answers to all of your challenging endpoint protection and web security questions by viewing this informative Webcast. Go beyond the concepts on performance effectiveness and learn the critical aspects of threat protection. 
(WEBCAST) READ ABSTRACT |

The Financial Benefit of Cisco’s Elastic Core by Cisco Systems, Inc.

December 31, 2012 - (Free Research)
Explore how three Cisco software-based initiatives for the core network can help you address the challenges facing core networks today – including the increasing volumes of traffic, diversity of services, and adoption of cloud services. 
(WHITE PAPER) READ ABSTRACT |

Webinar: RightScale and Amazon EC2 in Europe by RightScale

February 25, 2010 - (Free Research)
Learn how to utilize RightScale for your deployment on Amazon EC2 in Europe. In this webinar, the importance of RightScale and Amazon EC2 in Europe and European adoption of cloud computing will be discussed. 
(WEBCAST) READ ABSTRACT |

Cloud Access 360 Overview Video by Intel

March 29, 2011 - (Free Research)
Intel’s Director of Product Management presents the need for enterprise class access control to the cloud. Learn about SSO for the cloud and how to avoid common pitfalls when deploying across multiple cloud providers. 
(VIDEO) READ ABSTRACT |

Unleashing XQuery's Power by Progress DataDirect

July 2008 - (Free Research)
This podcast explains how XQuery can be a powerful tool for data integration within the Service-Oriented Architecture. 
(PODCAST) READ ABSTRACT |

SOA - Practical Considerations for Data Integration by Progress DataDirect

July 2008 - (Free Research)
This Podcast discusses the steps for solving data integration problems and migrating successfully to an SOA environment. 
(PODCAST) READ ABSTRACT |

Webroot Cheat Sheet by Webroot

February 2012 - (Free Research)
Consult this helpful guide to find out the vendors who offer the best endpoint protection. Consider factors such as deployment, performance, threat detection and more with this resource. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 245 | Next Page

> Explore alternative searches for: Web Services

We are always striving to improve our customer experience. Please notify us if there is a company missing that you feel should be in our directory.


Advertisement

Search FindTech

Search the
Technology Services Directory

  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts