Acceptable LatestWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Acceptable Latest returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Virtualization
 •   Endpoint Security
 •   Enterprise Data Protection and Privacy
 •   Network Management
 •   Storage Management
 •   Network Security
 •   Content Delivery Networks/ Web Application Acceleration
 •   Data Center Management
 •   Business Process Management (BPM)

Related Searches
 •   Acceptable Consultants
 •   Acceptable Framework
 •   Acceptable Latest Events
 •   Acceptable Latest Solution Software
 •   Acceptable Layout
 •   Acceptable Virginia
 •   Fact Acceptable Latest
 •   Orders Acceptable
 •   Test Acceptable Latest
 •   Tools Acceptable Latest
Advertisement

ALL RESULTS
1 - 25 of 457 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Coaching Techniques for Dealing with Underperformers by Global Knowledge Network, Inc.

May 2004 - (Free Research)
People do not perform at their job for one of two reasons: either they can't or they won't. The second type of employee is the one we will address in this paper- the employee who chooses not to do his or her job for whatever reason. 
(WHITE PAPER) READ ABSTRACT |

Dell™ Reference Architecture Sizing and Best Practices for Microsoft® Exchange Server 2007 in a VMware® ESX Server Environment using EqualLogic PS Series Storage by Dell, Inc.

October 2009 - (Free Research)
This paper describes the Dell Reference Architecture, a blueprint or a starting configuration, for Microsoft® Exchange Server 2007 in a virtualized server environment and provides guidelines for designing and sizing the storage for the same using Dell EqualLogic PS Series storage systems. 
(WHITE PAPER) READ ABSTRACT |

Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway by Websense, Inc.

June 2009 - (Free Research)
The best way to address Web 2.0 threats is to combine the best aspects of traditional security and control techniques with new technology designed to address the dynamic, real-time nature of Web 2.0. This paper describes how one such solution enables you to quickly implement a best practices approach to making Web 2.0 secure and effective. 
(WHITE PAPER) READ ABSTRACT |

Workplace of the Future: DIY IT by Hewlett-Packard Limited

December 2012 - (Free Research)
Explore the latest surrounding the trend of consumerization and uncover what your IT department can do to empower users while simultaneously protecting the organization. 
(WHITE PAPER) READ ABSTRACT |

SearchSecurity.com E-Guide: Defining an acceptable level of risk for the organization by IBM

August 2011 - (Free Research)
Defining an acceptable level of risk for the organization is no easy task. Learn how threat profiles and business drivers can be used to determine an appropriate level of risk for the organization in this expert tip. In addition, find out how to perform an accurate enterprise security risk analysis. 
(EGUIDE) READ ABSTRACT |

Is Your Acceptable Use Policy Social Media-proof? by M86 Security

February 2011 - (Free Research)
This paper is intended for IT decision makers, HR managers and executives responsible for adopting and enforcing email and Web Acceptable Use Policies (AUPs) within an organization. It provides guidance on how to update an AUP to accommodate the increasing popularity and use of social media in the business environment. 
(WHITE PAPER) READ ABSTRACT |

Next-generation firewalls and your security strategy by Cisco (E-mail this company)

April 2013 - (Free Research)
This whitepaper addresses the blurred lines between business and pleasure created by today's mobile trends and offers a new strategy to deal with it. 
(WHITE PAPER) READ ABSTRACT |

McAfee Total Protection for Secure Business by Insight

August 2010 - (Free Research)
Medium-sized businesses have the dual challenges of enforcing acceptable use policies for email and the web, and ensuring compliance with government data privacy regulations. Read this white paper to learn about security solutions for your medium-sized business. 
(WHITE PAPER) READ ABSTRACT |

Stopping Data Leakage: Making the Most of Your Security Budget by Sophos, Inc.

February 2009 - (Free Research)
This paper demonstrates the need for a high-profile acceptable use policy to prevent data leakage, gives practical guidance on how to use your security budget effectively to protect data at the gateway and endpoint, and highlights the benefit... 
(WHITE PAPER) READ ABSTRACT |

McAfee Total Protection for Secure Business by Insight

March 2010 - (Free Research)
McAfee solutions cover all the critical elements of security medium businesses need: desktop and server protection, data protection, email and web security, and compliance. Total Protection for Secure Business provides comprehensive protection against the most lethal threats and exploits - in one package, from one trusted and proven vendor. 
(WHITE PAPER) READ ABSTRACT |

WAN Optimization for Today and Tomorrow: Enterprise Applications by BlueCoat

February 2011 - (Free Research)
Over 80% of applications are accessed over the Web. SAP, Business Objects and Salesforce.com, along with collaboration applications like Sharepoint, are all dependent on the same bandwidth. How do you optimize bandwidth to ensure these applications are performing within acceptable SLAs? 
(WEBCAST) READ ABSTRACT |

Proper Virtual Storage Management by Dell Compellent

August 2011 - (Free Research)
Virtual data center managers must keep storage capacity and performance within acceptable parameters as business conditions change. Examine the nuances of virtual storage, including provisioning, performance and remote storage methods and ensure that you allocate the right amount of storage for each application. 
(EBOOK)

Stopping Data Leakage: Making the Most of Your Security Budget by Sophos, Inc.

November 2009 - (Free Research)
This paper demonstrates the need for a high-profile acceptable use policy to prevent data leakage, gives practical guidance on how to use your security budget effectively to protect data at the gateway and endpoint, and highlights the benefits of encryption in securing data in the event that it does get stolen or lost. 
(WHITE PAPER) READ ABSTRACT |

Stopping data leakage: Exploiting your existing security investment by Sophos, Inc.

June 2008 - (Free Research)
This paper gives practical guidance on how to use current investments in IT security technologies at the gateway and endpoint to support a high-profile acceptable use policy for data leakage prevention, and describes where new investments should be made. 
(WHITE PAPER) READ ABSTRACT |

Defending Against Insider Threats in the “Snowden Era” by CA Technologies.

December 2013 - (Free Research)
Sensitive information - including customer data, credit card numbers, and private communications – has an average cost of $5.4 million per year when breached. This eBook discusses insider attacks, and how employees can compromise otherwise privileged information. Also find out the challenges of defending against insider threats. 
(EBOOK) READ ABSTRACT |

High-Speed and Cost-Effective Data Protection for Storage Environments by Oracle Corporation

March 2014 - (Free Research)
This white paper describes key considerations for protecting data within Oracle engineered systems and explains the benefits of on specific solution from Oracle. 
(WHITE PAPER) READ ABSTRACT |

User-ID Linked with Next-Generation Firewalls Improves Network Visibility and Controls by Palo Alto Networks

November 2012 - (Free Research)
This white paper highlights a security solution that integrates existing enterprise directory services with next-generation firewalls so application activity and policies are linked directly with users or groups. Read on to learn how user-based analysis, reporting, and forensics can improve visibility and protection. 
(WHITE PAPER) READ ABSTRACT |

Optimizing Virtual Desktops with Dell EqualLogic Unified Storage and VMware View by Dell, Inc. and Intel®

February 2012 - (Free Research)
The combined strengths of Dell EqualLogic and VMware can deliver significant benefits for VDI implementations. Integration of DellEqualLogic with VMware vSphere and VMware View can help your organization achieve optimal VDI performance. Read now to learn more. 
(WHITE PAPER) READ ABSTRACT |

Flight Options Case Study Video by Dell, Inc.

November 2012 - (Free Research)
In this brief video, you will discover how the second largest fractional aircraft provider in the world deployed a flash-optimized storage strategy in order to gain efficiency, ease of use, premier support and superior compatibility with VMware. 
(WEBCAST) READ ABSTRACT |

Summary WAN Optimisation Test Report: Blue Coat Systems vs. Riverbed by BlueCoat

September 2011 - (Free Research)
This white paper outlines the benefits of Blue Coat WAN optimization. 
(WHITE PAPER) READ ABSTRACT |

Cloud WAN Architecture: Rethinking Networks for the Cloud Era by Citrix

February 2014 - (Free Research)
This expert E-guide explores some key benefits to upgrading your network infrastructure and adapting your network to the cloud. 
(WHITE PAPER) READ ABSTRACT |

Updating Your Corporate BYOD Program for Success by SearchSecurity.com

December 2012 - (Free Research)
This E-Guide from SearchConsumerization.com explores the issues that bring your own device (BYOD) programs solve and key considerations to ensure the success of your BYOD program. 
(EGUIDE) READ ABSTRACT |

Managing mobile UC in a BYOD environment by SearchSecurity.com

July 2012 - (Free Research)
This e-guide reviews key tips and considerations to keep in mind when designing mobile UC and Bring Your Own Device (BYOD) policies to keep sensitive information secure while enabling increased flexibility and mobility. 
(EGUIDE) READ ABSTRACT |

A Planner's Realistic Guide to Cloud Data Security by Dell, Inc. and Intel®

March 2014 - (Free Research)
This expert e-guide will walk you through the creation of a safe and secure cloud environment. 
(EGUIDE) READ ABSTRACT |

Virtualization: Benefits, Challenges, and Solutions by Riverbed Technology, Inc.

November 2011 - (Free Research)
Riverbed® Stingray™ Traffic Manager makes it easy to migrate and scale data on demand, and is also the only application delivery solution available as an easily deployed virtual appliance. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 457 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts