Active Rule-Based RisksWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Active Rule-Based Risks returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Application Management and Maintenance
 •   Enterprise Data Protection and Privacy
 •   Backup Systems and Services
 •   Enterprise Systems Management
 •   Security Monitoring
 •   Network Security
 •   Disk-based Backup & Storage/ RAID
 •   Virtualization
 •   Enterprise Information Integration/ Metadata Management

Related Searches
 •   Active Documentation
 •   Active Organization
 •   Active Rule-Based Schema
 •   Active Rule-Based Size
 •   Active South Carolina
 •   Computing Active
 •   Conferences Active Rule-Based
 •   Contracts Active Rule-Based
 •   Desktops Active Rule-Based
 •   Erp Active Rule-Based Risks
Advertisement

ALL RESULTS
1 - 25 of 485 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Recovery Manager for Active Directory by Dell Software

Quest Recovery Manager for Active Directory offers an easy-to-use solution for fast, granular, online recovery of Active Directory (AD) in the event of inadvertent modification of AD due to software failure or human error. 
(ASP & SOFTWARE PRODUCT)

Fraud Prevention and Detection for Credit and Debit Card Transactions by ILOG, an IBM Company

April 2008 - (Free Research)
This white paper examines credit card fraud and details business rules-based fraud prevention and detection. 
(WHITE PAPER) READ ABSTRACT |

The 11 Secrets of Business Rules Success: How to balance speed quantity when building a rules-based approach to Decision Management by FICO

March 2011 - (Free Research)
Based on decades of experience developing decision management applications, FICO has developed 11 steps to help you make the most of business rules. This paper shares these secrets and addresses picking the right application and development approach, writing rules as effectively as possible, plus much more. 
(WHITE PAPER) READ ABSTRACT |

Business rules management system best practices by Red Hat

December 2013 - (Free Research)
To streamline processes, you can leverage business process management (BPM) tools and business rules management systems (BRMS). This resource provides a comprehensive guide to best practices for one BRMS. Read now to learn how to leverage this tool to create process- and rule-based applications on a large scale. 
(WHITE PAPER) READ ABSTRACT |

ImageMC++ by Viking Software Solutions

ImageMC++ is a highly advanced solution designed to maximize the auto-adjudication of claims. The rapid availability of electronic image and data, coupled with extensive rules-base processes, accelerates the handling of those claims that do not immediately auto-adjudicate and improves the efficiency of customer service functions. 
(SOFTWARE PRODUCT)

Presentation Transcript: Is Your Backup System Ready to Scale with Your Data? by SonicWALL

December 2011 - (Free Research)
Check out this informative presentation transcript to hear how backup automation with rule-based, enforced administrative policy control can efficiently streamline backup workflow and adapt to the changing dynamics of your backup environment. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Behavior Driven Development: Agile Testing with Red Hat JBoss BRMS by Red Hat

June 2013 - (Free Research)
In this resource, discover how a software development process known as behavior-driven development, combined with a tool that integrates business rules management, business process management (BPM), and complex event processing (CEP), enables you to speed up and improve the application delivery lifecycle. 
(WHITE PAPER) READ ABSTRACT |

Akershus University Hospital: Safeguarding patient privacy with security information and event management by RSA, The Security Division of EMC

May 2009 - (Free Research)
Since 1995, a series of new European regulations have been introduced to protect the security and privacy of personal data held by corporations and public bodies, particularly concerning the logging of access to sensitive information. Read this case study to learn how RSA keeps Akerus University Hospital secure and compliant. 
(CASE STUDY) READ ABSTRACT |

Effective print management by ComputerWeekly.com

April 2013 - (Free Research)
Analysts Louella Fernandes and Clive Longbottom offer tips on developing an effective print management strategy. 
(ANALYST REPORT) READ ABSTRACT |

Presentation Transcript: Developing Your Cloud Strategy by Intel

August 2011 - (Free Research)
This transcript looks at five key factors you need to consider as you begin putting together a cloud strategy. Jeffrey Ritter focuses on what is required to better assure any investment in the cloud will return the projected ROI. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

VMware ACE 2 Enterprise Edition: Desktop Virtualization Solution by AMD and VMware, Inc (E-mail this company)

VMware ACE 2 Enterprise Edition delivers desktop virtualization solutions for enterprise users. Use VMware ACE 2 to deploy an ACE virtual machine as an IT managed “virtual laptop” to remote workers, provision controlled desktop images as sandbox environments or run legacy operating systems & applications on an existing PC as you migrate to Vista. 
(SOFTWARE PRODUCT)

Managing Risk in an Active Directory Integrated Virtualized Environment by Dell Software

February 2014 - (Free Research)
Read this exclusive resource to find out about the security risks of Active Directory integrated virtualization. 
(WHITE PAPER) READ ABSTRACT |

Teradata Active Data Warehouse Private Cloud: Mitigate Risk and Meet Dynamic Business Needs by Teradata

July 2012 - (Free Research)
Check out this article now to learn about public v. private clouds and how they stack up when it comes to mitigating risk and meeting business needs. 
(WHITE PAPER) READ ABSTRACT |

Plasmon Enterprise Active Archive by Plasmon

March 2008 - (Free Research)
The Enterprise Active Archive EAA delivers the performance and simplicity of network-attached RAID disk with the authenticity, permanence, and portability of UDO media. 
(WHITE PAPER) READ ABSTRACT |

Toward Active Management of Counterparty Credit Risk with CVA by IBM

September 2013 - (Free Research)
To support this new and rapidly developing trading function, organizations must invest in flexible systems that can adapt to incorporate CCR best practices. 
(WHITE PAPER) READ ABSTRACT |

Why Java Exploits Remain a Top Security Risk by Websense

December 2013 - (Free Research)
Learn how the huge number of Java versions in active use makes it vulnerable to attack. Illustrated are the risks from the use of Java and alternatives on how to address these risks, using internal process, Websense solutions or a mixture of both. 
(WHITE PAPER) READ ABSTRACT |

HawkEye G-The Active Defense Grid by Hexis Cyber Solutions Inc

May 2014 - (Free Research)
This informative whitepaper takes a look at a unique security tool designed to prevent advanced persistent threats. 
(WHITE PAPER) READ ABSTRACT |

Five Threats to Data Security and How to Protect against Them by SafeNet, Inc.

September 2008 - (Free Research)
The purpose of this paper is to examine five specific risks to data security, showing where and how confidential data may be vulnerable - and how you can protect your business against these threats. 
(WHITE PAPER) READ ABSTRACT |

Using Microsoft Active Directory to Address Payment Card Industry (PCI) Data Security Standard Requirements in Heterogeneous Environments by Centrify Corporation

September 2012 - (Free Research)
This white paper outlines the business and technical case for centralizing administration. Learn more about the steps to take with user authentication and access controls as well as how to provide accountability through direct auditing of user activities. 
(WHITE PAPER) READ ABSTRACT |

REMOTE CONTROL: How to Reduce the Cost, Complexity and Risk of Managing Your Distributed IT Infrastructure by Uplogix

April 2008 - (Free Research)
This white paper outlines the requirements of managing a highly distributed IT environment and examines how new secure remote management solutions can drastically reduce the cost, complexity and risk of managing remote locations. 
(WHITE PAPER) READ ABSTRACT |

The Top 12 Most Difficult Active Directory Management Tasks by Dell Software

October 2008 - (Free Research)
This paper explains the top 12 Most Difficult Active Directory Management Tasks and provides solution for making them easier. 
(WHITE PAPER) READ ABSTRACT |

Mastering Active Directory Migrations: Controlling Critical Issues (webcast) by Dell Software

October 2013 - (Free Research)
This new webcast explores Active Directory migration challenges, key considerations for planning your own transition and how Dell Software's Active Directory migration and management solutions can help. 
(WEBCAST) READ ABSTRACT |

Secure Cloud Applications Without Disrupting Your Enterprise Identity Infrastructure by Radiant Logic, Inc.

December 2012 - (Free Research)
This resource features an on-premise federated identity service that helps you extent your existing identity and access management (IAM) infrastructures to the cloud. 
(WHITE PAPER) READ ABSTRACT |

Netwrix Auditor Enterprise Edition by Netwrix Corporation

October 2013 - (Free Research)
When diagnosing the cause of your Active Directory problems, native auditing won't show you the complete picture of exactly what changed before your problems started. Netwrix Auditor does what native auditing can't: Download your free 20-day trial of Netwrix Auditor today. 
(TRIAL SOFTWARE) READ ABSTRACT |

Active Directory Expert Best Practices and Security Tips by Centrify Corporation

December 2012 - (Free Research)
Access this expert e-guide for Active Directory best practices and security tips. Learn about securing domain controllers, group policy security settings and more. 
(EGUIDE) READ ABSTRACT |

1 - 25 of 485 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts