Advanced What IsWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Advanced What Is returned the following results.
RSS What is RSS?
Related Categories

 •   Security Monitoring
 •   Managed Security Services
 •   Virtualization
 •   Network Security
 •   Endpoint Security
 •   Security Policies
 •   Wireless Technologies and Mobile Computing
 •   Data Security
 •   Application Security
 •   Storage Management

Related Searches
 •   Advanced Diagrams
 •   Advanced Strategies
 •   B2B Advanced What Is
 •   Backup Advanced
 •   Code Advanced What
 •   Learn About Advanced What Is
 •   Manuals Advanced What Is
 •   Metrics Advanced What Is
 •   Script Advanced What
 •   Spreadsheets Advanced
Advertisement

ALL RESULTS
1 - 25 of 459 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Selecting the Right Hosting Provider Insider Secrets That Every IT and Business Executive Should Know by Verio

December 20, 2007 - (Free Research)
How can you identify the hosting company that's right for you? What are the business risks? What questions should you ask? Get the facts in this interview with Phil Shih, a research analyst at Tier1 Research, who covers consumer... 
(WHITE PAPER) READ ABSTRACT |

What is Application Lifecycle Management? by Microsoft

December 01, 2008 - (Free Research)
This analyst white paper gives a clear definition to application lifecycle management (ALM). It also reviews 3 distinct main areas of ALM: governance, development and operations. 
(WHITE PAPER) READ ABSTRACT |

Financial Services Organization Rationalizes Storage Management Tools by NetApp

June 23, 2010 - (Free Research)
In this case study, Wikibon interviews a UNIX infrastructure manager about the four sets of storage management tools for the SAN that he and his team uses, his future SAN management plans, and how he has reduced the number of SAN management tools. 
(CASE STUDY) READ ABSTRACT |

Averting Catastrophe: How Real-Time Location Intelligence Can Mitigate Exposure and Better Manage Risk by Pitney Bowes Group 1 Software

April 2008 - (Free Research)
What is location intelligence? From an actuary perspective, it's the accessment of risk based on the physical location of real estate. This paper examines how location intelligence links data to precise physical coordinates. 
(WHITE PAPER) READ ABSTRACT |

Trends in Converged Infrastructure Management by CA Technologies.

May 2014 - (Free Research)
This exclusive webcast covers the results of a survey of top IT decision makers that reveals the emerging priorities of IT, the challenges facing IT and much more. 
(WEBCAST) READ ABSTRACT |

Data Quality Considerations in Master Data Management Structures by Pitney Bowes Group 1 Software

May 2008 - (Free Research)
In this white paper, learn how to implement and enforce enterprise-wide Master Data Management solutions. 
(WHITE PAPER) READ ABSTRACT |

Live Expert Chat: Introducing Microsoft SQL Server 2008 R2 by Microsoft

April 2010 - (Free Research)
Join this chat to hear how SQL Server 2008 R2 can provide your IT environment with an end-to-end approach that increases efficiencies, reduced costs and an increased competitive advantage for your business. 
(WEBCAST)

E-Book: Notes on Desktop Virtualization - by Brian Madden by NetApp

June 2010 - (Free Research)
Brian Madden, creator of BriForum and brianmadden.com, takes an in-depth look at desktop virtualization in this expert e-book. Read on for tips, suggestions, and insights from one of the leading experts on virtualization. 
(EBOOK) READ ABSTRACT |

Microsoft Virtualization Live Chat, 8/27/09 - Get Answers to Your Virtualization Questions by Microsoft

August 2009 - (Free Research)
In this Q+A transcript, Microsoft Virtualization Expert, Edwin Yuen, answers your questions regarding Microsoft Hyper-V, Windows Server virtualization, and much more. 
(PRESENTATION TRANSCRIPT)

TechInsights Report: What Smart Businesses Know About DevOps by CA Technologies.

September 2013 - (Free Research)
In this white paper, explore the wide range of technologies and processes that are used to implement DevOps, from a study of 1,300 senior IT decision-makers worldwide. You'll learn how successful organizations are investing in tools, measuring results, and overcoming common obstacles to DevOps processes. 
(WHITE PAPER) READ ABSTRACT |

Modernizing ALM and Development for Virtual Resources and The Cloud by CA Technologies.

July 2013 - (Free Research)
Application lifecycle management (ALM) for virtual and cloud environments is complex but essential - so what are the steps to modernize development and ALM processes? Check out this expert e-guide for the answer, and get advice on how to navigate the modernization process. 
(EGUIDE) READ ABSTRACT |

The Full Team Approach to Managing Requirements by SERENA Software, Inc.

February 2011 - (Free Research)
Software development teams are often faced with requirements to add new features to an existing code base. For many reasons, this sort of work can entail a lot of risk. This Expert Tip examines mistakes in managing the requirements process and how by looking at requirements from the perspective of all team members, these mistakes can be avoided. 
(EGUIDE) READ ABSTRACT |

Sedona Conference® Commentary On Legal Holds: The Trigger & The Process by ZANTAZ

January 2008 - (Free Research)
This Article, intended to provide guidance on those issues, is divided into two parts: The "trigger" and the "legal hold." 
(WHITE PAPER) READ ABSTRACT |

Enabling Advanced Analytics by Bloor Research by Sybase, an SAP company

March 2011 - (Free Research)
There is a great deal of discussion right now about advanced analytics, predictive analytics and in-database analytics. What are these? Read this white paper to find out! 
(WHITE PAPER) READ ABSTRACT |

Extending Advanced Malware Protection to Unmanaged devices, Cloud and Virtual Desktops by Trusteer

July 2012 - (Free Research)
Advanced threats and emerging IT initiatives such as BYOD, cloud applications and desktop virtualization are making security more challenging than ever before. This resource explores these challenges and offers insight on how to build a layered defense. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Defense Against the Dark Arts: Finding and Stopping Advanced Threats by Proofpoint, Inc.

October 2013 - (Free Research)
Learn critical information about today’s advanced threat landscape and what you need to do to stay secure. 
(WHITE PAPER) READ ABSTRACT |

What is Oracle Compatibility? by EnterpriseDB Corporation

November 2009 - (Free Research)
Watch this 10 minute video and discover what Oracle compatibility means for your business from a technical, and skills point of view. This video also offers multiple low risk strategies for using Postgres Plus Advanced Server to lower your Oracle costs and utilize the advantages of the most advanced open source database available. 
(VIDEO) READ ABSTRACT |

Advanced Persistent Threats and Other Advanced Attacks: Threat Analysis and Defense Strategies for SMB, Mid-size, and Enterprise Organizations by Websense, Inc.

September 2011 - (Free Research)
Understanding exactly what an Advanced Persistent Threat (APT) is can be difficult, as the hype surrounding this dangerous threat has clouded its definition. View this paper to discover the nature of APT risks and gain key recommendations on how to defend against them. 
(WHITE PAPER) READ ABSTRACT |

7 Stages Of Advanced Threats Cyber Attack Kill Chain by Websense

October 2013 - (Free Research)
This important resource examines the seven stages of advanced threats, discussing in-depth how your organization can best protect itself and what tools are needed to keep your critical information safe. 
(WHITE PAPER) READ ABSTRACT |

Debunking APT myths: What it really means and what you can do about it by SearchSecurity.com

July 2011 - (Free Research)
This E-Guide defines APT, dispels common myths and explains what you can do about this adversary. Additionally, uncover why the idea of keeping intruders out with traditional, perimeter-based security is useless against APT and how you can best protect against modern security threats. 
(EGUIDE) READ ABSTRACT |

The Business Value of Adopting Advanced Support Tools and Utilities by Hewlett-Packard Company

September 2011 - (Free Research)
Discover the obstacles associated with supporting advanced technology in complex IT environments. Review what you should look for when considering support features and deliverables, and learn how specific support tools can enable improved problem resolution and minimize downtime. 
(WHITE PAPER) READ ABSTRACT |

Understanding Advanced Persistent Threats and Complex Malware by Dell SecureWorks UK

October 2012 - (Free Research)
Learn more about the types of malware and advanced persistent threats that your company may be exposed to by viewing this webcast. It also discusses some of the common attributes of Advanced Persistent Threats and what you should be on the look out for. 
(WEBCAST) READ ABSTRACT |

Advanced Persistent Threats: From “FUD” to Facts by Websense, Inc.

October 2011 - (Free Research)
What is Advanced Persistent Threat (APT)? Too much marketing hype and FUD (fear, uncertainty, and doubt) have clouded the facts about a very real danger to organizations of all sizes. View this paper to gain a better understanding of APT and how to mitigate your risks.  
(WHITE PAPER) READ ABSTRACT |

Operation "Ke3chang": Targeted Attacks Against Ministries of Foreign Affairs by FireEye

December 2013 - (Free Research)
This guide explores a specific cyber-espionage campaign, how it used advanced persistent threats to infiltrate systems and what you can do to prevent similar attacks. 
(WHITE PAPER) READ ABSTRACT |

Analyst Report: The Case for Smarter Case Management by IBM

April 2014 - (Free Research)
Consult the following white paper to explore what advanced case management can do for your organization. Gain a firsthand look at how leading organizations are using case management and how you can go about building a business case for your own solution. Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 459 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts