Application Of DataWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Application Of Data returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Authentication / Password Management
 •   Intellectual Property Protection/ Extrusion Prevention
 •   Enterprise Data Protection and Privacy
 •   Customer Service (General)
 •   Database Administration
 •   Identity Management/ User Provisioning
 •   Data Quality
 •   Database Migration and Conversion/ EDT
 •   Databases

Related Searches
 •   Application Maryland
 •   Application Of Data Reports
 •   Application Of Data Support
 •   Application Of Equipment
 •   Application Of Networking
 •   Application Plans
 •   Application Practice
 •   Computer Application Of
 •   Customer Application Of Data
 •   Net Based Application Of Data
Advertisement

ALL RESULTS
1 - 25 of 500 | Next Page

Featured Sponsors

Advanced Meter Infrastructure: Composite Technologies to Meet New Demands in Sales and Customer Service by SAP America, Inc..
Discover what benefits advanced meter infrastructure (AMI) brings and why, and learn how the SAP NetWeaver platform and enterprise service-oriented architecture can support more...
>> Discover more offerings from SAP America, Inc..

Data Quality and Identity Resolution by Informatica

May 2008 - (Free Research)
This paper describes how identity resolution complements and extends the application of data quality and data integration processes into business applications. 
(WHITE PAPER) READ ABSTRACT |

Web Application Firewalls Are Worth the Investment for Enterprises by Imperva

February 2014 - (Free Research)
This resource explains how Web application firewalls help security leaders to better protect Web applications in their organizations. 
(ANALYST REPORT) READ ABSTRACT |

Mobilizing Windows Applications by Citrix

December 2013 - (Free Research)
This project design guide demonstrates a way to deliver Windows-based apps to mobile devices efficiently while avoiding application rewrites and maintaining information security. 
(WHITE PAPER) READ ABSTRACT |

Why Application Delivery Controllers are an Essential Piece to your Network Puzzle by Citrix

January 2014 - (Free Research)
When it comes to the new demands of network infrastructure, it is critical to have an effective application device controller (ADC). This brief guide explores an effective ADC that can help improve your network performance and provide you with effective scalability solutions. 
(WHITE PAPER) READ ABSTRACT |

9 reasons why Citrix NetScaler beats the competition by Citrix

December 2012 - (Free Research)
Application delivery controllers (ADC) are a necessary tool for many IT departments today. This guide explores the Citrix NetScaler and 9 ways it can benefit your business. 
(WHITE PAPER) READ ABSTRACT |

Solve the Application Visibility Challenge with NetScaler Insight Center by Citrix

December 2013 - (Free Research)
Managing your application performances is a task all IT departments face, and in order to ensure optimal speeds, it is crucial to monitor your network. This guide explores one company's solution to these challenges and how they can help you gain greater network visibility. 
(WHITE PAPER) READ ABSTRACT |

Application Modernization and Business Transformation in the Internet Age by SearchSOA.com

March 2014 - (Free Research)
Many organizations are rethinking app portfolios and modernizing legacy applications -- but when and how should you embark on a modernization effort? Find out in this expert handbook, where you'll explore multiple perspectives on legacy mainframe applications and modernization. 
(EGUIDE) READ ABSTRACT |

Taking Windows mobile on any device by Citrix

June 2013 - (Free Research)
This exclusive white paper examines how you can virtualize Windows business applications and desktops in the data center and deliver high-performing, secure access to them from any type of mobile device, over any network connection. Read on to learn how you can take Windows mobile. 
(WHITE PAPER) READ ABSTRACT |

Cutting the Cost of Application Security by Imperva

February 2014 - (Free Research)
This white paper presents a cost breakdown of a Web application firewall solution versus the potential costs of remediation after a successful Web attack. Click now to see why this solution is worth the investment. 
(WHITE PAPER) READ ABSTRACT |

The Future of Web Security: 10 Things Every Web Application Firewall Should Provide by Imperva

December 2012 - (Free Research)
This guide takes a look at 10 things that every web application firewall should provide. 
(WHITE PAPER) READ ABSTRACT |

Monitor and Protect Critical Web Applications with a Web Application Firewall by Imperva

February 2014 - (Free Research)
While the growth of business applications has grown, corporate resources have become more exposed to security threats. This resource takes a look at the growing risk of application attacks via SQL injection. 
(WEBCAST) READ ABSTRACT |

Web Application Security: Protect Your Critical Web Applications by Imperva

August 2010 - (Free Research)
To combat complex and distributed attacks, organizations need to protect their Web sites from new and emerging threats without affecting application performance or uptime. Read this paper to find out so much more. 
(WHITE PAPER) READ ABSTRACT |

Protect Your Business with Automated Business Continuity Solutions by SearchCIO.com

November 2012 - (Free Research)
This white paper introduces automated business continuity solutions as a way to protect against the damage caused by IT downtime. 
(WHITE PAPER) READ ABSTRACT |

Application Modernization: Best practices and methods by TechTarget

March 2014 - (Free Research)
As the business landscape continues to grow unabated, you may want to consider a new approach to modernizing your legacy apps. Take this brief survey and gain access to an essential guide that uncovers what you need to know before upgrading your major applications as well as how a service approach can support application modernization. 
(RESOURCE)

On the Safe Side: Managing Security in Mobile Apps by TechTarget

February 2014 - (Free Research)
Software development projects aren't always on top of the security management list, but when it comes to enterprise mobility applications, there's no question about its precedence. Take this survey to gain access to an e-book that highlights 7 tips to protect enterprise data and how to avoid the perpetual cycle of insecurity. 
(RESOURCE)

Employ Application Performance Management, Have Happy Customers by TechTarget

February 2014 - (Free Research)
Application performance management along with enterprise applications are getting more complicated. Thus, solving performance issues, while necessary, can also leave AppDev teams vulnerable to increased demands. Take this short survey to access an e-guide that aims to answer the questions facing many product managers today. 
(RESOURCE)

Cloud Storage: A list of applications to move there now by SearchStorage.com

May 2012 - (Free Research)
Prioritizing what your company puts into the cloud can be confusing - this expert tip guide can help you sort it out. 
(EGUIDE) READ ABSTRACT |

Cloud Storage: Specific Use Cases and Ground Rules for Getting Started by SearchStorage.com

May 2013 - (Free Research)
This expert guide from SearchCloudStorage.com examines recommended use cases for cloud storage applications, including backup, replication and content distribution. Read on and also learn what concerns you should address before you get started. 
(EGUIDE) READ ABSTRACT |

PCI Council issues mobile application rules for software developers by SearchSecurity.com

April 2013 - (Free Research)
The Payment Card Industry (PCI) Security Standards Council has demanded the development of mobile applications that include comprehensive security controls. This expert resource will help you understand what the new guidelines call for in terms of security controls, the history behind these standards, and further developments. 
(EGUIDE) READ ABSTRACT |

E-Guide: Configure Outbound Firewall Rules for Data Protection by SearchSecurity.com

August 2012 - (Free Research)
A new form of firewall was recently developed in order to withstand more sophisticated threats. Consult this expert E-guide to learn more about the value of application firewalls and how they can benefit the security of your business. 
(EGUIDE) READ ABSTRACT |

E-Guide: Best practices for pen testing Web applications by SearchSecurity.com

October 2011 - (Free Research)
This expert E-Guide examines what a Web application test is and best practices to getting the most out of them. Uncover guidelines to ensure your pen test is a success and key recommendations on how you can avoid common pitfalls. 
(EGUIDE) READ ABSTRACT |

New SaaS Identity Access Management Tools Emerge, Outdo Legacy IAM by SearchSecurity.com

March 2013 - (Free Research)
This expert E-Guide explains the necessary evolution of identity and access management (IAM) tools and details the difference of IAM for cloud-based applications vs. on-premise applications. 
(EGUIDE) READ ABSTRACT |

Tablets & Smartphones in the Enterprise by SearchSecurity.com

January 2013 - (Free Research)
Frantic IT departments are being forced to manage BYOD on the fly. Read this white paper to get strategic, practical advice on how to manage this consumer-driven trend. 
(EGUIDE) READ ABSTRACT |

Security Information Management Systems and Application Monitoring by SearchSecurity.com

April 2013 - (Free Research)
Did you know your security information management (SIM) system can shed light on application performance issues? This E-Guide details a four-step process for integrating apps into your SIM. View now to learn more! 
(EGUIDE) READ ABSTRACT |

Technical Guide on SIM: Moving beyond network security toward protecting applications by SearchSecurity.com

December 2011 - (Free Research)
SIMs have been widely adopted for their value in correlating, reporting and alerting on network security. But SIMs can be used for more than just network security monitoring. The same tools can also bring value to application managers if used correctly. In this technical guide, gain 4 steps for integrating applications into enterprise SIMs. 
(EGUIDE) READ ABSTRACT |

1 - 25 of 500 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts