Articles About Best Practices SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Articles About Best Practices Security returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Security Policies
 •   Virtualization
 •   Security Monitoring
 •   Endpoint Security
 •   Enterprise Data Protection and Privacy
 •   Backup Systems and Services
 •   Storage Management
 •   Databases
 •   Disk-based Backup & Storage/ RAID

Related Searches
 •   Articles About Document
 •   Articles Agency
 •   Demand Articles
 •   Developments Articles About Best
 •   Disk Articles About
 •   India Articles About
 •   Mapping Articles
 •   Procedures Articles About
 •   Roi Articles About Best
 •   Web-Based Articles About Best
Advertisement

ALL RESULTS
1 - 25 of 472 | Next Page

SQL Server 2000 Security Best Practices by Global Knowledge Network, Inc.

November 2004 - (Free Research)
The security of SQL Server database servers has become a top priority for database administrators. This article examines best practices that can be employed to secure Microsoft SQL Server 2000 databases. It provides an overview of the security model in SQL Server 2000 and discusses best practices you can employ to secure yours. 
(WHITE PAPER) READ ABSTRACT |

Database Crime Scene Prevention by Imperva

February 2009 - (Free Research)
This article examines known attacks, methods, and tools used by criminals, as well as emerging exploit categories used to break into a database, establish control, compromise the system, steal the data, and cover up the tracks. Read this short article to learn best practices for protecting databases against these attack methods. 
(TECHNICAL ARTICLE) READ ABSTRACT |

Protecting Your Mid-Size Business from Today's Security Threats by Hewlett-Packard Company

March 2014 - (Free Research)
This informative resource dives deep into 3 articles revolving around the protection of mid-sized business from today's security threats. 
(WHITE PAPER) READ ABSTRACT |

Article: Best practices for deploying iSCSI SANs in DSS database solutions by Dell, Inc.

April 2011 - (Free Research)
Scalability and availability are key factors of an effective DSS or DW solution. Adhering to the best practices outlined in this article for integrating Dell EqualLogic PS Series iSCSI SAN arrays into the design can help IT administrators create a scalable high-performance infrastructure. 
(ANALYST NEWS) READ ABSTRACT |

SUN SYSTEMS FOR ORACLE COHERENCE: An optimal in-memory data grid architecture by Sun Microsystems, Inc.

November 2009 - (Free Research)
Optimizing the benefits of a data grid built with Oracle Coherence relies upon creating a modular, balanced architecture. Matching the number of application servers, memory capacity, and quantity of processing nodes to the target workload characteristics is important to achieving the best performance. 
(WHITE PAPER) READ ABSTRACT |

The Seven Best Practices of Highly Effective eDiscovery Practitioners: Powerful Lessons in eDiscovery Success by Guidance Software, Inc.

April 2010 - (Free Research)
The Seven Best Practices of Highly Effective eDiscovery Practitioners article provides legal professionals with insight on how they and other members of the eDiscovery team can achieve a repeatable, defensible in-house eDiscovery process. Read this paper to learn so much more. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Chapter 2: Enterprise-Class Disk Array Purchase Considerations by Quantum Corporation

February 2010 - (Free Research)
This chapter from the SearchDataBackup.com Backup best practices guide explores the key backup technologies in today’s storage environment. This article identifies specific points of interest for disk backup. Download this chapter to learn all about disk storage as well as specific considerations of enterprise-class disk arrays to keep in mind. 
(EGUIDE) READ ABSTRACT |

The Business Impact of Data Security Regulations: Featuring Massachusetts by Sophos, Inc.

November 2009 - (Free Research)
Massachusetts has taken the lead in passing a new regulation - 201 CMR 17:00 -that requires companies to implement a comprehensive data security plan that includes encryption. This article discusses some aspects of this regulation and offers suggestions on how data security best practices can help with compliance. 
(WHITE PAPER) READ ABSTRACT |

The business impact of data security regulations: Featuring Massachusetts by Sophos, Inc.

June 2009 - (Free Research)
This article discusses some aspects of a new regulation -- 201 CMR 17:00 -- and offers suggestions on how data security best practices can help with compliance. Companies should discuss the regulation in detail with their legal consul to examine how it affects their unique circumstances and the best course of action to be taken. 
(WHITE PAPER) READ ABSTRACT |

Best Practices for Migrating SAP Environments by Sun Microsystems, Inc.

June 2009 - (Free Research)
This Sun BluePrints™ article explains the process of moving an SAP environment from one system to another, and describes the resources and services available from Sun to assist users planning a migration. 
(WHITE PAPER) READ ABSTRACT |

Information Security Emagazine: Best Practices for the Evolving Threat Landscape by Hewlett-Packard Limited

December 2013 - (Free Research)
In this security emagazine, discover a variety of resources that offer exclusive best practices on how to boost security strategies to address the rise in cyber threats. 
(WHITE PAPER) READ ABSTRACT |

eBook: Cloud Computing for Enterprise Developers by Sun Microsystems, Inc.

August 2009 - (Free Research)
If you're an enterprise developer then you're probably familiar with the term "cloud computing," but you may still have questions. In this eBook, you'll learn about the benefits of cloud computing, what it really means to compute in the cloud, some of the different cloud types, and much more! 
(EBOOK) READ ABSTRACT |

CW500: Best practice in BYOD by ComputerWeekly.com

September 2013 - (Free Research)
Simon Furber, Network Manager at Brunel University, highlights the key issues to consider when introducing BYOD in your organisation. 
(PRESENTATION) READ ABSTRACT |

Encryption in the cloud by ComputerWeekly.com

April 2014 - (Free Research)
This article in our Royal Holloway Information Security series assesses challenges of providing effective encryption to data stored in the cloud. 
(ESSENTIAL GUIDE) READ ABSTRACT |

6 Questions to Ask About Your Data Storage-Emily Wojcik byline for ILTA Peer to Peer Magazine by CommVault Systems, Inc.

December 2013 - (Free Research)
In this quick 1-page article, 6 questions are provided to help hash out what data is necessary to store, and what will only add clutter. Read on to discover how your organization can reduce long-term storage costs and improve records management by simply asking the right questions. 
(WHITE PAPER) READ ABSTRACT |

Gartner: Best practices in virtualisation by ComputerWeekly.com

March 2012 - (Free Research)
Philip Dawson, Gartner VP offers best practice advice for organisations looking to virtualise their IT infrastructure. 
(ANALYST BRIEF) READ ABSTRACT |

Cloud computing for the enterprise, Part 3: Using WebSphere CloudBurst to create private clouds by IBM

May 2011 - (Free Research)
This article provides an introduction to IBM® WebSphere® CloudBurst™ and WebSphere Application Server Hypervisor Edition. 
(WHITE PAPER) READ ABSTRACT |

Best Practices for Migrating to a New Service Desk Platform by Nimsoft, Inc.

July 2012 - (Free Research)
This white paper offers guidelines and best practices for IT organizations that are in the midst of, or are planning a migration to a new service desk platform. Within, learn how you can effortlessly migrate your tickets, workflow, knowledge articles, and more. 
(WHITE PAPER) READ ABSTRACT |

Five Best Practices for Unified Communications by AT&T Corp

October 2009 - (Free Research)
Enterprises can realize value from their UC programs by following some basic practices, such as allowing for sufficient up-front planning, finding the right champion, and establishing cross-functional teams to manage program implementation. This article provides basic guidelines for implementing a successful UC program. Read on to learn more. 
(WHITE PAPER)

Gartner: Best practices for I&O for cloud-readiness by ComputerWeekly.com

January 2013 - (Free Research)
Gartner analysts explain how Infrastructure and Operations (I&O) teams can best prepare for the cloud. 
(ANALYST BRIEF) READ ABSTRACT |

Best Practices in Information Governance & Compliance by RSD

October 2011 - (Free Research)
Access this exclusive newsletter on best practices and tips of information governance with articles from leaders in enterprise technology. 
(NEWSLETTER) READ ABSTRACT |

10 Best Practices for Microsoft SharePoint Security by Thawte Inc.

September 2013 - (Free Research)
In this white paper, you will discover ten best practices everyone should follow when using a leading collaboration and content management application designed to eradicate vulnerabilities in your organization. 
(WHITE PAPER) READ ABSTRACT |

Article: Design Patterns for Case Management by EMC Corporation

August 2011 - (Free Research)
This article discusses how using a ‘case management’ construct as an organizing principle can often simplify the challenges associated with complex decision-intensive processes. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Data Deduplication Technology Best Practices by Quantum Corporation

June 2011 - (Free Research)
Read this article as W. Curtis Preston explains those things you should (or shouldn't) be doing if you are performing data deduplication. 
(EGUIDE) READ ABSTRACT |

E-Guide: Dedupe Dos and Don'ts – Data Deduplication Technology Best Practices by Quantum Corporation

July 2010 - (Free Research)
Read this article as W. Curtis Preston explains those things you should (or shouldn't) be doing if you are performing data deduplication. 
(EGUIDE) READ ABSTRACT |

1 - 25 of 472 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts