Automation Security ComputingWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Automation Security Computing returned the following results.
RSS What is RSS?
Related Categories

 •   Business Process Automation
 •   Virtualization
 •   Data Security
 •   Data Center Management
 •   Enterprise Systems Management
 •   Storage Management
 •   Enterprise Data Protection and Privacy
 •   Grid/ Utility Computing
 •   Disaster Recovery
 •   Storage Security

Related Searches
 •   Automation Manager
 •   Automation Security Computing Content
 •   Automation Security Computing Decisions
 •   Automation Security Computing Provider
 •   Automation Security Secure
 •   Automation Security System
 •   Email Automation
 •   Maintain Automation
 •   Reviews Automation Security Computing
Advertisement

ALL RESULTS
1 - 25 of 430 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..
E-mail Recovery, Restoration, Search & Analysis by Ontrack® PowerControls™ by Kroll Ontrack.
Ontrack® PowerControls™ is a simple yet powerful tool for copying, searching, recovering and analyzing mailbox items directly from Microsoft Exchange Server more...
>> Discover more offerings from Ontrack® PowerControls™ by Kroll Ontrack.

Intel's Vision for the Ongoing Shift to Cloud Computing by Dell, Inc. and Intel®

April 07, 2011 - (Free Research)
Cloud computing promises large gains in efficiency and flexibility at a time when demands on data centers are growing exponentially. Intel’s vision for the future of this technology focuses on key principles to make the vision a reality. View this resource to learn more. 
(WHITE PAPER) READ ABSTRACT |

EXA Corporation Creates a Secure and Resilient Private Cloud by IBM

June 30, 2012 - (Free Research)
In this case study, see how one organization implemented a cloud solution that provides automation, security, and management tools to ensure their data on their hybrid cloud remained protected across multiple servers. 
(WHITE PAPER) READ ABSTRACT |

Unified Computing: An Agile Platform for Your Next Gen Virtualized Data Center by PC Connection

May 17, 2011 - (Free Research)
The data center is under great pressure as managers try to balance business demands and operational limitations. This webcast discusses how to transform your data center through virtualization and process automation, bringing your organization exceptional benefits. 
(WEBCAST) READ ABSTRACT |

Securing Your Valuable SharePoint Data by Dell Software

April 2008 - (Free Research)
Microsoft SharePoint technology is fast becoming a standard for corporate collaboration and document exchange. This paper outlines some of the challenges related to backup and recovery in Windows SharePoint Services 2003, SharePoint Portal Server 2... 
(WHITE PAPER) READ ABSTRACT |

Information Security Magazine, May 2009: Automating Compliance by Information Security Magazine

May 2009 - (Free Research)
This month's cover story is on Automatic Compliance. The weight of regulatory compliance can break the back of your IT operation. Automation can help you gear up for your next audit. We'll also cover new technologies for identity and access management, IDS vs. IPS, and more. 
(EZINE)

Machine Learning Sets New Standard for Data Loss Prevention: Describe, Fingerprint, Learn by Symantec Corporation

December 2010 - (Free Research)
Many organizations today are implementing Data Loss Prevention programs to identify sensitive information and create policies aimed at controlling where data should and shouldn’t go, as well as how it should get there. Read this white paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

Data center automation: realizing rapid value by Hewlett-Packard Company

July 2010 - (Free Research)
Data centre professionals strive to constantly improve operations and performance, yet many infrastructures are highly segregated, making it difficult to streamline processes. This white paper underscores the need for automation and explores the keys steps organisations must take to get started with their automation initiatives. 
(WHITE PAPER) READ ABSTRACT |

Managing Security Risks and Vulnerabilities by IBM

January 2014 - (Free Research)
Read now to learn about automated labor-saving automation, a platform that incorporates vulnerability analysis, risk management, and remediation support, all within a single console. 
(WHITE PAPER) READ ABSTRACT |

Compliance Management's Seven Steps to Success by Infoblox

July 2013 - (Free Research)
Failure to meet compliance can result in fines, dangerous network exposure and damage to a company's reputation. Traditional techniques leave many organizations at risk. Read this white paper to learn 7 critical steps to achieve network compliance. 
(WHITE PAPER) READ ABSTRACT |

File Transfer Survey: Results Highlight the Need for a Secure, Cost-Effective FTP Replacement by Attachmate Corporation

August 2010 - (Free Research)
Simply put, traditional file transfer protocol (FTP)-based solutions are ineffective. It's time to upgrade to a new approach that can help you meet data growth and increasingly stringent security and compliance measures head on. View now to learn more! 
(WHITE PAPER) READ ABSTRACT |

Case Study: Baltika Breweries Implements Safe File Exchange System by GlobalScape

May 2014 - (Free Research)
This case study follows Baltika Breweries' experience with a comprehensive file transfer platform that could accommodate their growing security requirements. 
(CASE STUDY) READ ABSTRACT |

UK IT priorities 2012 by ComputerWeekly.com

August 2012 - (Free Research)
This exclusive Computer Weekly research reveals how UK IT departments are prioritising their budgets in 2012, which technologies they are investing in, and the impact of cloud computing, mobile and other disruptive technology on their IT strategies. 
(IT BRIEFING) READ ABSTRACT |

HP Cloud Service Automation by HP & Intel®

September 2011 - (Free Research)
In this white paper learn why HP Cloud Service Automation is uniquely positioned to help your company get ahead in a business landscape increasingly dominated by cloud computing. 
(WHITE PAPER) READ ABSTRACT |

The Rise of the Information Center: Virtualization, Automation, and Cloud Storage Strategies by Hitachi Data Systems

February 2011 - (Free Research)
This presentation from Hitachi Data Systems outlines the need for transformation among data systems to adapt to today's business environment. It focuses on several strategies including Virtualization, Automation, and Cloud Computing. Read on to learn more today. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

The top 15 questions to ask when considering automation by Esker Inc.

December 2011 - (Free Research)
Migrating from manual accounts payable (AP) processes to automation can reduce costs, accelerate cycle times, and increase efficiency. Access this helpful buyer's guide to explore the key topics and most important questions to ask an AP solution provider so you can select the right tool to meet your business requirements. 
(WHITE PAPER) READ ABSTRACT |

Architectural Strategies for Cloud Computing by Oracle Corporation

December 2010 - (Free Research)
This paper explains how cloud computing is now also evolving in a private variant whereby enterprises set up cloud-like, centralized shared infrastructure with automated capacity adjustment that internal departmental “customers” utilize in a self-service manner. Realization of efficiency, performance, and agility benefits is reinforcing this trend. 
(WHITE PAPER) READ ABSTRACT |

Private Cloud Computing E-Zine Volume 3: IT Without Borders by SearchCloudComputing.com

August 2011 - (Free Research)
In this issue of the Private Cloud e-zine, we examine common challenges in developing a private cloud environment, from IT departmental silos to the lack of sophistication of cloud management tools. Access this resource to address the various factors that can block implementation. 
(EZINE)

Communications Leader Videotron Hopes to save $1.6 Million by Automating Service Calls on Blackberry Smartphones by BlackBerry

February 2009 - (Free Research)
Encumbered by paper-based work orders and instructions relayed verbally, Cable TV company Videotron needed a solution that helped manage service requests in a way that cut costs and service call mistakes. They chose a wireless solution from Blackberry that automates all administrative steps involved in handling a service call. 
(CASE STUDY) READ ABSTRACT |

Security Whitepaper: Google Apps Messaging and Collaboration Products by Google Apps

January 2011 - (Free Research)
Google Apps provide familiar, easy to use products and services for business settings. These services enable customers to access their data virtually anytime and anywhere from Internet-capable devices. This computing environment is called "the cloud." Read this white paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

Workload Automation: Helping Cloud Computing Take Flight by BMC Software, Inc.

April 2010 - (Free Research)
Many data centers are using the cloud to host applications and data storage but typically aren’t using the cloud to process effective batch computing workloads. Enterprise workload automation tools can give businesses a chance to take a much greater advantage of cloud computing. Read this whitepaper to learn how. 
(WHITE PAPER) READ ABSTRACT |

Workload Automation for the Cloud by CA Technologies.

December 2010 - (Free Research)
This paper discusses workload automation and job scheduling as it pertains to cloud computing and helps enterprise IT leaders understand the workload automation landscape by raising questions they need to carefully consider for long-term success of their datacenter workload automation strategy. 
(WHITE PAPER) READ ABSTRACT |

Information Security Magazine: March 2009 - Sky-High Risk? by Information Security Magazine

March 2009 - (Free Research)
This month's issue of Information Security focuses on risk management. We'll cover many important topics, such as: Cloud Computing - cost savings vs. security concerns; Web 2.0 - ways monitor and manage Web 2.0 usage within your company; Web Application Firewalls - How to choose and implement the right WAF for your company; and much more. 
(EZINE)

The Benefits of an Integrated Approach to Security in the Cloud by IBM

December 2013 - (Free Research)
This guide explores the role of growing cloud computing and various security models that can protect your cloud services. 
(WHITE PAPER) READ ABSTRACT |

Platform as a Service 101: Experts discuss the modern data center by Red Hat

July 2013 - (Free Research)
Platform as a Service (PaaS) serves as a time saving, cost effective way to automate your workflow. Discover how PaaS can aid your business' automation process in this podcast. 
(PODCAST) READ ABSTRACT |

eBook: From Virtualization to Cloud Computing by SearchServerVirtualization

September 2013 - (Free Research)
This expert e-guide explores virtual management tools available from many different platforms that can streamline management and prepare virtual data centers for the cloud. Tools from the major virtualization vendors and from third parties offer assistance with automation, self-service, security, monitoring, reporting, backups and more. 
(EGUIDE) READ ABSTRACT |

1 - 25 of 430 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts