Based Information SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Based Information Security returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Security Policies
 •   Enterprise Information Integration/ Metadata Management
 •   Enterprise Data Protection and Privacy
 •   Business Intelligence Solutions
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Network Security
 •   Customer Relationship Management (CRM)
 •   Disk-based Backup & Storage/ RAID
 •   Virtualization

Related Searches
 •   Based Information Security Integrated
 •   Based Information Security Video
 •   Based Manager
 •   Based Regional
 •   Definitions Based Information Security
 •   Ecommerce Based
 •   Flow Based Information Security
 •   Needs Based Information
 •   Skills Based Information Security
Advertisement

ALL RESULTS
1 - 25 of 485 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..
Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

IDC Opinion: The Economic Impact of File Virtualization - Reducing Storage Costs and Improving Management Efficiency by F5 Networks

May 2007 - (Free Research)
Enterprises are adopting new strategies for building file-based storage solutions. In several interviews, IDC found that companies are increasing their file-based storage by 50-120% a year, placing a high priority on efficiency. 
(WHITE PAPER) READ ABSTRACT |

EMC Documentum Archive Services for Imaging by EMC Corporation

EMC Documentum Archive Services for Imaging converts paper-based information to electronic images and then securely archives it. 
(SOFTWARE PRODUCT)

Location Intelligence: The New Geography of Business by Pitney Bowes Business Insight

January 2006 - (Free Research)
This white paper explores the benefits associated with location intelligence for analyzing and deploying location-based information. 
(WHITE PAPER) READ ABSTRACT |

Get The Most Out of Microsoft SharePoint: Capture, Access, Govern by EMC Corporation

August 2011 - (Free Research)
How can you get the most from your SharePoint environment? Read this guide and learn how enterprise infrastructure technologies from EMC and Microsoft help you benefit from the information contained within your Microsoft SharePoint platform. 
(WHITE PAPER) READ ABSTRACT |

The Economic Impact of File Virtualization: Reducing Storage Costs and Improving Management Efficiency by F5 Networks

May 2007 - (Free Research)
Network-based file virtualization is a key technology for more effectively managing file-based information. Download this IDC white paper to learn how file virtualization is being implemented and its impact on organizations. 
(WHITE PAPER) READ ABSTRACT |

Time to Get Rid of Big Paper by Hewlett-Packard Company

January 2014 - (Free Research)
This brief white paper highlights the banking industry's challenges with big paper – paper-based processes. Click now to see how digitizing some of this, traditionally, paper-based information can significantly improve customer relationships, aid regulatory compliance, and reduce risks of fraud. 
(WHITE PAPER) READ ABSTRACT |

Time Value of Data by SGI

June 2011 - (Free Research)
All of the printed material on earth is estimated to be about 200 petabytes (200,000 terabytes) of data. That is a lot of information and a lot of data to manage. But it is dwarfed by the amount of data that is generated worldwide with information technology today. Read this white paper to learn more about how to survive the information explosion. 
(WHITE PAPER) READ ABSTRACT |

Roundup of Business Intelligence and Information Management Research, 1Q08 by Actuate

July 2008 - (Free Research)
This document provides a roundup of 1Q08 (and some earlier) research and toolkits for IT leaders on the topic of business intelligence (BI) and information management. 
(WHITE PAPER) READ ABSTRACT |

Splunk for Business Intelligence by Splunk

April 2012 - (Free Research)
This paper uncovers how Splunk can be applied to a variety of business intelligence (BI) activities to allow your company real-time insight. 
(WHITE PAPER) READ ABSTRACT |

A Framework for 2.0 Adoption in the Enterprise by NewsGator

May 2010 - (Free Research)
This report draws from the knowledge of full‐time practitioners who orchestrate enterprise‐wide rollouts in their organizations. We outline patterns of adoption and highlight practical insight that will help your company and your clients plan for the process and help set realistic expectations for a successful 2.0 rollout. 
(WHITE PAPER) READ ABSTRACT |

Improving Business Agility with Unstructured Data - The Power of Leveraging the Web, News Feeds, and Customer Commentary in Daily Decisions by Endeca Technologies, Inc.

February 2011 - (Free Research)
This white paper examines how business intelligence platforms can help organize unstructured data such as emails, Word documents, PDF documents, and spreadsheets, posts on Internet message boards and social media websites, and turn it into a useful tool for customer and industry insight. Read on and find out more. 
(WHITE PAPER) READ ABSTRACT |

crystalreports.com: Web-Based Reporting & Information Sharing by Business Objects

crystalreports.com is a web-based report-sharing service that allows organizations to instantly share crucial business information with the right people - simply and securely. There is nothing to install, and places no additional workload on IT. It improves decision makers’ ability to make key business decisions based on timely and accurate data. 
(SOFTWARE PRODUCT)

crystalreports.com for Salesforce.com: Exception and Sales Reporting by Business Objects

crystalreports.com is a Web-based report-sharing service that allows you to share Crystal Reports with the right people - simply and securely. Create advanced reports from your Salesforce.com data. Dig deeper for answers using graphs with drill down capabilities. View, schedule, refresh, and distribute reports online - inside Salesforce.com. 
(SOFTWARE PRODUCT)

Integrating Information Labeling and Microsoft Active Directory Rights Management Services (AD RMS) by TITUS

November 2010 - (Free Research)
This white paper examines the challenges of content protection and user acceptance of content protection technology. It provides an overview of Microsoft's Active Directory Rights Management Services (AD RMS) and its integration with Titus' Document Classification and Message Classification product suites. 
(WHITE PAPER) READ ABSTRACT |

Regulations Shift Focus on Outbound Email Security by Proofpoint, Inc.

July 2008 - (Free Research)
Outbound email and other electronic communications pose a significant risk for data loss or leakage. This white paper will examine the new email security and compliance challenges and ways to address them. 
(WHITE PAPER) READ ABSTRACT |

Celina Insurance Group Streamlines Collaborative Processes with Agents to Stay ahead of the Competition by IBM

March 2009 - (Free Research)
Read this case study to see how Celina Insurance Group implemented a collaborative extranet based on IBM Lotus Notes and Lotus Domino to enhance their competitive edge. 
(CASE STUDY) READ ABSTRACT |

Unchain Your Network with Application Intelligence and Control by SonicWALL

February 2011 - (Free Research)
This paper discusses the new risks facing organizations in light of the prevalence of Web-based applications and offers best practices for gaining control of applications, data and bandwidth. 
(WHITE PAPER) READ ABSTRACT |

Secure By Design: Building Identity-based Security into Today’s Information Systems by IBM

March 2013 - (Free Research)
Consult this white paper to learn how you can improve your IT strategy. As the number of IT security incidents increases, businesses must begin to invest in information security and IT risk management. Find out how you create a security technique that is built-in to your company's structure by reading this resource. 
(WHITE PAPER) READ ABSTRACT |

Using Windows File Classification Infrastructure to Classify and Protect Documents by TITUS

November 2010 - (Free Research)
This white paper describes how organizations can leverage the File Classification Infrastructure and partner solutions to identify the business value of data, raise security awareness, and protect information assets. 
(WHITE PAPER) READ ABSTRACT |

3 Key Components of a Risk-Based Security Plan by Foundstone, Inc.

June 2008 - (Free Research)
This whitepaper takes a look at the different components of an effective security plan, and provides a perspective on how enterprises that are serious about their information security budgets should rethink their security plan. 
(WHITE PAPER) READ ABSTRACT |

Taking the fear out of bringing Government Systems online by IBM

July 2012 - (Free Research)
People are quickly navigating to a more mobile environment and many individuals are urging government agencies to develop online services. In the past, certain aspects of online sharing have caused government agencies to hesitate, but this white paper helps outline some of the benefits of online systems. 
(WHITE PAPER) READ ABSTRACT |

Beyond the Security Breach: Protecting Sensitive Data Using Encryption & Key Management by Linoma Software

February 2009 - (Free Research)
This paper identifies how organizations need to deploy new solutions to protect their information assets from theft and misuse, it also explores the landscape of legal liabilities and identifies the technical hurdle facing both management and IT. 
(WHITE PAPER) READ ABSTRACT |

The Demise in Effectiveness of Signature and Heuristic Based Antivirus by ComputerWeekly.com

February 2013 - (Free Research)
Anti-virus technology is failing to protect organisations from malicious attacks. Security professionals should look at alternative strategies, the NNC group argues in this report. 
(ESSENTIAL GUIDE) READ ABSTRACT |

2012 Security Outlook by ComputerWeekly.com

February 2012 - (Free Research)
This report from the Corporate Executive Board, based on extensive research with Chief Information Security Officers, identifies the top 10 security imperatives for 2012. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Rethinking Information Security to Improve Business Agility by Intel

March 2011 - (Free Research)
To enable rapid adoption on new technology and usage models—and provide protection in an evolving threat landscape—Intel IT has embarked on a radical five-year redesign of Intel's information security architecture. Continue reading to learn more. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 485 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts