Based Workplace Security ClaimsWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Based Workplace Security Claims returned the following results.
RSS What is RSS?
Related Categories

 •   Wireless Technologies and Mobile Computing
 •   Mobile Device Management
 •   Data Security
 •   Endpoint Security
 •   Network Security
 •   Application Security
 •   Wireless Security
 •   Security Policies
 •   Virtualization
 •   Laptops/ Notebooks/ Tablet PCs

Related Searches
 •   Based Calendars
 •   Based Sheets
 •   Based Workplace Comparison
 •   Based Workplace Security It
 •   Based Workplace Security Resources
 •   Capacities Based
 •   Demos Based Workplace Security
 •   Group Based Workplace
 •   Scheduling Based Workplace Security
 •   Unix Based
Advertisement

ALL RESULTS
1 - 25 of 431 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Enterprise Mobility Guide 2011 by Sybase, an SAP company

May 27, 2011 - (Free Research)
Mobile apps and tablets are transforming enterprises across the globe right now. How can you be sure you're staying ahead of the curve while increasing productivity and enhancing customer satisfaction? Get the The Enterprise Mobility Guide 2011. 
(WHITE PAPER) READ ABSTRACT |

5 strategies for managing a new generation of employees by Ultimate Software

January 11, 2013 - (Free Research)
It's been estimated that there are 80 million milennials in the US, and roughly half are in today's workforce. But as many companies are discovering, managing milennials requires a dramatically different approach than managing their predecessors. Read on to learn 5 key principles of effectively managing this new generation of employee. 
(WHITE PAPER) READ ABSTRACT |

Using Data Mining to Detect Insurance Fraud by IBM

November 18, 2010 - (Free Research)
Insurers lose millions each year through fraudulent claims. This paper explains how leading insurance companies are using data mining techniques to find fraudulent claims. Read on to learn how to combine powerful analytics with your existing fraud detection and prevention efforts. 
(WHITE PAPER) READ ABSTRACT |

ImageMC++ by Viking Software Solutions

ImageMC++ is a highly advanced solution designed to maximize the auto-adjudication of claims. The rapid availability of electronic image and data, coupled with extensive rules-base processes, accelerates the handling of those claims that do not immediately auto-adjudicate and improves the efficiency of customer service functions. 
(SOFTWARE PRODUCT)

How Cloud-Based Mobile Device Security Streamlines Data Protection by SearchSecurity.com

March 13, 2013 - (Free Research)
Read this whitepaper to discover why cloud-based security offers superior data protection in today's mobile workplace. 
(WHITE PAPER) READ ABSTRACT |

October Essentials Guide on Mobile Device Security by SearchSecurity.com

October 09, 2012 - (Free Research)
The October issue of Information Security offers advice on controlling the onslaught of employee-owned devices in your workplace, mitigating the risks of mobile applications, and changing your thought process when it comes to securing the consumerization of IT. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Desktop Administrator's Guide to BYOD - Pros and Cons of BYOD by SearchSecurity.com

November 30, 2012 - (Free Research)
BYOD and BYOPC can reduce costs, increase flexibility, and help keep your users happy. But to maximize the benefits and minimize the risk, it is essential to put the right policies in place. Read this E-Book to uncover the promises and pitfalls of these trends and how you can embrace them in your enterprise. 
(EBOOK) READ ABSTRACT |

Clipper NotesTM: In Search of the Long-Term Archiving Solution – Tape Delivers Significant TCO Advantage over Disk by Oracle Corporation

June 07, 2011 - (Free Research)
Putting to rest many of the claims that tape has passed its prime, this Clipper Note from The Clipper Group confirms that tape can be an important cost-saving storage technology for long-term archiving of big files in a tiered storage architecture. 
(WHITE PAPER) READ ABSTRACT |

802.1X: Port-Based Authentication Standard for Network Access Control (NAC) by Juniper Networks, Inc.

March 2007 - (Free Research)
This white paper will help you discover how to implement secure wireless LAN access (WLAN) across the enterprise network. 
(WHITE PAPER) READ ABSTRACT |

EqualLogic Outperforms Competitive SANs under Heavily Virtualized Exchange 2010 Workloads by Dell, Inc.

November 2010 - (Free Research)
Some iSCSI vendors bring complex multi-node failover mechanisms and more to the table, complicating head-to-head comparisons. In this report Taneja Group sets out to examine Dell’s differentiation in the midst of a crowded and rapidly growing field. 
(WHITE PAPER) READ ABSTRACT |

ExtraView Enterprise by Extraview Corporation

ExtraView Enterprise enables organizations to quickly and cost-effectively, create user specific web-based solutions that conform to a corporation's unique business processes and workflow requirements. 
(ASP & SOFTWARE PRODUCT)

Celina Insurance Group Streamlines Collaborative Processes with Agents to Stay ahead of the Competition by IBM

March 2009 - (Free Research)
Read this case study to see how Celina Insurance Group implemented a collaborative extranet based on IBM Lotus Notes and Lotus Domino to enhance their competitive edge. 
(CASE STUDY) READ ABSTRACT |

Leveraging Agent and Agentless Technology for Effective Operations Management by Hewlett-Packard Company

February 2008 - (Free Research)
In this white paper learn the benefits of using agent-based and agentless technologies to monitor infrastructure performance and availability. Also read about the total cost of ownership for both agent-based solutions as well as agentless techn... 
(WHITE PAPER) READ ABSTRACT |

Get Tactical on Mobility: Managed Cloud-Based Options Balance Control with Flexibility and Scale by Hewlett-Packard Limited

August 2013 - (Free Research)
This guide takes a look at the the wide-scale shift to an increased mobile world and some best practices for tackling challenges and optimizing wokplace efficiency. 
(WHITE PAPER) READ ABSTRACT |

Web Filtering: An Essential Part of a Consolidated Security System by Fortinet, Inc.

July 2011 - (Free Research)
In spite of the billions of dollars invested in security, web-borne threats are still on the rise. Enterprises need a security system that can enforce granular web access policies on all devices used to access the web from inside and outside the network perimeter. 
(WHITE PAPER) READ ABSTRACT |

Managing Risk in the Cloud by NetApp

October 2009 - (Free Research)
This white paper explores today's top security concerns in cloud environments, and aims to dispel the common (and growing) myth that a cloud-based infrastructure introduces new risks that cannot be quantified nor controlled. In this paper, you'll learn how a holistic approach to information security can help your company successfully combat risks. 
(WHITE PAPER) READ ABSTRACT |

The Cyber Savvy CEO: Getting to grips with today’s growing cyber-threats by ComputerWeekly.com

September 2011 - (Free Research)
The recent surge in cyber attacks has forced organisations to align cyber security efforts across all of their operations, rather than focusing on IT, but CEOs now need to take the lead in protecting their organisations, this report from PwC argues. 
(IT BRIEFING) READ ABSTRACT |

Computer Weekly 8 November 2011: Read this week's issue of the UK's leading technology publication, with the news, analysis and opinion that matters to IT managers. by ComputerWeekly.com

November 2011 - (Free Research)
In this week's Computer Weekly, we report from the London Cyberspace Conference where world leaders gathered to discuss internet security. We examine the tools available to help migrate from Windows XP to Windows 7; and hear from Royal Bank of Scotland about how to build a business case for virtual desktops. Download the new issue now. 
(EZINE)

Cloud Computing: Business Benefits With Security, Governance and Assurance Perspectives by ISACA

March 2011 - (Free Research)
Globalization and recent economic pressures have resulted in increased requirements for the availability, scalability and efficiency of enterprise information technology (IT) solutions. 
(WHITE PAPER) READ ABSTRACT |

Automated Tiered Storage Claims its Space in the Storage Market by Dell Compellent

October 2011 - (Free Research)
This SearchStorage.com E-Guide outlines how vendors are implementing this technology, and in particular what automated tiered storage approach they’re taking for solid-state drive. 
(EGUIDE) READ ABSTRACT |

Case Study: Helping AIC Cut Daily Backup Window While Saving Money & Staff Time by Quantum Corporation

April 2009 - (Free Research)
Read this customer case study to see how Canadian mutual fund company AIC Ltd. leveraged Quantum's DXi™5500 disk backup solution featuring data deduplication and replication technology in order to drastically reduce backup time as well as cut storage costs and management. 
(CASE STUDY) READ ABSTRACT |

FalconStor Heats up VTL Deduplication and the Data Deduplication War by FalconStor Software

June 2009 - (Free Research)
Today, let's focus on one of the leading players in the data deduplication space, FalconStor. FalconStor can rightfully claim the market share leadership space for VTLs, even though there are other strong players in the space. But the market is fiercely competitive and FalconStor is not resting upon its laurels. 
(JOURNAL ARTICLE) READ ABSTRACT |

Beyond Passwords: Protect the mobile enterprise with smarter security solutions by IBM

September 2013 - (Free Research)
This whitepaper examines the major challenges of providing secure access in mobile environments and explores new security models, policies and controls that can help keep critical apps and data secure. 
(WHITE PAPER) READ ABSTRACT |

BYOD Policies: Key Steps to Ensure Success by SearchSecurity.com

September 2012 - (Free Research)
This expert E-Guide unveils the top risks inherent to BYOD and offers guidance in creating and enforcing a successful BYOD policy to ensure your enterprise remains safe and under control despite the challenges consumer-based devices bring to the workplace. 
(EGUIDE) READ ABSTRACT |

Computer Weekly - 6 March 2012: Windows 8 - tablet meets desktop by ComputerWeekly.com

March 2012 - (Free Research)
This week’s Computer Weekly delves into the new world of Windows 8. We also talk to some top CIOs about how the downturn has shaped their priorities. You'll also find the third and final part of our Buyer's Guide to IPv6 migration, all inside this digital magazine. 
(EZINE)

1 - 25 of 431 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts