Big Security Company InWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Big Security Company In returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Business Intelligence Solutions
 •   Security Policies
 •   Enterprise Data Protection and Privacy
 •   Storage Security
 •   Security Monitoring
 •   Network Security
 •   Virtualization
 •   Data Mining
 •   Statistical Data Analysis

Related Searches
 •   Big Intranet
 •   Big Paper
 •   Big Prices
 •   Big Security Work
 •   Concerns Big Security Company
 •   Examples Big Security Company
 •   Reporting Big Security
 •   Specialist Big
 •   Spreadsheets Big
 •   Version Big
Advertisement

ALL RESULTS
1 - 25 of 457 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..
Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Computer Weekly - 3 April 2012: Data security best practice by ComputerWeekly.com

April 03, 2012 - (Free Research)
This week’s Computer Weekly kicks off our Buyer's Guide to data security by looking at the changing role of the IT security chief. We also examine why flexible working is proving so slow to roll out and we talk to the UK's air traffic control operator about its ambitious desktop virtualisation project. 
(EZINE)

Computer Weekly – 26 February 2013: European Commission targets data security by ComputerWeekly.com

February 26, 2013 - (Free Research)
In this week's Computer Weekly, we look at the new IT security proposals from the European Commission and ask whether the benefits will be worth it. We reveal the challenges of managing big data, with help from some industry analysts, and hear from the Open University CIO on IT tools that support learning. Read the issue now. 
(EZINE) READ ABSTRACT |

Computer Weekly – 5 March 2013: Planning for a 4G future by ComputerWeekly.com

March 05, 2013 - (Free Research)
In this week's Computer Weekly, now the 4G spectrum auction is over, we look at what happens next for the future of mobile networking. Cloud computing promises to save costs – we examine how to ensure a return on investment. And we report from the RSA conference on how big data is helping tackle cyber security threats. Read the issue now. 
(EZINE) READ ABSTRACT |

Enterprise Information Protection - The Impact of Big Data by IBM

March 31, 2013 - (Free Research)
In this comprehensive resource, explore the requirements for information security and privacy in the age of big data. You'll discover how a holistic approach to enterprise information, along with the right big data technologies, enables you to keep data classified, secure, and organized. 
(WHITE PAPER) READ ABSTRACT |

Power Boost Your Big Data Analytics Strategy by IBM

November 18, 2013 - (Free Research)
Big data analytics can bring invaluable insights to your company, but in order to succeed, choosing the right platform is paramount. In this survey report, explore the business differentiators and quantitative measurements of big data analytics on a variety of competing platforms. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 12 February 2013: Can BlackBerry 10 bridge the business-consumer smartphone divide? by ComputerWeekly.com

February 12, 2013 - (Free Research)
In this week's Computer Weekly, we look at the new smartphone from BlackBerry – it's designed to please both business and consumer users, but is it enough to save the company? We examine the options for using cloud services for disaster recovery. And IT leaders tell us what they think about the future of the data centre. Read the issue now. 
(EZINE) READ ABSTRACT |

BIG-IP Application Security Manager™ by F5 Networks

The BIG-IP Application Security Manager delivers the industry’s foremost comprehensive application delivery security solution with the option to deliver both application delivery and security together. The ASM provides application layer protection from targeted and generalized application attacks to ensure that applications are always available. 
(HARDWARE PRODUCT)

Presentation Transcript: Why Small Businesses Should Think Outside the Box When Choosing Endpoint Security Solutions by Sunbelt Software

August 18, 2009 - (Free Research)
In this presentation transcript of the webinar "Why Small Businesses Should Think Outside the Box When Choosing Endpoint Security Solutions" you’ll learn why "bigger isn't necessarily better" when it comes to selecting an antivirus vendor. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

The trust advantage: How to win at big data by ComputerWeekly.com

November 11, 2013 - (Free Research)
Without consumer trust, most of the trillions of dollars of social and economic value promised from big data will go to waste, this report from The Boston Consulting Group reveals. 
(ANALYST REPORT) READ ABSTRACT |

Making Sense of Big Data in the Petabyte Age by ComputerWeekly.com

July 10, 2012 - (Free Research)
This report from Cognizant offers advice on the roadmap organisations should follow to survive the Petabyte Age. 
(EBRIEF) READ ABSTRACT |

Tip Guide: ‘Big data’ finds ally in predictive analytics, but combo requires care by Sybase, an SAP company

December 14, 2011 - (Free Research)
Big data, combined with predictive modeling tools, increases the potential to improve business strategies and gain competitive advantage. This expert e-guide offers insight on the best practices of combining big data and predictive analytics. 
(EGUIDE) READ ABSTRACT |

Overcoming the Three Biggest PCI Challenges by Alert Logic

August 19, 2009 - (Free Research)
PCI is expensive and difficult to sustain, and many breaches occur after passing an audit. Read this presentation transcript, based on the wencast of the same name, and discover how a cloud-based solution addresses the top 3 pain points and common pitfalls of PCI compliance. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Computer Weekly – 18 March 2014: Boost productivity with collaboration technology by ComputerWeekly.com

March 18, 2014 - (Free Research)
In this week's Computer Weekly, we hear from IT leaders improving collaboration and productivity for employees by using technologies such as unified communications and social media. We report from Mobile World Congress on the latest trends. And we examine how mobile device management tools can help build a trusted BYOD policy. Read the issue now 
(EZINE) READ ABSTRACT |

22 November 2011: Read the latest issue of the UK’s leading technology publication, where we analyse the latest technology news and what it means for IT managers. by ComputerWeekly.com

December 12, 2011 - (Free Research)
In this week’s Computer Weekly, we talk to the British Library about the enormous storage challenges of digitising its printed archive; we examine the state of the UK IT jobs market and the skills that are most in demand by employers; and we look at case studies of the best virtualisation projects. Download the new issue now. 
(EZINE) READ ABSTRACT |

CW Special report on Symantec by ComputerWeekly.com

May 14, 2013 - (Free Research)
This in-depth profile from Computer Weekly, updated for 2013, gives you the key facts on Symantec's products, financial performance and strategy. 
(WHITE PAPER) READ ABSTRACT |

IT, IG and Compliance: The New World Order for Data Management by SearchCompliance.com

October 13, 2013 - (Free Research)
Join ARMA, SearchCompliance, and hundreds of your peers online for this look at information governance processes in the age of big data. Hear expert opinions on information governance strategies and best practices to keep mobile data secure, stay regulatory compliant and even make data management processes more efficient in the big data era. 
(VIRTUAL TRADE SHOW) READ ABSTRACT |

Information Security Magazine - October 2009: Security 7 Awards by Information Security Magazine

October 13, 2009 - (Free Research)
The big news in this month's issue is the announcement of the winners of the fifth annual Security 7 Award. Other featured articles present tips for preventing future incidents and also explain how SOX compliance is hitting smaller public companies harder than the big guys. Read on for these great articles and more. 
(EZINE)

Essential Guide: Configuring Storage for Big Data Applications by EMC Isilon

January 25, 2013 - (Free Research)
Check out this latest issue of Storage Magazine to for a comprehensive breakdown of how big data is revolutionizing storage, and the latest developments in leveraging big data for competitive advantage. 
(ESSENTIAL GUIDE) READ ABSTRACT |

The Five Must-Haves of Big Data Storage by Red Hat

January 31, 2013 - (Free Research)
This white paper explores five must-haves to master big data storage for your company. Learn about the distinct factors that contribute to the challenges of storing big data and how one vendor's software-based, scale-out storage platform can help your organization address them. 
(WHITE PAPER) READ ABSTRACT |

The Right Remedy for Corporate Health by Dolphin

August 12, 2013 - (Free Research)
Check out this insightful resource to explore what you can learn from successful life sciences and healthcare companies on the subject of big data management and analytics. You'll discover a range of products that can help improve business performance and increase efficiency of core SAP applications. 
(WHITE PAPER) READ ABSTRACT |

There Are no Small Security Problems, Just Small Businesses (with Big Security Problems) by SearchCIO.com

March 06, 2013 - (Free Research)
This expert handbook discusses the top security strategies for SMBs.  Gain advice for tackling employee-based SMB vulnerabilities, the role of the CSO in 2020, incident response in the data age and additional SMB security tips. 
(EBOOK) READ ABSTRACT |

Big Data: Managing Explosive Growth and the Importance of Tiered Storage in Media and Entertainment by Quantum Corporation

February 29, 2012 - (Free Research)
This short white paper explores how you can make sure your organization has a worry-free archiving strategy, and includes a case study of how a major television production company successfully modernized its storage to make content available immediately and simultaneously to the company’s editing suites as filming proceeds. 
(WHITE PAPER) READ ABSTRACT |

Cisco Live Milan: IOE, SDN, and a lot of Wine by Cisco Systems, Inc.

February 10, 2014 - (Free Research)
This valuable resource details the revelations brought on regarding the Internet of Everything, Big Data and more at a recent Cisco sponsored conference in Italy. 
(WHITE PAPER)

10 Ways to Build a Better Big Data Security Strategy by Hewlett-Packard Company

January 31, 2014 - (Free Research)
Data collection plays a huge role in today's security landscape, and this guide explores 10 ways that you can achieve effective security by utilizing big data analytics. 
(WHITE PAPER) READ ABSTRACT |

Big Security for Big Data by Hewlett-Packard Company

December 31, 2012 - (Free Research)
This resource details how to make security event management simple, intelligent, efficient, and manageable, despite the issues big data creates. View now to learn more! 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 457 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts