Build Nature OfWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Build Nature Of returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Network Security
 •   Security Monitoring
 •   Data Center Management
 •   Security Policies
 •   Wireless Security
 •   Application Security
 •   Vulnerability Assessment
 •   Virtualization
 •   Enterprise Data Protection and Privacy

Related Searches
 •   Build Benefits
 •   Build Nature Of New York
 •   Build New Jersey
 •   Build Roi
 •   Firm Build
 •   Functions Build Nature Of
 •   Implement Build Nature
 •   Mac Build Nature
 •   Net Build
Advertisement

ALL RESULTS
1 - 25 of 463 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Sun Storage 7000 Unified Storage Systems: Architected for Open, Simple, and Scalable Enterprise Storage by Oracle Corporation UK Ltd

May 01, 2009 - (Free Research)
Traditional NAS appliances have fallen short due to the proprietary nature of their software and the special-purpose nature of underlying hardware. By using open technologies, Oracle's Sun Storage 7000 Unified Storage Systems avoid the constraints, pitfalls, and costs of traditional storage appliances. 
(WHITE PAPER) READ ABSTRACT |

Application Security Viewpoint by Ounce Labs, an IBM Company

February 03, 2010 - (Free Research)
Application security is the aspect of understanding how applications are built and how someone could gain an advantage by looking at the application’s flaws. In this podcast, dive into the nature of applications for details on their security and how we interact with them. 
(PODCAST) READ ABSTRACT |

Presentation Transcript: The Changing Nature Of Cyber Crime, Attackers, Counter Measures and New Models For Defense In Depth by ESET

December 03, 2009 - (Free Research)
The threat environment has changed drastically in recent years. Threats are more complicated and attackers are part of organized groups seeking profit rather than fame. In this Presentation Transcript, Charles Kolodgy of IDC highlights some attackers' successes, countermeasures in risk reduction, and a new model for defense-in-depth. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Building and maintaining effective cloud computing infrastructures by Circadence

June 09, 2011 - (Free Research)
This white paper explores the nature of today’s technical challenges preventing the widespread adoption of cloud computing infrastructures in the enterprise and offers solutions to overcome them. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: How to build a toolset to avoid Web 2.0 security issues by SearchSecurity.com

September 17, 2010 - (Free Research)
Collaborative, interactive nature of Web 2.0 technology has great appeal for business, and companies of all sizes and verticals are taking full advantage of social networking sites, free online services and other platforms. Learn how to implement security tools that monitor, prevent, alert, encrypt and quarantine data from leaving your network. 
(EGUIDE) READ ABSTRACT |

IT Security: Built-In Protection with Intel vPro Technology by Intel

May 01, 2012 - (Free Research)
New security threats are constantly emerging, and it is your responsibility to properly protect your business. This white paper discusses four key aspects of IT security and explains how you can effectively address them by implementing processors with built-in security features. 
(WHITE PAPER) READ ABSTRACT |

Moving Beyond Spreadsheets by Prophix Software

June 05, 2014 - (Free Research)
Read this whitepaper to learn how to break the spreadsheet habit and make the migration to a purpose-built budgeting solution. 
(WHITE PAPER) READ ABSTRACT |

Security Threat Report: 2010 by Sophos UK

May 25, 2010 - (Free Research)
The first decade of the 21st century saw a dramatic change in the nature of cybercrime. Hackers have evolved from teenage boys spreading graffiti for kicks and notoriety to organised, financially motivated gangs. Read this white paper for a better understanding of the history of malware and learn to craft a better, safer future for internet users. 
(ANALYST REPORT) READ ABSTRACT |

Security Threat Report: 2010 by Sophos, Inc.

March 02, 2010 - (Free Research)
The first decade of the 21st century saw a dramatic change in the nature of cybercrime. Hackers have evolved from teenage boys spreading graffiti for kicks and notoriety to organized, financially motivated gangs. Read this white paper for a better understanding of the history of malware and learn to craft a better, safer future for internet users. 
(WHITE PAPER) READ ABSTRACT |

Enhancing Interaction Center ROI in Turbulent Economic Times by SAP America, Inc.

April 27, 2009 - (Free Research)
Interaction center managers, along with their counterparts in sales, marketing, and service, are being asked to deliver greater value on shoestring budgets. While the conventional reaction in tough economic times is to simply cut costs and services, the nature of the current downturn indicates that austerity measures of the past won't work today. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Building a Security Toolkit to Protect Against the Latest Web 2.0 Threats by SearchSecurity.com

July 13, 2011 - (Free Research)
This expert e-guide provides an in-depth overview of the latest Web 2.0 security threats and offers technical advice on how to defend against them. 
(EGUIDE) READ ABSTRACT |

Five Considerations for Putting Dev/Test in the Cloud by Hewlett-Packard Company

August 14, 2013 - (Free Research)
The cloud has attracted the attention of many software developers, as its elasticity and scalability are especially suitable for the changing demands and fast-paced nature of application development. But to ensure success with application development and testing in the cloud, there are a few things you should consider first. 
(WHITE PAPER) READ ABSTRACT |

How Bad Are the Bad Guys? - The Changing Nature of Web Security Threats by Webroot

September 23, 2009 - (Free Research)
This whitepaper considers how Web-based security threats are evolving, within the context of IT trends including mobile, home computing, and other forms of remote access that could all potentially increase the attack surface of the organization. Read on to learn more about protecting your organization from emerging Web-based security threats. 
(WHITE PAPER) READ ABSTRACT |

Identity and Access Intelligence: Transforming Enterprise Security by IBM

March 08, 2013 - (Free Research)
Consult this white paper to learn more about how the concepts of business IT are transforming. It describes the nature of identity and access intelligence and the factors that are behind this new and emerging aspect of security evolution. 
(WHITE PAPER) READ ABSTRACT |

Business Collaboration Services and Benefits by Jive Software

June 04, 2014 - (Free Research)
The following expert e-guide assess the technology issues that drive the need for effective unified communications collaboration and provides readers with the practical knowledge on how to build the business case for this kind of technology. Also gain access to technology recommendations, use cases and more. 
(EGUIDE) READ ABSTRACT |

Enterprises Take Aim at the Cloud for Application Development and Testing by Hewlett-Packard Company

March 31, 2013 - (Free Research)
Access this short resource to discover a converged cloud solution that provides just the type of cloud you need: flexible, reliable, and cost-effective. Built on a common architectural foundation across private, managed, and public clouds, HP delivers the cloud that enterprises rely on. 
(WHITE PAPER) READ ABSTRACT |

Prepaid Loyalty: Fact or Fiction? by Amdocs Management LTD

September 17, 2009 - (Free Research)
Achieving customer loyalty is a business goal shared by virtually every service provider. Prepaid subscribers present a greater challenge because the business model has no contracts or commitments. This paper examines the business and marketing strategies that service providers can deploy to create and build loyalty among prepaid customers. 
(WHITE PAPER) READ ABSTRACT |

Perceptions about Network Security: Ponemon research by Juniper Networks, Inc.

February 01, 2012 - (Free Research)
Ponemon Institute conducted a survey of over a thousand IT and IT security practitioners across Europe, studying their perspectives about the current threat landscape and what they believe the most effective strategies for keeping networks safe include. Uncover key findings and leverage this knowledge to build the right strategy for your business. 
(ANALYST REPORT) READ ABSTRACT |

EdgePlatform for Application Acceleration and Delivery by Akamai Technologies

The Akamai EdgePlatform is a purpose built Application Delivery Network that accelerates delivery of applications and content over the Internet, which can lead to increased usage, adoption and improved productivity. 
(SOFTWARE PRODUCT)

Enabling Enterprise Mobility: Transform the Mobile Computing Environment by Hewlett-Packard Company

September 30, 2011 - (Free Research)
Read this paper to uncover best practices for a three-step mobile management strategy that looks at: foundational enterprise-wide policies around security, privacy, and end-user computing; the collaboration infrastructure that  needs to be established; and the required end-to-end architectural decisions, application, and infrastructure models. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 5 February 2013: The third dimension – the innovation opportunity from 3D printing by ComputerWeekly.com

February 05, 2013 - (Free Research)
In this week's Computer Weekly, as the cost of 3D printing technology falls, the opportunity for innovation for IT leaders is growing. The rise of big data has created a new role – data scientist; we find out what they do. And government COO Stephen Kelly talks about the reform of Whitehall IT. Read the issue now. 
(EZINE) READ ABSTRACT |

Virtualization of Video Infrastructure by Vidyo, Inc.

January 31, 2013 - (Free Research)
As virtualization spreads users across the globe, organizations are seeking solutions to keep their users connected. View this white paper to learn how the virtualization of video is helping make these options more affordable and flexible for businesses today. 
(WHITE PAPER) READ ABSTRACT |

IT Handbook: The Promise and Perils of Open Source Clouds by SearchCloudComputing.com

May 20, 2013 - (Free Research)
In this handbook on open source and the cloud, we look at open source options, the benefits and liabilities, as well as the pros and cons of proprietary models. Explore some of the key issues shaping the market, the tools available and how data centers make use of and contend with open source issues. 
(EBOOK) READ ABSTRACT |

6 Best Practices for Preventing Enterprise Data Loss by Polycom, Inc.

February 05, 2009 - (Free Research)
Nearly 220 million electronic records have been breached since January 2005, according to Privacy Rights Clearinghouse. This paper outlines six best practices for corporations seeking to prevent enterprise data loss in order to protect revenue, limit customer attrition, and meet government regulatory requirements. 
(WHITE PAPER) READ ABSTRACT |

Benefits of Citrix NetScaler for Ajax Applications by Citrix

September 2008 - (Free Research)
In this whitepaper learn the many benefits of Citrix NetScaler for Ajax applications. Discover how NetScaler speeds up the initial load of an Ajax application and helps ensure that the benefits of asynchronous communication are not delayed. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 463 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts