Building Security Applications FunctionsWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Building Security Applications Functions returned the following results.
RSS What is RSS?
Related Categories

 •   Application Security
 •   Data Security
 •   Network Security
 •   Virtualization
 •   Endpoint Security
 •   Application Management and Maintenance
 •   Network Management
 •   Mobile Device Management
 •   Security Policies
 •   Business Intelligence Solutions

Related Searches
 •   Building Risk
 •   Building Security Applications Free
 •   Faqs Building Security Applications
 •   Info Building Security Applications
 •   Manage Building Security Applications
 •   Orders Building
 •   Programs Building Security
 •   Specialist Building
 •   Systems Building
Advertisement

ALL RESULTS
1 - 25 of 480 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Software Security Delivered in the Cloud by Hewlett-Packard Company

October 28, 2011 - (Free Research)
HP Fortify on Demand is a Security-as-a Service (SaaS) testing solution that allows organizations to quickly, accurately and affordably test the security of their applications without the need to manage or install any software. View now to learn more about this cloud-based, automated service. 
(PRODUCT OVERVIEW) READ ABSTRACT |

Is virtualization a black hole in your security? 5 ways to ensure it isn't by Sophos, Inc.

December 2008 - (Free Research)
This paper describes the hidden threats raised by unauthorized, unsecured desktop virtualization, and gives five effective ways to secure yourself against them. 
(WHITE PAPER) READ ABSTRACT |

Software-Defined Networking: Top Architecture and Security Considerations by SearchSecurity.com

June 2013 - (Free Research)
This e-guide examines the potential of network functions virtualization (NFV) in revolutionizing how networks are built, managed and used to create services as well as reveals the dark side of software-defined networking. 
(EGUIDE) READ ABSTRACT |

E-Guide: Building Risk Resilience in the Threat Landscape by CA Technologies.

December 2012 - (Free Research)
This expert e-guide explores how next-generation firewalls (NGFW) can overcome the limitations of traditional firewall solutions. Read on to discover key features, functions, and benefits that NGFWs can offer your organization. Also inside, find key tips for building risk resilience. 
(EGUIDE) READ ABSTRACT |

The Impact of AJAX on the Network by F5 Networks

March 2007 - (Free Research)
Though AJAX has a unique impact on the client, server, and the network, these challenges are addressed by existing, proven application delivery methods that address similar challenges arising from other technologies. 
(WHITE PAPER) READ ABSTRACT |

How to configure Mac OS X Server by ComputerWeekly.com

March 2013 - (Free Research)
This step by step guide shows you how to configure Max OS X Server. 
(ESSENTIAL GUIDE) READ ABSTRACT |

iTest Team - Rapid Test Automation for Equipment and Devices by Fanfare

iTest Team is an integrated test environment for developers, testers, and automation teams. It offers a unified approach for rapidly developing, automating, and maintaining test cases. iTest Team tests complex equipment and systems that are accessed through various protocols, such as command line interfaces, Web interfaces, SNMP, or command shells. 
(SOFTWARE PRODUCT)

SOA Appliances: A Simple & Secure Approach to Integration across SOA, API & Cloud by CA Technologies.

December 2011 - (Free Research)
In this resource, explore an alternative to ESBs -- a SOA integration appliance that offers simplified integration across SOA, APIs, and the cloud, along with native security functions. Read now to see how built-in security functions reduce complexities and costs. 
(WHITE PAPER) READ ABSTRACT |

Achieving PCI Compliance with Red Hat Enterprise Linux by Red Hat and JBoss

August 2009 - (Free Research)
While enterprises are often able to achieve compliance during an audit, they often have difficulty maintaining compliance on an ongoing basis. Learn how Red Hat Enterprise Linux's built-in features will allow your business to develop a robust implementation for managing all security necessary to achieve and maintain compliance on an on-going basis. 
(WHITE PAPER) READ ABSTRACT |

Building a Small Office Network: Getting Started by Cisco Systems, Inc.

October 2008 - (Free Research)
Building a small office network means starting with a foundation of switches and routers. The following guide will help you understand the difference between switches and routers and develop a clear vision for what your network foundation needs. 
(WHITE PAPER) READ ABSTRACT |

The Business Case for Enterprise Disaster Recovery Planning: Calculating the Cost of Downtime by Iron Mountain

September 2008 - (Free Research)
Given the enormous long-term costs and implications of a systems interruption, companies need to carefully define and implement plans to mitigate losses. This paper arms you with how to build a strong business case for a recovery plan. 
(WHITE PAPER) READ ABSTRACT |

Simple-to-Use Endpoint Security: Proactive Solutions for Networkwide Platforms by ESET

February 2009 - (Free Research)
This white paper examines the looming threat horizon that is forcing companies to reexamine their endpoint security functions and discusses ESET’s solution for integrated security management that is built around its advanced heuristic technology. 
(WHITE PAPER) READ ABSTRACT |

Oracle Data Mining 11g Release 2 Competing on In-Database Analytics by Oracle Corporation

June 2012 - (Free Research)
This paper offers an overview of Oracle Data Mining, detailing how you can build predictive models to better target customers, develop detailed customer profiles and detect and prevent fraud. Read on and learn how this data mining tool eliminates data extraction and movement, delivers the lowest TCO compared to traditional vendors and more. 
(WHITE PAPER) READ ABSTRACT |

CA Identity Lifecycle Management Solution Implementation: Implement an Effective Identity Lifecycle Management Solution by CA Technologies.

April 2009 - (Free Research)
The CA Identity Lifecycle Management Solution Implementation deploys CA Identity Manager and/or CA Role & Compliance Manager in 60-day engagement phases for rapid time-to-value. Read this paper for details and learn if this solution is right for your company. 
(DATA SHEET) READ ABSTRACT |

Configuring and Using IBM i's Auditing Functions by PowerTech

March 2010 - (Free Research)
Did you know that IBM i includes powerful auditing features? In fact, our own class-leading audit reporting solution leverages the information captured by this facility. Join this webinar-based on content presented at the 2009 COMMON conference-to learn about activating and configuring IBM i's built-in auditing capabilities. 
(WEBCAST) READ ABSTRACT |

Presentation Transcript: Configuring and Using IBM i's Auditing Functions by PowerTech

April 2010 - (Free Research)
Did you know that IBM i includes powerful auditing features? In fact, our own class-leading audit reporting solution leverages the information captured by this facility. Read this presentation transcipt - based on content presented at the 2009 COMMON conference - to learn about activating and configuring IBM i's built-in auditing capabilities. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Rapid Deployment Solutions: Features, Functions, Apps by itelligence, Inc.

November 2013 - (Free Research)
In this expert resource, explore the drivers, use cases, and benefits of Rapid Deployment Solutions, as well as the features and functions of these tools. Discover if a Rapid Deployment Solution is right for your next application deployment by reading now. 
(WHITE PAPER) READ ABSTRACT |

Epicor's IT Service Management - Expert IT Help Desk Software by Epicor Software Corporation

 
(SOFTWARE PRODUCT)

MarketScope for E-Discovery Software Product Vendors by Clearwell Systems

December 2009 - (Free Research)
Recession has accelerated the move to in-house e-discovery and more companies have brought, or are considering bringing, e-discovery in-house. This report will help enterprises build a business case, create a list of possible vendors and determine which ones best meet their needs. 
(WHITE PAPER) READ ABSTRACT |

Session Initiated Protocol (SIP): A Five-Function Control Protocol by F5 Networks

August 2007 - (Free Research)
The intent of this paper is to offer the reader a basic understanding of the Session Initiated Protocol. SIP is the conduit that will bring together the enterprise and telecommunications to provide IP-based communications. 
(WHITE PAPER) READ ABSTRACT |

IDC Opinion: The Economic Impact of File Virtualization - Reducing Storage Costs and Improving Management Efficiency by F5 Networks

May 2007 - (Free Research)
Enterprises are adopting new strategies for building file-based storage solutions. In several interviews, IDC found that companies are increasing their file-based storage by 50-120% a year, placing a high priority on efficiency. 
(WHITE PAPER) READ ABSTRACT |

Converting Linux and Windows Physical and Virtual Machines to Oracle VM Virtual Machines by Oracle Corporation

December 2008 - (Free Research)
This document describes the virtual machine conversion functions built into Oracle VM in Release 2.1.2, and how you can plan and execute the virtual machine conversions using Oracle VM. 
(WHITE PAPER) READ ABSTRACT |

Understanding Architectural Priorities Inside Government Clouds by AMD

January 2011 - (Free Research)
Not since the advent of the Internet has a technological concept achieved more attention than cloud computing. AMD’s server platform technology is uniquely tuned to address critical government requirements for reducing costs, simplifying operations and raising energy efficiency in server price/performance.  
(WHITE PAPER) READ ABSTRACT |

How can Identity and Access Management Improve IT Security and Reduce Risk to Help Drive my Business? by CA Technologies.

September 2010 - (Free Research)
IAM builds a foundation for effective security by helping ensure all users have only the appropriate level of access rights to all protected resources, and that those rights are enforced appropriately. Read this executive brief to learn more about taking control of IT operations and information security with Content-Aware IAM. 
(WHITE PAPER) READ ABSTRACT |

Oracle Compatibility Developers Guide for Postgres Plus Advanced Server by EnterpriseDB Corporation

March 2008 - (Free Research)
This guide describes the Oracle compatibility features of Postgres Plus Advanced Server. Oracle compatibility means that an application runs in an Oracle environment as well as in a Postgres Plus Advanced Server environment with minimal or no changes to the application code. 
(TRAINING GUIDE) READ ABSTRACT |

1 - 25 of 480 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts