Check RequestWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Check Request returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Storage Security
 •   Storage Management
 •   Network Security
 •   Application Management and Maintenance
 •   Backup Systems and Services
 •   Endpoint Security
 •   Mobile Device Management
 •   Enterprise Content Management (ECM)
 •   Wireless Technologies and Mobile Computing

Related Searches
 •   Business Check Request
 •   Check Conferences
 •   Check Protocol
 •   Check Request Comparisons
 •   Check Request Controls
 •   Check Request Market
 •   Check Request New Hampshire
 •   Documentation Check Request
 •   Mac Check Request
 •   Outsource Check Request
Advertisement

ALL RESULTS
1 - 25 of 486 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Forum XWall - Web Services Security Firewalls - Prevent Unauthorized Access by Forum Systems

Forum XWall™ is the industy's first Web Services Firewall equipped with data authentication as well as XML intrusion prevention to actively protect against unauthorized access, XML viruses, data corruption and denial of Web service attacks. Forum Systems is the leader in Web Services Security. 
(SOFTWARE PRODUCT)

Archive tape management made easy: Cut complexities and costs to better handle data requests by Iron Mountain

December 31, 2013 - (Free Research)
Locating and retrieving data from thousands of tapes is time-consuming and costly. It can also create security and compliance issues. This data sheet explains a service that can make handling archive data requests easy by storing tapes offsite. 
(DATA SHEET) READ ABSTRACT |

HANDLE YOUR ACHIVE DATA CONFIDENTLY AND COST-EFFECTIVELY by Iron Mountain

December 31, 2013 - (Free Research)
This brochure talks about the benefits of an archival tape management solution that can make handling requests for archive data easy and quicker while also reducing costs. 
(BROCHURE) READ ABSTRACT |

Fast Track to Archived Data Access by Iron Mountain

March 01, 2012 - (Free Research)
Read this paper for best practices and keys to help you prepare for a compliance or audit request. Learn how an offsite partner can help improve your data protection, accessibility and recoverability, and receive 7 keys to help improve your security and backup policies. Also receive checklist of 4 keys to help you better access your information. 
(WHITE PAPER) READ ABSTRACT |

Tape Vaulting: What You Need to Know About Tape Backup and Archiving by Iron Mountain

March 05, 2012 - (Free Research)
Check out this expert presentation transcript with storage industry analyst Lauren Whitehouse to learn about recent developments in tape that are keeping it relevant. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Streamlining Access Control for SAP® Systems: The Many Advantages of Automated User Provisioning by Security Weaver

September 2008 - (Free Research)
For organizations with high-volumes of employees leveraging SAP solutions, managing access is a complex undertaking. This paper examines the access control challenges and reveals the many advantages of automated user provisioning for SAP solutions. 
(WHITE PAPER) READ ABSTRACT |

Is Your Complete Restoration Plan on Track? by Iron Mountain

March 2012 - (Free Research)
Check out this white paper to learn how finding the right storage partner can help you ensure your data is protected and accessible and put your mind at ease. Read on to discover what to look for in an offsite partner, explore key DR concerns to determine how your existing strategy holds up and more. 
(WHITE PAPER) READ ABSTRACT |

The Financial Edge™: Fund Accounting Software for Nonprofits by Blackbaud

The Financial Edge gives you all the information you need to make the best financial decisions for today and tomorrow. Think of it as insurance for your organization’s future. 
(ASP & SOFTWARE PRODUCT)

Optimize Your Storage for a Successful Virtual Desktop Infrastructure by Dell India

December 2013 - (Free Research)
Check out this concise resource to find out the key storage attributes needed for successful desktop virtualization. 
(WHITE PAPER) READ ABSTRACT |

Critical Backup and Compliance Requirements by APTARE

June 2013 - (Free Research)
This short white paper explores a data protection solution that provides end-to-end visibility to ensure sustainable compliance. 
(WHITE PAPER) READ ABSTRACT |

CORE IMPACT Pro V10 by Core Security Technologies

December 2009 - (Free Research)
Please join Core Security for a live demonstration of CORE IMPACT Pro, the most comprehensive product for performing security assurance testing on an organization’s network systems, endpoint systems, end users and web applications. 
(PRODUCT DEMO) READ ABSTRACT |

Mobility XE Increases Utility Worker Efficiency by NetMotion Wireless

June 2008 - (Free Research)
Using a mobile VPN, workers in the field can quickly and easily access customer information, speeding the time for delivery of service. 
(CASE STUDY) READ ABSTRACT |

Stock Yards Bank and Trust Makes Employees Productive and Keeps Data Secure by Imprivata

February 2010 - (Free Research)
This case study features one large, trusted U.S. bank's experience with a simplified authentication solution that enabled increased productivity, compliance, and security levels. 
(WHITE PAPER) READ ABSTRACT |

Provergent Suite - Telecom Order & Inventory Software by Digital Fairway, Inc.

The Provergent Communication Asset Management Suite helps to manage the planning, procuring, provisioning, auditing & delivering of communications services. Provergent allows you to build accurate & easy to manage centralized inventories, backed up by automated provisioning processes to manage all moves, adds, changes & deletes in the inventory. 
(SOFTWARE PRODUCT)

EdgePlatform for Application Acceleration and Delivery by Akamai Technologies

The Akamai EdgePlatform is a purpose built Application Delivery Network that accelerates delivery of applications and content over the Internet, which can lead to increased usage, adoption and improved productivity. 
(SOFTWARE PRODUCT)

Riverbed Stingray Traffic Manager VA Performance on vSphere 4 by Riverbed Technology, Inc.

January 2012 - (Free Research)
Cloud infrastructure platforms like VMware vSphere 4.0 can benefit from load balancers that connect users to the most suitable datacenter. This white paper outlines how the Riverbed Stingray Traffic Manager Virtual Appliance (VA) improves traffic performance compared to a Linux install. 
(WHITE PAPER) READ ABSTRACT |

Constellation Energy Group by EMC Corporation

June 2008 - (Free Research)
In its quest to fully leverage the new technologies, Constellation energy realized it needed to integrate them to one another, as well as integrate them with other business processes and applications. 
(WHITE PAPER) READ ABSTRACT |

The Desktop Admin's Guide to BYOD: Pros and Cons of BYOD by SearchSecurity.com

May 2012 - (Free Research)
Despite the fact that BYOD and BYOPC can reduce costs, add IT flexibility, and keep employees happy, they are not without issues. Check out this E-Book from SearchConsumerization.com to learn the promises and pitfalls of BYOD and BYOPC and discover how to successfully embrace them in your organization. 
(EBOOK) READ ABSTRACT |

IBM Tivoli Service Request Manager White Paper by IBM

January 2010 - (Free Research)
This IBM white paper will show you how you can help your organization manage incidents and problems, restore critical services, and minimize service desk calls in this white paper. 
(WHITE PAPER) READ ABSTRACT |

Epicor's IT Service Management - Expert IT Help Desk Software by Epicor Software Corporation

 
(SOFTWARE PRODUCT)

Best Practices for Lawful Intercept in Enterprise and Service Provider Networks by Ixia

November 2013 - (Free Research)
Data intercept requests require organizations to help government agencies collect communication information and content. Learn how you to prepare your network for such requests. 
(WHITE PAPER) READ ABSTRACT |

Convert IBM Cloud image parameters into Java using JAXB: JAXB and Plain Old Java Objects morph XML cloud image parameters in usable Java code by IBM

July 2011 - (Free Research)
Get under the hood:  This technical note describes how to transform XML response into a Java™-usable response by creating Plain Old Java Objects (POJOs) and calling JAXB's unmarshal method. Simplify how to send requests to create new instances based on images that request parameters from Java classes. 
(WHITE PAPER) READ ABSTRACT |

Efficient Management of Legal and Compliance Requests on D2D Storage by Index Engines

December 2011 - (Free Research)
This white paper features today's best practices regarding efficient data management and provides you with the information you need to optimize your existing storage infrastructure and increase efficiency throughout your data center. Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

Compliance Frameworks That Enhance e-Discovery Effectiveness by AXS-One, a Daegis Company

October 2011 - (Free Research)
The threat of e-discovery is a dark cloud hovering over an enterprise. These projects require an excess of effort and money – and requests are often made with no prior notice. Thankfully, records management can alleviate the pain of e-discovery. This e-guide provides a high-level view of records management in the workplace. 
(EGUIDE) READ ABSTRACT |

Yes You Can Connect Employees' Personal Smartphones by BlackBerry

September 2011 - (Free Research)
Employees are flooding IT departments with requests to connect their personal smartphones to the company IT infrastructure. Disregarding the real productivity benefits from connected employees, until now many IT departments have been too concerned with security and control risks. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 486 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts