Chordiant Security ServerWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Chordiant Security Server returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Network Security
 •   Virtualization
 •   Data Center Management
 •   Security Monitoring
 •   Security Policies
 •   Application Security
 •   Application Servers
 •   Enterprise Data Protection and Privacy
 •   Enterprise Systems Management

Related Searches
 •   Chordiant Portals
 •   Chordiant Procedure
 •   Chordiant Security Simple
 •   Chordiant Security Suite
 •   Conference Chordiant
 •   Directories Chordiant Security Server
 •   Event Chordiant Security
 •   Group Chordiant Security
 •   Improvement Chordiant
 •   Proposals Chordiant Security
Advertisement

ALL RESULTS
1 - 25 of 487 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Protecting the Dynamic Datacenter by Trend Micro

August 01, 2009 - (Free Research)
Trend Micro server and application protection addresses the challenging operational security and compliance needs of today’s dynamic datacenter. We provide comprehensive protection, greater operational efficiency, superior platform support, and tighter integration with existing investments. Read this paper to learn more! 
(WHITE PAPER) READ ABSTRACT |

VMware Enlisted to Serve Marine Corps Enterprise Networking Requirements by VMware, Inc.

December 2008 - (Free Research)
The MCNOSC needed an affordable and easy-to-manage alternate site with real-time data transfer that would be reliable in the event of a catastrophe so they implemented VMware virtual infrastructure which effectively met their requirements. 
(CASE STUDY) READ ABSTRACT |

CA Technologies and VMware: Accelerating the Business Value of Virtualization by CA and VMware

April 2011 - (Free Research)
Together, CA Technologies and VMware support customers’ journey to the cloud with integrated, synergistic solutions that accelerate the business value of virtualization. Hear how customers are benefiting from the two organizations' shared vision, products, services and support. 
(WEBCAST) READ ABSTRACT |

Presentation Transcript: Reducing Cost in the Data Center through Windows Server 2008 R2 - All About Virtualization by Dell, Inc. and Intel®

November 2010 - (Free Research)
Everyone is talking about virtualization as a critical component to the success of a data center. What are some of the benefits of virtualization? What are the cost benefits of using Windows Server 2008 R2 for virtualization? Learn more in this presentation transcript. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Presentation Transcript: Using Virtualisation with Windows Server 2008 R2 to Reduce Costs in the Data Centre by Dell, Inc. and Intel®

November 2010 - (Free Research)
Everyone is talking about virtualisation as a critical component to the success of a data centre. What are some of the benefits of virtualisation? What are the cost benefits of using Windows Server 2008 R2 for virtualisation? Learn more in this presentation transcript. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Presentation Transcript: Reducing Cost in the Data Center through Windows Server 2008 R2 - All About Virtualization by Dell, Inc. and Intel®

May 2010 - (Free Research)
Everyone is talking about virtualization as a critical component to the success of a data center. What are some of the benefits of virtualization? What are the cost benefits of using Windows Server 2008 R2 for virtualization? Learn more in this presentation transcript. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Presentation Transcript: Using Virtualization with Windows Server 2008 R2 to Reduce Costs in the Data Center by Dell, Inc. and Intel®

May 2010 - (Free Research)
Everyone is talking about virtualization as a critical component to the success of a data center. What are some of the benefits of virtualization? What are the cost benefits of using Windows Server 2008 R2 for virtualization? Learn more in this presentation transcript. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Enable a Flexible, Efficient IT Infrastructure: Virtualization with Logical Domains and Sun Coolthreads™ Servers by Insight and Sun Microsystems, Inc

April 2007 - (Free Research)
Read this white paper to learn about a virtualization strategy that can help you achieve a lower total cost of ownership and a higher return on investment for compute assets. You'll also receive tips to avoid server sprawl and control energy use. 
(WHITE PAPER) READ ABSTRACT |

PCI Compliance Made Simple by Alert Logic

March 2007 - (Free Research)
This white paper helps to simplify and provide a deeper understanding of the PCI DSS v1.1, discusses best practices to achieve PCI compliance, and identifies which of these requirements can be satisfied by Alert Logic. 
(WHITE PAPER) READ ABSTRACT |

Enhancing Server and Cloud Security with Intel® Trusted Execution Technology (Intel® TXT) by Dell, Inc. and Intel®

December 2010 - (Free Research)
This brief animation highlights the technologies, benefits, and uses of Intel® Trusted Execution Technology (Intel® TXT) in server and cloud environments. 
(VIDEO) READ ABSTRACT |

E-Guide: Expert guide to server virtualization by CA Technologies.

July 2010 - (Free Research)
This expert e-guide on virtual security reveals four key points you must keep in mind to ease security integration as your virtualization project comes together. In addition, Gartner explains the six most common server virtualization security risks, along with advice on how to address each issue. 
(EGUIDE) READ ABSTRACT |

Meeting the challenges of virtualisation security by Trend Micro

August 2009 - (Free Research)
Your organisation needs to consider which security mechanisms can best protect both physical and virtual servers, particularly as a virtualised architecture fundamentally affects how mission-critical applications are designed, deployed and managed. Download this white paper to find out more about real solutions to these challenges. 
(WHITE PAPER) READ ABSTRACT |

When Good Applications Go Bad: Adding Application Control to your Toolbox by Fortinet, Inc. / Alternative Technology Group of Arrow ECS

October 2009 - (Free Research)
Check out this podcast transcript for the latest information about application security threats and how Fortinet can provide multi-function security system solutions as well as an award-wining Partner Program. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

IBM Eye: Security Detective for Hire by PowerTech

September 2009 - (Free Research)
This article will give step-by-step overview of how to deal with some of the most pervasive security threats currently facing IBM Power Systems. It'll help organizations that are struggling to get started with security and act as a 'wake-up call' for those who think that “powering the server on” is all the security they need. 
(TECHNICAL ARTICLE) READ ABSTRACT |

E-Guide: Server Virtualization - Expert Overview of Costs, Trends, and More by Dell, Inc. and Intel®

March 2010 - (Free Research)
This expert E-Guide, brought to you by SearchServerVirtualization.com and Dell, provides an overview of the expenses associated with virtualization and highlights the virtual server trends expected for 2010. Gain insight into the tangible virtualization costs, and learn how to keep pace with the changing server virtualization market. 
(EGUIDE) READ ABSTRACT |

5 Steps to Reducing Downtime: Best Practices for Windows Server Application High Availability by Marathon Technologies

September 2009 - (Free Research)
This white paper discusses five steps for protecting Windows Server applications from downtime, offering established best practices to reduce potential single points of failure and ensure rapid recovery or continued operations in the event of failure. 
(WHITE PAPER) READ ABSTRACT |

PlateSpin Forge®: Plug In and Protect Server Workload by Novell, Inc.

October 2009 - (Free Research)
In the event of downtime, workloads can be rapidly powered on in the PlateSpin Forge recovery environment and continue to run as normal until the production environment is restored. PlateSpin Forge® ships with everything you need to begin protecting your servers straight out-of-the-box. 
(WHITE PAPER) READ ABSTRACT |

Security Practices for Vmware by Vyatta Inc.

June 2012 - (Free Research)
This expert resource explores best practices and common mistakes to avoid when securing your VMware environment. Learn how to leverage the proper settings, permissions and third-party tools to secure your systems. 
(WEBCAST) READ ABSTRACT |

Rethinking Perimeter Security: New Threats Require Real-Time Protection by Radware

March 2011 - (Free Research)
Over the last few years, networked resources have become increasingly available to a wide audience of customers, partners, suppliers, and the general public. As a result, more and more people have become reliant upon instantaneous access to information and services in order to do business. 
(WHITE PAPER) READ ABSTRACT |

TechTarget ANZ Securing Virtualised Data Centres E-Book by Trend Micro

August 2010 - (Free Research)
Virtualisation is powerful, but also creates challenges for the security processes and products organisations defined before they started to virtualise. This e-book explains these new security challenges posed by virtualisation and how security professionals and IT managers can address them. 
(EBOOK) READ ABSTRACT |

Alternatives for Securing Virtual Environments: A Different Network Requires a Different Approach -- Extending Security to the Virtual World by Juniper Networks, Inc.

March 2012 - (Free Research)
<p>Virtual networks create a number of new security issues that physical defense strategies do not properly address. This white paper discusses the limitations of physical firewalls and highlights a security architecture designed with virtualization in mind.</p> 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Virtualization 101 - Part 5 Disaster Recovery by Dell and VMware

December 2009 - (Free Research)
In this presentation transcript, learn how to implement a cost-effective, efficient disaster recovery (DR) plan with virtualization. Discover 4 different DR methods that work with virtualization to help prevent future disasters. Learn how to plan for DR by defining requirements and assigning application inventory to service levels. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Ensuring Hyper-V security: What virtualization means for network protection by Dell and Microsoft

March 2012 - (Free Research)
This presentation transcript examines the topic of virtualization security, with a specific focus on using Hyper-V. Obtain detailed information on hardening the host, managing virtual machines, and implementing various endpoint protection strategies throughout your infrastructure. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Hackers Open Malware Backdoor in Apache Webservers by SearchSecurity.com

July 2013 - (Free Research)
A new threat is targeting Apache webservers, which are among the most widely used webservers in the world. Read this expert E-Guide to discover how to fight back against these hackers and secure your webserver. 
(EGUIDE) READ ABSTRACT |

Maximizing the Strategic Point of Control in the Application Delivery Network by F5 Networks

February 2012 - (Free Research)
Improve performance, implement security procedures, and institute server redundancy that is invisible to the user by leveraging the strategic point of control that exists between the servers in the data center and the Internet. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 487 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts