Classified ElectronicWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Classified Electronic returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Enterprise Data Protection and Privacy
 •   Storage Management
 •   Virtualization
 •   Business Intelligence Solutions
 •   Storage Area Network (SAN)/ Network Attached Storage (NAS)
 •   Disk-based Backup & Storage/ RAID
 •   Enterprise Information Integration/ Metadata Management
 •   Application Management and Maintenance
 •   Business Process Management (BPM)

Related Searches
 •   Classified Electronic Configurations
 •   Classified Electronic Customers
 •   Classified Notes
 •   Classified Process
 •   Contacts Classified
 •   Demonstration Classified
 •   Financial Classified Electronic
 •   Improve Classified Electronic
 •   Payment Classified
 •   Supplier Classified Electronic
Advertisement

ALL RESULTS
1 - 25 of 478 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Using Windows File Classification Infrastructure to Classify and Protect Documents by TITUS

November 11, 2010 - (Free Research)
This white paper describes how organizations can leverage the File Classification Infrastructure and partner solutions to identify the business value of data, raise security awareness, and protect information assets. 
(WHITE PAPER) READ ABSTRACT |

Unifying Management of Physical and Electronic Records: The Records Management Imperative by EMC Corporation

March 2008 - (Free Research)
This white paper explains the features and benefits of such a unified approach to enterprise records management, and describes how the EMC Documentum/OmniRIM solution works. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Controlling Electronic Information: Managing the Flood by RSD

September 2009 - (Free Research)
Many companies use electronic documents to conduct business, but there is only so much storage to hold all of this data. This expert Presentation Transcript discusses how to archive messages without having to manually delete items on a monthly basis. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Getting a Handle on eDiscovery by StoredIQ

March 2009 - (Free Research)
eDiscovery is the process of using technology to identify, collect, preserve, process, review, and produce all the electronically stored information that is relevant to a particular legal matter. Read this white paper for a crash course in how effective information management can save your company time and money. 
(WHITE PAPER) READ ABSTRACT |

Information Classification: Delivering Security and Business Value by Boldon James

October 2011 - (Free Research)
This whitepaper outlines the benefits of Information Classification for information management & security, infrastructure integration and regulatory compliance, as well as provides benchmarks for implementation and classification software. 
(WHITE PAPER) READ ABSTRACT |

The Executive Guide to Data Loss Prevention by Websense, Inc.

August 2009 - (Free Research)
Data Loss Prevention is designed to protect information assets with minimal interference in business processes. It provides new insights into how information is used, and enforces protective controls to prevent unwanted incidents. Read on to learn how DLP can reduce risk, improve data management practices, and even lower certain compliance costs. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Tips for Classifying Virtual Desktop Costs and How to Avoid User Mistakes by Dell, Inc. and Intel®

October 2010 - (Free Research)
This expert e-guide from SearchVirtualDesktop.com explains how to categorize virtual desktop migration and installation costs to justify your investment to management. Learn why enabling desktop personalization for users may have its limitations. 
(EGUIDE) READ ABSTRACT |

Simplifying the Collection of Laptop and Desktop Data for eDiscovery by Iron Mountain

September 2010 - (Free Research)
Enterprises today are confronting a dramatic increase in litigation, regulations, and compliance scrutiny. Read this data sheet to discover solutions to these growing issues. 
(DATA SHEET) READ ABSTRACT |

Application List: Applications that Blue Coat PacketShaper Classifies and Controls by BlueCoat

April 2009 - (Free Research)
Check out this data sheet for a categorized listing of 600 common applications for which Blue Coat PacketShaper delivers an accurate picture of network traffic. 
(DATA SHEET) READ ABSTRACT |

2010 Threat Report by Websense, Inc.

January 2011 - (Free Research)
Websense® Security Labs™ uses the Websense ThreatSeeker® Network to discover,classify, and monitor global Internet threats and trends. Featuring the world’s first Internet HoneyGrid™, the system uses hundreds of technologies to parse through more than 1 billion pieces of content daily,searching for security threats. 
(WHITE PAPER) READ ABSTRACT |

Problematic - Unloved - Argumentative (PUA): What is a potentially unwanted app by ESET

November 2011 - (Free Research)
In this paper, discover what is a Potentially Unwanted Application (PUA) and explore the differences between threats posed by malicious types of software such as computer viruses and worms, and those which are classified as being potentially unwanted. 
(WHITE PAPER) READ ABSTRACT |

Airspace Risk Assessment by AirTight Networks, Inc.

August 2008 - (Free Research)
This report is the first step towards wireless vulnerability assessment of your network and managing its wireless security posture. 
(WHITE PAPER) READ ABSTRACT |

State of Internet Security, Q3 - Q4 2009 by Websense, Inc.

February 2010 - (Free Research)
Do you know just how adept Web adversaries have become in using the Internet to spread malware in their attacks? Understand where the true threats lie with this report which summarizes the significant findings of Websense researchers using the ThreatSeeker™ Network during the six-month period ending December 2009. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Enhanced Classification and Policy Enforcement with Windows Server 2008 R2 and Titus Labs by Microsoft

March 2010 - (Free Research)
With the sheer volume of data on servers, it has become very difficult for IT administrators to manage the information and mitigate the risks of data leakage. File classification is a critical first step in addressing these challenges. This session covers how to leverage Windows servers to deliver enhanced classification and policy enforcement. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Data Protection: Evaluating Business Requirements and Classifying Your Data by Dell Software

March 2011 - (Free Research)
Protecting your company's data and applications means much more than running a backup routine. It should mean protecting your business assets throughout their lifecycle — preservation, recoverability and availability. A complete data-protection approach can help your company adapt to rapidly changing opportunities. Read the White Paper. 
(WHITE PAPER) READ ABSTRACT |

Data Protection: Evaluating Business Requirements & Classifying Your Data by BakBone

January 2011 - (Free Research)
This paper discusses an approach to evaluating data at a business level, and implementing a data protection strategy that safeguards your organization based on the value of its data. 
(WHITE PAPER) READ ABSTRACT |

Kazeon Data Privacy & Security Solution by Kazeon

November 2006 - (Free Research)
This white paper examines an Information Classification Management (ICM) solution that helps classify and secure your company's sensitive information and overcome the challenges of securing data while complying with federal guidelines. 
(WHITE PAPER)

Capture Enabled Business Process Management by Kofax, Inc.

March 2012 - (Free Research)
Read this brochure to learn about capture enabled business process management (BPM) strategies that can automatically capture, extract, validate, and classify information regardless of paper, fax, e-mail, SMS, XML, or PDF formats. 
(BROCHURE) READ ABSTRACT |

Guidance for Calculation of Efficiency (PUE) in Real Data Centers by APC by Schneider Electric

January 2010 - (Free Research)
Unfortunately, commonly published efficiency data is not computed using a standard methodology making it difficult to properly benchmark infrastructure efficiency in data centers. This paper explains the problem and describes a standardized method for classifying data center loads for efficiency calculations. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Best Practices for Using SSD Technologies by Dell, Inc.

December 2013 - (Free Research)
This e-guide examines the types of workloads SSD is best suited for and classifies these systems into two basic categories: enterprise and client. Discover the key features of disk drive, PCIe, and SSD-specific form factors and learn about the five biggest implementation mistakes and what you can do to avoid them. 
(EGUIDE) READ ABSTRACT |

E-Guide: Best Practices for Using SSD Technologies by Dell, Inc.

October 2013 - (Free Research)
This e-guide examines the types of workloads SSD is best suited for and classifies these systems into two basic categories: enterprise and client. Discover the key features of disk drive, PCIe, and SSD-specific form factors and learn about the five biggest implementation mistakes and what you can do to avoid them. 
(EGUIDE) READ ABSTRACT |

Enterprise Information Protection - The Impact of Big Data by IBM

March 2013 - (Free Research)
In this comprehensive resource, explore the requirements for information security and privacy in the age of big data. You'll discover how a holistic approach to enterprise information, along with the right big data technologies, enables you to keep data classified, secure, and organized. 
(WHITE PAPER) READ ABSTRACT |

IBM ISS Global Data Center content analysis technology for the Web and e-mail by IBM

November 2008 - (Free Research)
The IBM content analysis process, part of the IBM ISS Global Data Center, is built on a platform that classifies millions of web pages and e-mails every day. Access this white paper for a detailed look at how this technology will effectively protect users from unwanted content. 
(WHITE PAPER) READ ABSTRACT |

Defending Against Insider Threats in the “Snowden Era” by CA Technologies.

December 2013 - (Free Research)
Security breaches are a significant threat for organizations in the age of big data: broken privacy laws, reputational damage, and loss of classified information are very real possibilities. What's worse is one of the most commonplace and damaging causes of security breaches can come from the inside of your business. 
(WHITE PAPER) READ ABSTRACT |

eBook: Simplifying Branch Office Management by SearchEnterpriseWAN E-Books

March 2010 - (Free Research)
Branch IT managers face a very dynamic environment. The number of branches is rising, telecommuting is increasing, and the demand for applications is expanding. You need to take a proactive approach, classify branches, and establish SLAs that tie to each class and can then be met through the deployment of various technologies. 
(EBOOK) READ ABSTRACT |

1 - 25 of 478 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts