Companies Building SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Companies Building Security returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Data Center Management
 •   Virtualization
 •   Application Management and Maintenance
 •   Application Lifecycle Management(ALM)
 •   Endpoint Security
 •   Customer Data Integration
 •   Business Intelligence Solutions
 •   Application Integration
 •   Storage Management

Related Searches
 •   Companies Building Document
 •   Companies Building Integration
 •   Companies Building Manufacturer
 •   Companies Building Security Help
 •   Companies Building Security Manuals
 •   Companies Building Security Video
 •   Faqs Companies Building Security
 •   Implementing Companies Building Security
 •   Managers Companies Building Security
 •   Schemas Companies Building
Advertisement

ALL RESULTS
1 - 25 of 474 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Agile Business eBook Excerpt - Build the Right Thing by Rally Software

November 14, 2013 - (Free Research)
Great companies build products that customers love. While this means they build valuable and useful features, it also means they don't build things that aren't valuable. Access this guide to understand how a unifying vision and customer-centric mindset avoids the wasted time, money, and demoralized morale that come with building the wrong thing. 
(WHITE PAPER) READ ABSTRACT |

Making Sense of Big Data in the Petabyte Age by ComputerWeekly.com

July 10, 2012 - (Free Research)
This report from Cognizant offers advice on the roadmap organisations should follow to survive the Petabyte Age. 
(EBRIEF) READ ABSTRACT |

Intel Cloud Builders Guide:  Cloud Design and Development on Intel Platforms by Intel

August 22, 2011 - (Free Research)
This white paper provides detailed guidance to help companies build successful cloud data centres. Obtain information on the two most common block level storage protocols, simplifying your network, and more. 
(WHITE PAPER) READ ABSTRACT |

Collaborative software delivery: improving software quality with better lifecycle management by IBM

November 28, 2011 - (Free Research)
Read this white paper and learn how an IBM Rational solution can help your company build better software faster, using an integrated application lifecycle management (ALM) solution designed to support collaboration across distributed agile development teams. 
(WHITE PAPER) READ ABSTRACT |

Collaborative Software Delivery: Managing Today's Complex Environment to Improve Software Quality by IBM

November 02, 2009 - (Free Research)
Read this white paper for a discussion on how IBM Rational can help your company build software of improved quality more efficiently using an integrated application lifecycle management solution. 
(WHITE PAPER) READ ABSTRACT |

Evaluating Cloud Platforms and Tools by SearchServerVirtualization

May 20, 2014 - (Free Research)
Building a sustainable framework for the cloud is paramount to successful data consolidation. Picking the right platform is also imperative, so this chapter examines the options. 
(EBOOK) READ ABSTRACT |

From Virtualization to Cloud Computing, Chapter 1 by SearchServerVirtualization

July 26, 2013 - (Free Research)
Many virtualized data centers are ready to take advantage of the cloud model, but first it's important to understand the next steps and find the right platforms and tools to help with the transition. 
(EBOOK) READ ABSTRACT |

Multiple Country Implementation — Influencing Factors and Approaches by ComputerWeekly.com

August 31, 2012 - (Free Research)
This report from Cognizant explains the key factors which influence a multi-country solution development and implementation, along with the industry best practices and their key features. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Bringing Personalized Financial Services to Farmers by Cisco Systems, Inc.

June 2008 - (Free Research)
In this case study read how MidAtlantic Farm Credit, a financing company for agribusiness and rural homeowners, utilized Cisco Unified CallConnector for Microsoft Dynamics CRM to provide a 360-degree view of customer information to every employee. 
(VIDEOCAST)

Mature and Proven Cloud Orchestration by Citrix

September 2013 - (Free Research)
This short webcast discusses what companies should look for when selecting a platform for their cloud. 
(WEBCAST) READ ABSTRACT |

CIO Decisions E-zine: May 2014 by SearchCIO.com

May 2014 - (Free Research)
Innovations of the new mobility age, including the connected car, mean that CIOs need to reframe their mobile strategy with a customer-focused slant. 
(EZINE) READ ABSTRACT |

Emprise 9000: Scale-Out Enterprise Controller by Xiotech Corporation

January 2011 - (Free Research)
Emprise 9000 is a scale-out, enterprise storage controller that gives customers flexibility to acquire, implement and change storage resources anywhere, anytime within a single management platform. It’s the world’s first high performance, frameless, storage controller for the data center. 
(WHITE PAPER) READ ABSTRACT |

Cyber Defense Managed Service - A Force Multiplier Webinar by Verdasys (E-mail this company)

June 2013 - (Free Research)
Join security expert and CISO of In-Q-Tel Dan Geer and Verdasys in this upcoming webcast as they discuss a new deployment model and next-gen technology that can provide rapid deployment, immediate detection and comprehensive prevention operations for companies of any size. 
(VIRTUAL SEMINAR) READ ABSTRACT |

Building a Tangible ROI for Data Quality by Harte-Hanks Trillium Software

March 2012 - (Free Research)
This white paper covers common issues and recommendations on building a business case for data quality initiatives. 
(WHITE PAPER) READ ABSTRACT |

E-Book: Data Protection Plans for Complying with Privacy Laws by SearchSecurity.com & SearchCompliance.com

October 2010 - (Free Research)
This e-book, brought to you by SearchCompliance.com and SearchSecurity.com, discusses how to build a successful data protection strategy, as well as database security auditing tools, how to secure your mainframe, laptop encryption and more! 
(EBOOK) READ ABSTRACT |

Build a Solid Foundation for Secure Virtualization by RSA, The Security Division of EMC

December 2010 - (Free Research)
Many companies are now virtualizing their data centers. Some have virtualized between thirty and fifty percent of their systems. As this virtualization process reaches critical business applications, it’s important to pause for a moment and consider security. How will virtualization impact security? 
(VIDEO) READ ABSTRACT |

How to Win Customers and Build Trust Online: What smart companies are doing to build trust and use it to create competitive advantage online by VeriSign EMEA

February 2011 - (Free Research)
If you can make your site more trustworthy, you can turn customer concerns to your advantage. Learn how trust can be a competitive advantage, and how to go about establishing trust among customers in this white paper. 
(WHITE PAPER) READ ABSTRACT |

Build a Solid Foundation for Secure Virtualization by IBM

December 2010 - (Free Research)
Many companies are now virtualizing their data centers. Some have virtualized between thirty and fifty percent of their systems. As this virtualization process reaches critical business applications, it’s important to pause for a moment and consider security. How will virtualization impact security? 
(VIDEO) READ ABSTRACT |

FAQ: Building a DR site vs. outsourcing disaster recovery by SearchStorage.com

April 2013 - (Free Research)
Access this E-Guide to learn more about the thought that should go into making this decision. Read on to discover more about the importance of a good DR plan and learn: pros and cons of custom-built DR sites vs. outsourced DR, differences between hot sites, cold sites and warm sites, considerationswhen developing your own site and more. 
(EGUIDE) READ ABSTRACT |

Building a Hybrid Storage Cloud by SearchStorage.com

February 2013 - (Free Research)
Access this exclusive Essential Guide from SearchCloudStorage.com to explore hype-free, expert insight into building a hybrid storage cloud. Inside, find articles on hybrid cloud storage products, the pros and cons of hybrid clouds, and learn about the true weak spots of the hybrid cloud model. 
(ESSENTIAL GUIDE) READ ABSTRACT |

E-Guide: How to build a toolset to avoid Web 2.0 security issues by SearchSecurity.com

September 2010 - (Free Research)
Collaborative, interactive nature of Web 2.0 technology has great appeal for business, and companies of all sizes and verticals are taking full advantage of social networking sites, free online services and other platforms. Learn how to implement security tools that monitor, prevent, alert, encrypt and quarantine data from leaving your network. 
(EGUIDE) READ ABSTRACT |

Computer Weekly - 3 April 2012: Data security best practice by ComputerWeekly.com

April 2012 - (Free Research)
This week’s Computer Weekly kicks off our Buyer's Guide to data security by looking at the changing role of the IT security chief. We also examine why flexible working is proving so slow to roll out and we talk to the UK's air traffic control operator about its ambitious desktop virtualisation project. 
(EZINE)

Computer Weekly 8 November 2011: Read this week's issue of the UK's leading technology publication, with the news, analysis and opinion that matters to IT managers. by ComputerWeekly.com

November 2011 - (Free Research)
In this week's Computer Weekly, we report from the London Cyberspace Conference where world leaders gathered to discuss internet security. We examine the tools available to help migrate from Windows XP to Windows 7; and hear from Royal Bank of Scotland about how to build a business case for virtual desktops. Download the new issue now. 
(EZINE)

Addressing Compliance Initiatives with Center for Internet Security Benchmarks by Tripwire, Inc.

January 2009 - (Free Research)
This whitepaper details the background you need to build an effective compliance program by understanding benchmarks, the basic building blocks of compliance initiatives. You'll learn about the benchmarks specified by the Center for Internet Security (CIS), which are often used as a starting point for creating a compliance initiative. 
(WHITE PAPER) READ ABSTRACT |

Security - Pix 500 Series Firewalls by Cisco Systems

The world-leading Cisco PIX Security Appliance Series provides robust, enterprise-class, integrated network security services including stateful inspection firewalling, protocol and application inspection, virtual private networking, in-line intrusion protection, and rich multimedia and voice security-in cost-effective, easy-to-deploy solutions. 
(HARDWARE PRODUCT)

1 - 25 of 474 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts