Company Security VersionWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Company Security Version returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Network Management
 •   Network Security
 •   Application Management and Maintenance
 •   Enterprise Data Protection and Privacy
 •   Backup Systems and Services
 •   Networks
 •   Business Intelligence Solutions
 •   Storage Management
 •   Wireless Technologies and Mobile Computing

Related Searches
 •   Articles About Company Security Version
 •   Budget Company Security Version
 •   Company Audit
 •   Company Multi
 •   Company Security Code
 •   Equipment Company
 •   Layout Company
 •   Prices Company Security
 •   Research About Company Security
 •   Terminal Company Security
Advertisement

ALL RESULTS
1 - 25 of 478 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Business Continuity Management by Matrix42

September 2008 - (Free Research)
This White paper explains the concept of Business Continuity and demonstrates how matrix42 Empirum supports the Business Continuity Strategy in the enterprise. 
(WHITE PAPER) READ ABSTRACT |

Best Practices to Protect the Cardholder Data Environment and Achieve PCI Compliance by Rapid7

July 2012 - (Free Research)
Cyber-attacks that target customer and financial information are becoming more popular and businesses need to protect their data. Prevent attackers from taking advantage of the gaps in your security plan by creating a comprehensive information security policy. 
(WHITE PAPER) READ ABSTRACT |

Managed Office Protection: Switching from AV to SaaS by Panda Security

March 2008 - (Free Research)
Antivirus products require too much time and effort for small and mid-sized companies. Security as a Service (SaaS) means delivering traditional security applications as an Internet-based service to customers. Now you can focus on your core business, switch from Antivirus to Security as a Service and start enjoying the benefits of SaaS. 
(WHITE PAPER) READ ABSTRACT |

Microsoft Roadmap: Chapter 2: Office 365 – Messaging and collaboration by Dell and Microsoft

October 2012 - (Free Research)
Read this IT guidebook to better understand and evaluate your Microsoft Exchange migration options. 
(WHITE PAPER) READ ABSTRACT |

E-Book: Compliance in the EU, U.S.A.-- Learn What U.S. Companies Need to Know About European Union Compliance and Vice Versa by SearchCompliance.com

February 2010 - (Free Research)
Read this e-book to learn about compliance differences in the U.S.A. and the EU, and differences between global business continuity standards. 
(EBOOK) READ ABSTRACT |

Understanding and Selecting a Data Loss Prevention Solution by Websense, Inc.

January 2011 - (Free Research)
Data Loss Prevention has matured considerably since the release of the first version of this report three years ago. Back then, the market was dominated by startups with only a couple major acquisitions by established security companies.The entire market was probably smaller than the leading one or two providers today. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 1 April 2014: Where next for the NHS Care.data programme? by ComputerWeekly.com

April 2014 - (Free Research)
In this week's Computer Weekly, healthcare IT experts talk about the next steps for the controversial NHS Care.data plan to create a database of medical records. Is Moore's Law running out? We hear about the future of processor technology. And our latest buyer's guide looks at how data analytics can improve IT security. Read the issue now. 
(EZINE) READ ABSTRACT |

A Closer Look at Windows Vista by National Instruments

February 2008 - (Free Research)
One of the stated goals of the Microsoft Windows Vista release is to greatly improve the overall security of the Windows operating system and curb the impact of malware. To this end, Microsoft redesigned both the least user and administrative... 
(WHITE PAPER) READ ABSTRACT |

Proofpoint Messaging Security Gateway Virtual Edition by Proofpoint, Inc.

November 2006 - (Free Research)
VMware virtualization products require alternative messaging security solutions than those that support physical server software. This free trial download provides best-in-class messaging security designed specifically to support VMware products. 
(TRIAL SOFTWARE) READ ABSTRACT |

NetWrix Active Directory Change Reporter - Free! by Netwrix Corporation

July 2010 - (Free Research)
Active Directory change auditing is an important procedure for tracking unauthorized changes and errors to AD configurations. NetWrix AD Change Reporter automates the auditing process to promote both security and compliance. 
(DOWNLOAD) READ ABSTRACT |

Case Study: San Diego Gastroenterology Medical Associates by ESET

August 2010 - (Free Research)
Read this case to learn about one company's battle with virus protection and what they did to overcome it. 
(CASE STUDY) READ ABSTRACT |

CCNA v2.0 Review: Critical Concepts of the 640-802 CCNA Exam by Global Knowledge

October 2008 - (Free Research)
This paper helps students understand the types of information required to pass the new 640-802 CCNA composite exam by providing a convenient review of the exam's critical concepts. 
(WHITE PAPER) READ ABSTRACT |

Migrating Oracle Application Setups – The Stat Way by Dell Software

May 2012 - (Free Research)
Changes to your Oracle E-Business Suite applications directly affect your company. Therefore, having an effective change management and version control process is critical. In this paper, see how an impossible task – versioning and managing Oracle setup object with third-party tools – is now a reality. 
(WHITE PAPER) READ ABSTRACT |

Agile tools: True support for ALM by IBM

June 2012 - (Free Research)
This expert e-guide offers tips and tricks for putting yourself in the agile frame of mind when using ALM tools. Read this now and learn about the qualities and attributes that make development, testing, QA, requirements management, version control, security and other ALM process tools agile. 
(EGUIDE) READ ABSTRACT |

Security - Pix 500 Series Firewalls by Cisco Systems

The world-leading Cisco PIX Security Appliance Series provides robust, enterprise-class, integrated network security services including stateful inspection firewalling, protocol and application inspection, virtual private networking, in-line intrusion protection, and rich multimedia and voice security-in cost-effective, easy-to-deploy solutions. 
(HARDWARE PRODUCT)

Acronis vmProtect 6 by Acronis

December 2011 - (Free Research)
Built specifically for VMware vSphere™, Acronis® vmProtect™ 6 provides all the features you need in an extremely easy-to-use solution that can be deployed in minutes so you can start to perform your backup and recovery tasks. 
(TRIAL SOFTWARE) READ ABSTRACT |

Self-Management of Passwords (SMOP) Version 1.1 by turbo-IT Corporation

May 2011 - (Free Research)
Active Directory users often have their accounts locked out or forget their passwords.  This download empowers users to perform self service password resets and unlock their accounts eliminating helpdesk calls resulting in increased productivity and reduced costs. 
(DEMO) READ ABSTRACT |

Wireless - Aironet 350 Series by Cisco Systems

The Cisco Aironet 350 Series of wireless LAN (WLAN) products leads the industry in performance, security, and reliability with cost effective solutions for the enterprise and small and medium-sized businesses. The Cisco Aironet 350 Series access point provides an ideal solution for customers who desire a non-upgradable IEEE 802.11b solution. 
(HARDWARE PRODUCT)

SANS Report: Security Web Applications Made Simple and Scalable by Hewlett-Packard Company

September 2013 - (Free Research)
This SANS report features an automated application security testing solution that identifies known vulnerabilities across multiple sources to keep your networks fully protected. 
(ANALYST REPORT) READ ABSTRACT |

Essential Guide to PCI DSS by Information Security Magazine

September 2009 - (Free Research)
This E-Guide will explain the new changes in Version 1.2 and how the standard will tackle emerging technologies such as cloud computing and virtualization. Specific topics include avoiding audit trouble, wireless encryption, tokenization, and more. 
(EGUIDE) READ ABSTRACT |

Platform-as-a-Service Private Cloud with Oracle Fusion Middleware (Spanish version) by Oracle Corporation

October 2009 - (Free Research)
Download this free white paper to learn how platform-as-a-service private cloud offers enterprises one of the best ways to take advantage of cloud computing. 
(WHITE PAPER) READ ABSTRACT |

Purdue Pharma L.P. Deploys DocAve® to Protect and Manage its SharePoint Infrastructure by AvePoint, Inc.

February 2010 - (Free Research)
Purdue Pharma L.P. have an expansive, diverse, and geographically distributed network of employees, partners, and associated firms who must collaborate extensively. See how they turned to DocAve to dramatically reduce time and resources required for granular restores and improve end-user confidence and accelerated Sharepoint adoption. 
(CASE STUDY) READ ABSTRACT |

Computer Weekly - 6 March 2012: Windows 8 - tablet meets desktop by ComputerWeekly.com

March 2012 - (Free Research)
This week’s Computer Weekly delves into the new world of Windows 8. We also talk to some top CIOs about how the downturn has shaped their priorities. You'll also find the third and final part of our Buyer's Guide to IPv6 migration, all inside this digital magazine. 
(EZINE)

CORE IMPACT Pro V10 by Core Security Technologies

December 2009 - (Free Research)
Please join Core Security for a live demonstration of CORE IMPACT Pro, the most comprehensive product for performing security assurance testing on an organization’s network systems, endpoint systems, end users and web applications. 
(PRODUCT DEMO) READ ABSTRACT |

F5 Data Manager Trial Version by F5 Networks

September 2009 - (Free Research)
F5 Data Manager helps you understand your file storage environment. This trial version will perform an inventory of your environment and enable you to run detailed reports that analyze which file types are being created, who is creating them, how quickly they age, and which resources they consume. 
(TRIAL SOFTWARE) READ ABSTRACT |

1 - 25 of 478 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts