Comparing SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Comparing Security returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Storage Management
 •   Security Monitoring
 •   Network Security
 •   Virtualization
 •   Storage Security
 •   Application Security
 •   Enterprise Data Protection and Privacy
 •   Security Policies
 •   Endpoint Security

Related Searches
 •   Comparing Creation
 •   Comparing Risk
 •   Comparing Security Help
 •   Comparing Security Tool
 •   Definition Of Comparing Security
 •   Documentation Comparing Security
 •   Experts Comparing Security
 •   Measures Comparing Security
 •   Prices Comparing Security
 •   Request Comparing Security
Advertisement

ALL RESULTS
1 - 25 of 456 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

802.11n: The End of Ethernet? by Aruba Networks

September 14, 2009 - (Free Research)
This report compares 802.11n to Gigabit Ethernet for use in local area network (LAN) access applications. More specifically, the report compares both technologies in six dimensions: mobility, performance, security, management, staffing, and cost. 
(ANALYST REPORT) READ ABSTRACT |

Buyer's Guide to Log Management: Comparing On-Premise and On-Demand Solutions by Alert Logic

March 2007 - (Free Research)
This white paper examines and compares two solutions to log management - traditional on-premise log management managed in-house by the infrastructure team and a Software-as-a-Service (SaaS). 
(WHITE PAPER) READ ABSTRACT |

OLTP performance test comparing Dell PowerVault MD3000i iSCSI SAN Array and HP StorageWorks 2000i Modular Smart Array by Dell, Inc.

November 2008 - (Free Research)
Dell, Inc. commissioned Principle Technologies to compare performance for online transaction processing (OLTP) of two entry-level storage arean network (SAN) solutions - the Dell PowerVault MD3000i iSCSI SAN Array and HP StorageWorks 2000i Modular Smart. Read this paper for a detailed comparative analysis. 
(WHITE PAPER) READ ABSTRACT |

Comparing HP-UX 11i v3 and Linux for Hosting Critical Workloads by HP & Intel®

February 2011 - (Free Research)
This white paper presents a technical comparison of HP-UX 11i v3, Red Hat Enterprise Linux 5 (RHEL 5), and SUSE Linux Enterprise Server 11 (SLES 11) operating systems, focusing on their functional capabilities in terms of scalability, virtualization, reliability, and security. 
(WHITE PAPER) READ ABSTRACT |

ROI analysis: JBoss Enterprise BRMS Compared to Drools, the JBoss Community Project by Red Hat

December 2012 - (Free Research)
Drools, a business rules management system (BRMS) created by members of the JBoss developer community, offers the innovation you need for early stage projects or proof-of-concepts. But when it comes to mission-critical applications, don't you want the assurance of SLA-based support, patches, and updates? 
(WHITE PAPER) READ ABSTRACT |

Comparing Email Archiving Software with General Archiving Software by Symantec Corporation

November 2012 - (Free Research)
Compare email-specific archiving solutions to general archiving products in this expert E-Guide featuring Brien Posey, backup expert. Read on to learn how these techs differ, which is better for eDiscovery and check out the pros and cons of all-in-one packages vs. individual apps for each task. 
(EGUIDE) READ ABSTRACT |

Comparing the TCO of Physical PCs, VDI, and Cloud-hosted Desktops as a Service (Daas) by Desktone (VMware)

February 2011 - (Free Research)
This white paper compares the total cost of ownership (TCO) of physical PCs, virtual desktops, and cloud-hosted desktops as a service (DaaS). 
(WHITE PAPER) READ ABSTRACT |

Comparing health care data security compliance to other industries by Hewlett-Packard Company

April 2012 - (Free Research)
<p>This e-guide discusses the challenges health care companies run into meeting state and federal data security compliance regulations and how health care organizations compare to other industries such as financial services.</p> 
(EGUIDE) READ ABSTRACT |

Virtual Data Center E-Zine:Volume 32: Public vs. Private: Comparing Cloud Architectures by Thawte Inc.

February 2012 - (Free Research)
In this e-zine, compare the trade-offs of private and public cloud computing. Find out how you can measure, monitor and optimize the performance of applications in the cloud. Plus, learn how you can develop a solid plan for virtualizing your applications. 
(EZINE)

Next Generation Data Protection Solutions by EMC Backup and Recovery Solutions

January 2010 - (Free Research)
This paper compares traditional data protection options and provides an overview of the impact data deduplication is having on the storage industry. Deduplication is quickly gaining momentum in the growing disk-to-disk backup market and offers several significant improvements over traditional data protection methods. 
(WHITE PAPER) READ ABSTRACT |

IBM WebSphere® Application Server V8.5 vs. JBoss® Enterprise Application Platform V6 TCO Analysis by IBM

December 2012 - (Free Research)
In the application server market, open source technology has grown in popularity and is becoming an increasingly viable solution for many companies. With their latest release, Red Hat claims that JBoss (open-source) is now equivalent to the mainstream Java Enterprise Application Servers. How true is this? 
(WHITE PAPER) READ ABSTRACT |

Approaches to Distributed Denial of Service (DDoS) Protection: A Cost Analysis by VeriSign, Inc

June 2010 - (Free Research)
Do you know what a Distributed Denial of Service (DDoS) attack might cost your organization? This white paper defines DDoS, examines the elements that make up a DDoS protection solution, and compares three different approaches to DDoS protection. Read this paper to learn how to ramp up protection and reduce costs. 
(WHITE PAPER) READ ABSTRACT |

Operational Efficiencies of Proactive Vulnerability Management by McAfee, Inc.

August 2011 - (Free Research)
View this paper to explore the operational and economic efficiencies associated with the implementation of proactive, integrated, and automated vulnerability management compared to the inefficiencies of a reactive, manual, and fragmented security operation. 
(WHITE PAPER) READ ABSTRACT |

IDS vs. IPS by Sourcefire

April 2011 - (Free Research)
When it comes to intrusion detection systems (IDS) and intrusion prevention systems (IPS) it’s not always easy for organizations to determine what functions each can be used for. This expert tip compares the features and capabilities of IDS and IPS technologies and highlights popular use cases for each system. 
(EGUIDE) READ ABSTRACT |

The Business Case for Data Security by Imperva

March 2011 - (Free Research)
This paper examines the drivers for adopting a strategic approach to data security, compares and contrasts current approaches, and presents the Return on Security Investment (ROSI) of viable data security solutions. 
(WHITE PAPER) READ ABSTRACT |

The Business Case for Data Security by Imperva

November 2010 - (Free Research)
This paper examines the drivers for adopting a strategic approach to data security, compares and contrasts current approaches, and presents the Return on Security Investment (ROSI) of viable data security solutions. 
(WHITE PAPER) READ ABSTRACT |

Corporate Device Ownership and Top Security Concerns by BlackBerry

November 2013 - (Free Research)
This e-guide from the experts at SearchConsumerization.com compares the bring your own device (BYOD) and the corporate-owned, personally enabled (COPE) models of enterprise mobility. Also inside, uncover the perceptions and realities of BYOD security. 
(EGUIDE) READ ABSTRACT |

Web application security: automated scanning versus manual penetration testing by IBM

January 2008 - (Free Research)
There are two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis. The purpose of this paper is to compare these two methods. 
(WHITE PAPER) READ ABSTRACT |

Mobile Security: Rewards Outweigh Risks by GeoTrust, Inc.

July 2013 - (Free Research)
This expert guide examines the impact that enterprise mobility can have on your organization, comparing the pros and cons, and explains why the benefits outweigh the risks. 
(EGUIDE) READ ABSTRACT |

KVM: Hypervisor Security You Can Depend On by Red Hat & IBM

February 2012 - (Free Research)
Implementing secure virtual and cloud environments is a major concern for businesses. Discover how KVM hypervisors provide the security businesses need with features such mandatory access control and hardware-based isolation, and compare its performance against other general-purpose x86 hypervisors. 
(WHITE PAPER) READ ABSTRACT |

Security in Public and Private Cloud Infrastructures by Joyent

August 2010 - (Free Research)
This paper examines the current state of cloud computing security and details common security measures deployed in the industry. It will also detail the Joyent Smart Technology solutions for cloud computing use cases and how Joyent improves cloud security when compared to traditional techniques. 
(WHITE PAPER) READ ABSTRACT |

Tokenization Buyer's Guide by Intel

September 2011 - (Free Research)
PCI DSS expert Walter Conway demystifies tokenization by discussing use cases, comparing tokenization vs. encryption and providing various alternatives for implementing tokenization. Finally, Walter provides guidance on how to prepare for implementing tokenization and select a solution appropriate for your needs. 
(WHITE PAPER) READ ABSTRACT |

Unified Threat Management - Market Review: WatchGuard vs. Juniper, Cisco, Fortinet, and SonicWall by WatchGuard Technologies, Inc.

April 2010 - (Free Research)
Compare the major brands of security products by UTM throughput per MSRP dollar to see where you will get the best value for your money. Find out how you can have full UTM capabilities for comprehensive protection and still have blazing fast throughput to keep your network humming. 
(WHITE PAPER) READ ABSTRACT |

Unified Threat Management Market Review: WatchGuard vs. Juniper, Cisco, Fortinet, and SonicWall by WatchGuard Technologies, Inc.

April 2010 - (Free Research)
Compare the major brands of security products by UTM throughput per MSRP dollar to see where you will get the best value for your money. Find out how you can have full UTM capabilities for comprehensive protection and still have blazing fast throughput to keep your network humming. 
(WHITE PAPER) READ ABSTRACT |

Web Application Security — How to Minimize Prevalent Risk of Attacks by Qualys

January 2011 - (Free Research)
This guide surveys typical web application vulnerabilities, compares options for detection, and introduces the QualysGuard Web Application Scanning solution – a new on demand service from Qualys that automates detection of the most prevalent vulnerabilities in custom web applications. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 456 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts