Computerized Web-Based AnalysisWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Computerized Web-Based Analysis returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Application Security
 •   Security Monitoring
 •   Network Security
 •   Business Intelligence Solutions
 •   Anti-Virus Solutions
 •   Web-Based Training and eLearning
 •   Computer-Based Training
 •   Endpoint Security
 •   Application Management and Maintenance

Related Searches
 •   Architecture Computerized
 •   Computerized Technical
 •   Computerized Web-Based Activity
 •   Computerized Web-Based Monitor
 •   Computerized Web-Based Sales
 •   Computerized Web-Based Specialists
 •   Computing Computerized
 •   Directory Computerized
 •   Sales Computerized
 •   Secure Computerized
Advertisement

ALL RESULTS
1 - 25 of 451 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

WebFOCUS Business Intelligence Application Development & Deployment by Information Builders Inc. (E-mail this company)

WebFOCUS development and deployment solutions provide easy-to-use Web-based applications for unlimited numbers of users, tailored to their skill level and preferences regardless of location, as well as flexible and intuitive development tools for building applications. 
(SOFTWARE PRODUCT)

Increase Your Company IQ with Web-Based Reporting by Business Objects

August 2007 - (Free Research)
Intranets and portals are too complex for everyone in your company to adopt - not to mention the costs to build and maintain them. This webcast explains how to store your critical business information in one location, share confidential information with the right people, and empower business users with the ability to access the data they need. 
(WEBCAST) READ ABSTRACT |

Top 5 Considerations for Choosing a Next-Generation Firewall: SonicWALL vs. Palo Alto Networks and Fortinet by SonicWALL

March 2011 - (Free Research)
Thanks to Web 2.0 and an explosion of Web-based applications, nearly two-thirds of today's traffic is HTTP and HTTPS. Collaboration, increased productivity and improved insights into customers and prospects are all key benefits of Web 2.0.  But with these benefits come new security threats as well as dramatic increases in network bandwidth consumed 
(WHITE PAPER) READ ABSTRACT |

Reducing TCO for Web-Based Applications by Hewlett Packard Company and Intel

July 2009 - (Free Research)
Servers based on the Intel® Xeon® processor 5500 series deliver both intelligent performance and energy efficiency. Migrating to this platform can enable server consolidation in the deployment of database-driven Web applications, resulting in operational cost savings that far exceed the cost of server refresh. Read on to learn more. 
(WHITE PAPER)

eBook: Moving to the Cloud by Google Apps

January 2011 - (Free Research)
When it comes to cloud computing, some companies have concerns around security and a perceived loss of control. But others are grabbing the opportunity to move to a more collaborative, Web-based platform. In this E-Book, we take a look at several companies that have migrated to Google Apps. 
(EBOOK) READ ABSTRACT |

eBook: Moving to the Cloud by Google Apps

July 2010 - (Free Research)
Content provided by Google. When it comes to cloud computing, some companies have concerns around security and a perceived loss of control. But others are grabbing the opportunity to move to a more collaborative, Web-based platform. In this E-Book, we take a look at several companies that have migrated to Google Apps. 
(WHITE PAPER) READ ABSTRACT |

Protecting Customer Data: Moving Beyond Compliance by Voltage Security, Inc.

March 2012 - (Free Research)
The insurance industry has experienced unprecedented levels of change that has driven the need to secure customer and corporate data – beyond what is required for NAIC compliance. This resource offers key guidance for tackling the security challenges of this changing environment and how to ensure comprehensive data protection. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: How Google Tackles IT Security and What You Can Learn from It by Google Apps

January 2011 - (Free Research)
Today's computing environment demands IT attention to a wide range of security issues. Learn from security practitioners at Google who are on the frontlines of fighting spam, malware and phishing for Google Apps users, securing identity management in hosted web apps and monitoring the network, detecting intrusion and responding to incidents. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Cloud Computing - Latest Buzzword or a Glimpse of the Future? by Google Apps

July 2010 - (Free Research)
Google Apps has the same potential to revolutionize the productivity of IT operations for small to mid-size businesses. The cost savings are immediate, and the potential for innovative collaboration is boundless. Google Apps offers simple, powerful communication and collaboration tools for enterprises of any size. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: How Google Tackles IT Security and What You Can Learn from It by Google Apps

June 2010 - (Free Research)
Today's computing environment demands IT attention to a wide range of security issues. Learn from security practitioners at Google who are on the frontlines of fighting spam, malware and phishing for Google Apps users, securing identity management in hosted web apps and monitoring the network, detecting intrusion and responding to incidents. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

What’s New in VMware ThinApp 4.6 by VMware, Inc.

April 2011 - (Free Research)
It is important to remember that Web-based applications pose compatibility issues similar to native applications because of the underlying technology components used to create and run them. Learn how utilizing the right software allows you to ensure legacy application compatibility with each successive browser or operating system update. 
(WEBCAST) READ ABSTRACT |

Rational Quality Manager by IBM

November 2009 - (Free Research)
Download your free trial of IBM Rational Quality Manager V2, a collaborative, Web-based, quality management solution that offers comprehensive test planning and test asset management from requirements to defects. 
(DOWNLOAD) READ ABSTRACT |

Veracode eLearning Subscription by Veracode, Inc.

May 2010 - (Free Research)
Veracode’s eLearning contains over 30 hours of secure training content in a web-based training module format. The program is designed specifically for developers and security personnel to meet formal training and competency testing requirements. It also contains a comprehensive knowledgebase on secure software development. Read on to learn more. 
(TRAINING GUIDE) READ ABSTRACT |

Citizens National Bank of Texas Increases Advanced Cyber Attack Protection with FireEye by FireEye

December 2013 - (Free Research)
With cyber-attacks growing in regularity and complexity, many businesses have to go the extra mile to protect their sensitive data. This case study takes a look at one company's success when implementing a Web-based malware protection system. 
(WHITE PAPER) READ ABSTRACT |

How Bad Are the Bad Guys? - The Changing Nature of Web Security Threats by Webroot

September 2009 - (Free Research)
This whitepaper considers how Web-based security threats are evolving, within the context of IT trends including mobile, home computing, and other forms of remote access that could all potentially increase the attack surface of the organization. Read on to learn more about protecting your organization from emerging Web-based security threats. 
(WHITE PAPER) READ ABSTRACT |

Unchain Your Network with Application Intelligence and Control by SonicWALL

February 2011 - (Free Research)
This paper discusses the new risks facing organizations in light of the prevalence of Web-based applications and offers best practices for gaining control of applications, data and bandwidth. 
(WHITE PAPER) READ ABSTRACT |

Intuit QuickBase: Increase Visibility with Web-based Project Management by Intuit QuickBase

Web-based QuickBase from Intuit offers a refreshingly powerful, flexible and affordable solution for busy teams to better manage projects, information and processes. With QuickBase, you can get and keep everyone -- team members, clients, vendors, freelancers -- on the same page with better visibility and accountability for everyone. 
(ASP)

crystalreports.com: Web-Based Reporting & Information Sharing by Business Objects

crystalreports.com is a web-based report-sharing service that allows organizations to instantly share crucial business information with the right people - simply and securely. There is nothing to install, and places no additional workload on IT. It improves decision makers’ ability to make key business decisions based on timely and accurate data. 
(SOFTWARE PRODUCT)

A Computer Weekly buyer's guide to testing and code quality by ComputerWeekly.com

May 2014 - (Free Research)
Find out why agile software development is outstripping traditional testing practices, how to keep code in good shape during agile development and how to optimise the performance and security of web-based business applications in this 12 page guide. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Weighing the pros and cons of a web-based EHR system by VMware, Inc.

December 2012 - (Free Research)
This e-guide from SearchHealthIT.com highlights many of the pros and cons of a web-based EHR system. Additionally, get a break-down of health care application delivery options, and learn what methods would align with your business model. 
(EGUIDE) READ ABSTRACT |

Podcast: Salesforce.com and Business Objects - How OnDemand CRM and BI Work Together by Business Objects

August 2007 - (Free Research)
In this recorded interview with salesforce.com, learn how advanced Web-based reports and dashboards created by business intelligence (BI) market leader Business Objects have increased the value of the leading on-demand customer relationship management (CRM) platform - salesforce.com. 
(PODCAST) READ ABSTRACT |

Expert Ebook: Mastering PCI by Information Security Magazine Sponsored by: Breach, Cisco, Fiberlink, Rapid7, Sentrigo, Solidcore, Thawte, Tripwire, and Utimaco

August 2008 - (Free Research)
This eBook gives expert advice on successfully achieving PCI compliance, by selecting the right auditor and implementing new requirements into your company's IT infrastructure. Read this book and learn how to master PCI compliance. 
(BOOK) READ ABSTRACT |

Virtualization Solutions from Sun Microsystems: I Remember When Being Green Meant Compromise by LEGACY - DO NOT USE - Insight

June 2008 - (Free Research)
For every area of your datacenter, Sun Professional Services has created a tailored assessment service. 
(WHITE PAPER) READ ABSTRACT |

Protecting Against the New Wave of Web Threats by BlueCoat

January 2009 - (Free Research)
This Osterman Research White Paper discusses the extent of today's Web threats and provides recommendations on key aspects of a defense against them. It also provides information on Blue Coat's offerings. 
(ANALYST REPORT) READ ABSTRACT |

Symantec Internet Security Threat Report: Trends for 2008 by Symantec Corporation

April 2009 - (Free Research)
This report provides a detailed overview of current Internet threat activity, malicious code, and known vulnerabilities. It also examines the latest trends in phishing and spam tactics and discusses how regional differences affect malicious activity globally. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 451 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts