Computing CheckpointWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Computing Checkpoint returned the following results.
RSS What is RSS?
Related Categories

 •   Vulnerability Assessment
 •   Data Security
 •   Application Security
 •   Intrusion Prevention Solutions
 •   Web Servers
 •   Data Center Management
 •   Network Security
 •   Endpoint Security
 •   Authentication / Password Management
 •   Enterprise Dashboards

Related Searches
 •   Computing Checkpoint Alabama
 •   Computing Checkpoint Demand
 •   Computing Checkpoint Rfq
 •   Computing Checkpoint Utah
 •   Construction Computing
 •   Frameworks Computing Checkpoint
 •   Global Computing Checkpoint
 •   Issues Computing Checkpoint
 •   Matrix Computing
 •   Program Computing Checkpoint
Advertisement

ALL RESULTS
1 - 25 of 486 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Windows 7 Application Migration Checklist by Citrix

September 25, 2012 - (Free Research)
This resource provides a step-by-stop guide to a successful migration to Windows 7 including hints from your peers who have completed the upgrade. Get a checklist for optimizing your migration plan to avoid potential errors. 
(WHITE PAPER) READ ABSTRACT |

Musings on datacentres by ComputerWeekly.com

March 11, 2013 - (Free Research)
Analyst Clive Longbottom discusses the key issues in managing and designing data centres. 
(ANALYST REPORT) READ ABSTRACT |

Why HTML5 Tests the Limits of Automated Testing Solutions by SmartBear Software

August 22, 2012 - (Free Research)
Read this white paper to find suggestion and strategies on how to make HTML5 testing less of a headache. Find resources such as: Clues as to what makes HTML5 testing so hard; Checkpoints for a scalable testing strategy Videos; and Q&A, blogs, and webcasts designed to assist you with your testing project. 
(WHITE PAPER) READ ABSTRACT |

Realizing Business Value in Managed File Transfer by GlobalScape

April 2008 - (Free Research)
Managed File Transfer (MFT) is optimized for moving data; often bulk data, in a secure way that additionally involves the ability to manage data. 
(WHITE PAPER) READ ABSTRACT |

Dell Deployment Design and Implementation by Dell, Inc. and Microsoft Windows 7

October 2009 - (Free Research)
The Dell Project and Program Management approach enables the alignment of all elements of a client deployment. This standardized and easy-to-understand framework can be tailored as necessary to complement and integrate with existing customer processes. 
(DATA SHEET) READ ABSTRACT |

Deliver Application-level Security at Data Center Performance Levels by Check Point Software Technologies Ltd.

September 2008 - (Free Research)
The shift from network-layer attacks to dynamically changing application-layer threats has dramatically increased security needs. This paper examines appliances that can quickly evolve to guarantee performance yet maintain a high level of security. 
(WHITE PAPER) READ ABSTRACT |

Unified Threat Management: The security you need, the simplicity you want by Check Point Software Technologies Ltd.

September 2008 - (Free Research)
This paper explores the security issues driving the emergence of UTM products. It then examines a new solution from Check Point, UTM-1 Total Security appliances, and shows how it tackles many of the security challenges other UTM products cannot. 
(WHITE PAPER) READ ABSTRACT |

Check Point Abra: A Virtual Secure Workspace by Check Point Software Technologies Ltd.

June 2010 - (Free Research)
Read this paper to learn how Abra provides a convenient secure access to the corporate workspace, while pre­venting data loss and malicious activity from remote systems — at a significantly reduced cost over traditional endpoints. 
(WHITE PAPER) READ ABSTRACT |

The New Face of Intrusion Prevention by Check Point Software Technologies Ltd.

June 2009 - (Free Research)
Check Point IPS Software Blade gives breakthrough performance and protection at a breakthrough price. For more details, check out this paper, which highlights the numerous benefits of Check Point intrusion prevention protection solutions. 
(WHITE PAPER) READ ABSTRACT |

Mobile Devices: The New Thin Clients by Citrix

June 2013 - (Free Research)
Learn more about the evolving mix of client computing devices in the workplace, including the impact made by mobile device use and Windows transitions. 
(WHITE PAPER) READ ABSTRACT |

Podcast: In-Memory Computing for Analytic Workloads by Dell, Inc. and Intel®

March 2014 - (Free Research)
In this SearchDataManagement.com podcast, industry expert William McKnight, President of McKnight Consulting Group, shines a light on in-memory computing and how it can be used for analytics workloads. 
(PODCAST) READ ABSTRACT |

The Benefits of an Integrated Approach to Security in the Cloud by IBM

December 2013 - (Free Research)
This paper looks at how the growing adoption of cloud computing is changing the way organizations are implementing security. Organizations from a variety of industries were interviewed to assess how they are approaching security for their cloud deployments leveraging a solution from IBM. 
(WHITE PAPER) READ ABSTRACT |

EMC Scaleio: For High-Performance Computing by EMC Corporation

December 2013 - (Free Research)
Sophisticated systems require an environment that is capable of handling high-performance computing (HPC). Fortunately, there is a self-managed storage architecture available which can provide the elasticity, resilience and management needed for HPC to run smoothly. Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

Webcast: In-Memory Computing for Analytic Workloads by Dell, Inc. and Intel®

March 2014 - (Free Research)
In this on-demand webcast, join William McKnight, President of McKnight Consulting Group, as he turns an expert eye to in-memory computing for analytics workloads. 
(WEBCAST) READ ABSTRACT |

IDC white paper: Better Identity and Access Management in the Age of Cloud Computing by Ping Identity Corporation

August 2012 - (Free Research)
In this Q&A session, get the answers to your top identity and access management questions to learn how to achieve better IAM in the age of cloud computing. 
(WHITE PAPER) READ ABSTRACT |

Gartner: Fabric Computing Poised as a Preferred Infrastructure for Virtualization and Cloud Computing by Cisco Systems, Inc.

February 2011 - (Free Research)
This research note presents results from a recent survey on virtualization and cloud computing. Find out why many of your peers are looking into fabric-based infrastructures and get recommendations to help you leverage the full benefits of this technology. 
(WHITE PAPER) READ ABSTRACT |

Webinar: Benefits of Grid Computing in the Cloud by RightScale

February 2010 - (Free Research)
See how pharmaceutical, insurance, and Web 2.0 companies are using grid computing to reduce costs and speed processing. You’ll learn how to set up a scalable compute array using RightScale's Grid Edition. 
(WEBCAST) READ ABSTRACT |

How can Cisco cloud security accelerate cloud adoption? by Cisco Systems, Inc.

October 2012 - (Free Research)
Cloud computing is quickly becoming a popular solution for customers. Consult this study to learn more about why security is one of the top barriers in regards to cloud computing. Uncover some of the risks and concerns you can face by implementing cloud computing in your enterprise. 
(WHITE PAPER) READ ABSTRACT |

Forrester Report: The Total Economic Impact™ Of The Cisco Unified Computing System by Cisco Systems, Inc.

January 2012 - (Free Research)
This white paper quantifies the advantages of unified computing and presents key findings from interviews with organizations who implemented it. Discover the savings you can expect across several key categories and determine whether this IT model is right for your organization 
(WHITE PAPER) READ ABSTRACT |

Cisco Unified Computing System: Meet the Challenges of Today’s Microsoft Exchange Server Workloads by Cisco Systems, Inc.

January 2012 - (Free Research)
This white paper explores the challenges of upgrading Microsoft Exchange and explains why it is essential that you successfully coordinate between server, storage, and network stacks to ensure stable business operations. Read this white paper to learn how a unified computing system can help you achieve this goal. 
(WHITE PAPER) READ ABSTRACT |

The Journey to Unified Computing by Cisco Systems, Inc.

April 2010 - (Free Research)
This white paper explains how virtualization has removed many of the data center resource constraints of the past. Find out why management of your IT infrastructure should be integrated and learn how to set your business up for private cloud success. 
(WHITE PAPER) READ ABSTRACT |

Cisco Unified Computing System Blade Server Chassis Power Modes by Cisco Systems, Inc.

October 2010 - (Free Research)
The Cisco UCS power configuration approach enables users to meet their redundancy and power density needs. The approach is simple yet flexible enough to adapt to the varying needs for different applications within the data center. Continue reading to learn more. 
(WHITE PAPER)

Cisco's Unified Computing System vs. IBM Flex System: How Do They Compare? by IBM

November 2012 - (Free Research)
Check out this exclusive resource to find out how Cisco's Unified Computing System measures up against IBM's Flex System, both of which have blade environments. 
(WHITE PAPER) READ ABSTRACT |

NC State makes a breakthrough in improving access to academic computing resources. by IBM

May 2011 - (Free Research)
Read how IBM and NC State created a “cloud computing” model for provisioning technology that offered a quantum improvement in access, efficiency and convenience over traditional computer labs. 
(WHITE PAPER) READ ABSTRACT |

Cloud Computing for the Enterprise-- Part 2: WebSphere sMash and DB2 Express-C on the Amazon EC2 Public Cloud by IBM

September 2010 - (Free Research)
Read this article to see how IBM WebSphere sMash and IBM DB2 Express-C Amazon Machine Images can be combined to help you deliver Web applications hosted on the Amazon Elastic Compute Cloud (EC2) infrastructure. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 486 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts