Conferences Largest Security PartWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Conferences Largest Security Part returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Security Policies
 •   Security Monitoring
 •   Network Security
 •   Virtualization
 •   Storage Management
 •   Wireless Technologies and Mobile Computing
 •   Storage Security
 •   Managed Security Services
 •   Enterprise Data Protection and Privacy

Related Searches
 •   Backups Conferences Largest Security
 •   Conferences Largest Costs
 •   Conferences Largest Oregon
 •   Conferences Largest Security Graphs
 •   Conferences Managing
 •   Conferences Project
 •   Conferences Supply
 •   Decisions Conferences
 •   Definition Of Conferences Largest
 •   Profile Conferences
Advertisement

ALL RESULTS
1 - 25 of 481 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Computer Weekly - 3 April 2012: Data security best practice by ComputerWeekly.com

April 03, 2012 - (Free Research)
This week’s Computer Weekly kicks off our Buyer's Guide to data security by looking at the changing role of the IT security chief. We also examine why flexible working is proving so slow to roll out and we talk to the UK's air traffic control operator about its ambitious desktop virtualisation project. 
(EZINE)

Computer Weekly 8 November 2011: Read this week's issue of the UK's leading technology publication, with the news, analysis and opinion that matters to IT managers. by ComputerWeekly.com

November 04, 2011 - (Free Research)
In this week's Computer Weekly, we report from the London Cyberspace Conference where world leaders gathered to discuss internet security. We examine the tools available to help migrate from Windows XP to Windows 7; and hear from Royal Bank of Scotland about how to build a business case for virtual desktops. Download the new issue now. 
(EZINE)

Computer Weekly - 1 May 2012: The technology behind the England football team by ComputerWeekly.com

May 01, 2012 - (Free Research)
This week's Computer Weekly examines how the Football Association's IT director is using technology to help improve the prospects for the England national team. Our Buyer's Guide to government IT looks at the future of open source in the public sector and we report from Infosec 2012 on the rising number of cyber attacks. Read the issue now. 
(EZINE)

Managing Security on Mobile Phones by Nokia

January 11, 2008 - (Free Research)
This paper describes the challenges of provisioning and managing security in mobile phone environments and how a well-designed deployment system can alleviate these challenges. 
(ANALYST REPORT) READ ABSTRACT |

Computer Weekly - 29 November 2011: Read this week’s issue of the UK’s leading technology publication, featuring the latest news, analysis and opinion about UK IT by ComputerWeekly.com

November 28, 2011 - (Free Research)
In this week's Computer Weekly, we go behind the scenes at the datacentre that knows everything about you, at credit checking firm Experian. We analyse the government's new plans to change the way it works with IT suppliers; and kick-off our Buyer's Guide to outsourcing with a look at the latest trends. Download the new issue now. 
(EZINE)

Computer Weekly 27 September 2011: Download the latest issue of the UK's leading technology publication, featuring the news, analysis and opinion that matters to IT decision-makers by ComputerWeekly.com

September 27, 2011 - (Free Research)
In this week's Computer Weekly, we take an in-depth look at Windows 8 - identifying what new features will be key to business users; and examine the remains of the National Programme for IT and what this means for the future of the NHS. Download the latest issue now. 
(EZINE)

2010 Information Security & Compliance Trend Study by nCircle

August 02, 2010 - (Free Research)
This report summarizes the results of the nCircle 2010 Information Security and Compliance Trend Study, a cross-industry survey of over 250 respondents in the IT security industry in the United States and Canada. Over 65% of survey respondents are from large and midsize enterprises. 
(WHITE PAPER) READ ABSTRACT |

CW Special report on Symantec by ComputerWeekly.com

May 14, 2013 - (Free Research)
This in-depth profile from Computer Weekly, updated for 2013, gives you the key facts on Symantec's products, financial performance and strategy. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly 25 October 2011: Read this week's issue of the UK's leading technology publication, with news, analysis and opinion on the topics that matter to IT managers by ComputerWeekly.com

October 21, 2011 - (Free Research)
In this week's Computer Weekly, we ask IT experts to help answer the question of why so many big IT projects fail. We report from VMware's user conference in Copenhagen on the latest developments in virtualisation, and analyse the emerging threat from military-style cyber attacks on corporate IT networks. Download the new issue now. 
(EZINE)

Computer Weekly - 13 March 2012: The economics of private cloud by ComputerWeekly.com

March 13, 2012 - (Free Research)
This week’s Computer Weekly kicks off our Buyer's Guide to private cloud. It also contains our RSA conference coverage of the latest IT security trends and the future for Microsoft's Trustworthy Computing initiative. And we discuss the role of apprenticeships in encouraging more young people to work in IT. 
(EZINE)

ITIL: What It Is and Why You Should Care by Global Knowledge Network, Inc.

September 2005 - (Free Research)
ITIL is becoming the next big thing in Information Technology. This paper outlines the origin of ITIL, who controls its contents, who are the biggest users, and why you should care. 
(WHITE PAPER) READ ABSTRACT |

Online Training Case Study by SyberWorks, Inc.

December 2008 - (Free Research)
The operations division in a large multibillion-dollar service company had significant challenges training its franchisees to overcome these challenges the company purchased and installed the SyberWorks Training Center with a 250-seat license. 
(CASE STUDY) READ ABSTRACT |

Computer Weekly – 5 March 2013: Planning for a 4G future by ComputerWeekly.com

March 2013 - (Free Research)
In this week's Computer Weekly, now the 4G spectrum auction is over, we look at what happens next for the future of mobile networking. Cloud computing promises to save costs – we examine how to ensure a return on investment. And we report from the RSA conference on how big data is helping tackle cyber security threats. Read the issue now. 
(EZINE) READ ABSTRACT |

Symantec assesses its options in storage as part of a complete business review by The 451 Group (E-mail this company)

November 2012 - (Free Research)
Symantec recently held its annual Vision Europe customer conference in Barcelona, affording us an opportunity to catch up with executives and get a strategy update. Or at least affording us apartial opportunity, for Symantec is in the middle of a review of its entire business. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 1 April 2014: Where next for the NHS Care.data programme? by ComputerWeekly.com

April 2014 - (Free Research)
In this week's Computer Weekly, healthcare IT experts talk about the next steps for the controversial NHS Care.data plan to create a database of medical records. Is Moore's Law running out? We hear about the future of processor technology. And our latest buyer's guide looks at how data analytics can improve IT security. Read the issue now. 
(EZINE) READ ABSTRACT |

Infosecurity Europe 2014 by ComputerWeekly.com

February 2014 - (Free Research)
Infosecurity Europe is the largest IT security event in Europe. Held in London, it is a free exhibition with over 325 exhibitors featuring the most diverse range of new products and services and an unrivalled free education programme. Register today! 
(BROCHURE) READ ABSTRACT |

Computer Weekly 20 September 2011: Download the new issue of the UK's leading technology publication, featuring in-depth analysis of the latest IT news and technology trends by ComputerWeekly.com

September 2011 - (Free Research)
In this week's Computer Weekly, we examine what reform of the UK's banks will mean for financial services IT strategies. We also look at the problems of software licensing when moving to desktop virtualisation, discuss how to make sense of cloud computing, and provide part three of our guide to business intelligence. Download the new issue now. 
(EZINE)

Polycom UC Intelligent Core: Scalable Infrastructure for Distributed Video by Polycom, Inc.

August 2010 - (Free Research)
Video is leaving the dedicated video conference room and becoming a standard communication tool and part of the individual's daily workflow. In turn, this trend is having a profound impact on the scalability requirements of the visual communication system. 
(WHITE PAPER) READ ABSTRACT |

Part 3: New Strategies for Data Center Storage and Networking by EqualLogic, Inc.

February 2008 - (Free Research)
New products and strategies in data storage and networking, including storage virtualization, IP and Fiber Channel hybrids and the evolution of hard disk drive storage. 
(VIDEOCAST) READ ABSTRACT |

Part 2: Challenges to Data Center Storage and Networking by EqualLogic, Inc.

February 2008 - (Free Research)
Schulz discusses threats, challenges and new strategies effecting storage and networking performance and capacity. 
(VIDEOCAST) READ ABSTRACT |

Part 1: Basic Storage and Networking Terms by EqualLogic, Inc.

February 2008 - (Free Research)
Greg begins with an introduction to storage and networking terminology, which helps to demystify complicating acronyms and other jargon used by storage and networking specialists. 
(VIDEOCAST) READ ABSTRACT |

Sedona Conference® Commentary On Legal Holds: The Trigger & The Process by ZANTAZ

January 2008 - (Free Research)
This Article, intended to provide guidance on those issues, is divided into two parts: The "trigger" and the "legal hold." 
(WHITE PAPER) READ ABSTRACT |

8 Problems of Keyword Search in E-Discovery – A Guide for Fortune 1000 Companies by FTI Technology

November 2009 - (Free Research)
In this paper – first in a three part series - we will examine the difficulties of working with keywords during a matter, the many challenges associated with relying on keyword search, and the cost and risk associated with attempting to “guess” one’s way to a relevant document set. 
(WHITE PAPER) READ ABSTRACT |

Big Data in Motion by SearchCIO.com

March 2014 - (Free Research)
When large information sets are in transit, bottlenecks inevitably occur. CIOs must overcome these obstacles in order to extract real value from their data. In this SearchCIO handbook, we confront the obstacles posed by big data in motion. 
(EBOOK) READ ABSTRACT |

The Best of RSA: Mobile Security by Kaspersky Lab

May 2012 - (Free Research)
To help organizations grapple with the new challenges of IT consumerization and BYOD, the RSA conference held its own session track specifically on mobile device security. Get an inside look into the session and gain key insight into the major issues today including BYOD policies and threats, and uncover new countermeasures and strategies. 
(EGUIDE) READ ABSTRACT |

1 - 25 of 481 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts