Configurations EnterpriseWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Configurations Enterprise returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Managed Security Services
 •   Change and Configuration Management
 •   Security Monitoring
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Customer Data Integration
 •   Application Security
 •   Business Process Management (BPM)
 •   Security Policies
 •   Enterprise Data Protection and Privacy

Related Searches
 •   Capacity Configurations Enterprise
 •   Configurations Enterprise New York
 •   Configurations Enterprise Projects
 •   Configurations Enterprise Publishing
 •   Configurations Enterprise Specialists
 •   Configurations Enterprise Standard
 •   Configurations On-Line
 •   Configurations Webinars
 •   Customer Configurations Enterprise
 •   Methods Configurations Enterprise
Advertisement

ALL RESULTS
1 - 25 of 480 | Next Page

Cisco Catalyst 3560 Series Switches by Cisco Systems, Inc.

The Cisco® Catalyst® 3560 Series is a line of fixed-configuration, enterprise-class switches that include IEEE 802.3af and Cisco prestandard Power over Ethernet (PoE) functionality in Fast Ethernet and Gigabit Ethernet configuration. 
(HARDWARE PRODUCT)

Oracle Enterprise Manager 11g Configuration Management Pack by Oracle Corporation

April 30, 2010 - (Free Research)
This white paper takes a three-pronged approach to configuration management: simplifying the management of your IT infrastructure; improving the level of service you provide your end users; and enforcing compliance with real-time change detection for files, database objects, users, and processes. 
(WHITE PAPER) READ ABSTRACT |

Security Blanket by TCS: Enterprise Security Management by Trusted Computer Solutions

February 12, 2010 - (Free Research)
Read this paper to learn how Security Blanket includes pre-defined security guidelines, called Profiles, from some of the most respected security industry leaders in the world. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Configure Outbound Firewall Rules for Data Protection by SearchSecurity.com

August 24, 2012 - (Free Research)
A new form of firewall was recently developed in order to withstand more sophisticated threats. Consult this expert E-guide to learn more about the value of application firewalls and how they can benefit the security of your business. 
(EGUIDE) READ ABSTRACT |

The Total Economic Impact™ of Oracle Enterprise Manager Configuration Management Pack, and Provisioning and Patch Automation Pack by Oracle Corporation

March 01, 2009 - (Free Research)
Learn how Oracle's comprehensive industry leading configuration management and provisioning automation solutions help you reduce application management costs while delivering greater control and compliance. 
(WHITE PAPER) READ ABSTRACT |

Achieving Federal Desktop Core Configuration Compliance with Lumension Solutions by Lumension

May 28, 2009 - (Free Research)
The Federal Desktop Core Configuration (FDCC) is an OMB mandated security configuration set applicable within United States Federal Government agencies. Learn how you can address each of the FDCC requirements with Lumension Vulnerability Management. 
(WHITE PAPER) READ ABSTRACT |

Configuration Auditing – The Next Critical Step in Compliance by nCircle

August 02, 2010 - (Free Research)
In this paper learn what Configuration auditing entails verifying the configurations of all assets in the environment to make sure they have the correct settings. This includes auditing new assets, monitoring for changes and verifying that planned changes are carried out properly. 
(WHITE PAPER) READ ABSTRACT |

ASG's metaCMDB™ Master or "Citizen" CMDB Containing Critical Enterprise Configuration Information by ASG Software Solutions

May 25, 2010 - (Free Research)
The sound understanding and visibility of configuration information provided by ASG’s metaCMDB™ is critical for ITIL initiatives and business service management (BSM) implementations, service desk support, and the integration of disparate technologies. Read this paper to find out more. 
(WHITE PAPER) READ ABSTRACT |

Overcoming Network Degradation Blues with OpManager NCM Plug-in by ManageEngine

July 30, 2010 - (Free Research)
This paper discusses the network configuration management challenges, the need for the NCM plug-in and its benefits. Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

Microsoft Exchange 2010 on Dell Systems: Small and Branch Office Configurations by Dell and Microsoft

January 01, 2013 - (Free Research)
This whitepaper demonstrates the Dell Systems configuration models that are available for small and branch office configurations with Microsoft Exchange 2010. These solutions are especially designed for businesses of up to 1,000 mailboxes. 
(WHITE PAPER) READ ABSTRACT |

Microsoft® Hyper-V™ R2 Reference Architecture for Dell® PowerEdge™ Rack Servers and Dell PowerVault™ Storage by Dell and Microsoft

February 05, 2010 - (Free Research)
This white paper includes information useful both before and after the purchase of a business ready configuration that includes Dell PowerEdge R710 servers, Dell MD3000i iSCSI storage, and Microsoft Hyper-V technologies. 
(WHITE PAPER) READ ABSTRACT |

NetMRI -- Take Control of Network Configurations and Changes by Netcordia

September 29, 2009 - (Free Research)
Network change is the number one cause of performance related issues. NetMRI helps reduce cost by automating network change, improve service quality by managing network configurations and mitigate risk by ensuring a compliant network. Check out this free trial download to learn more. 
(TRIAL SOFTWARE)

Orion Network Configuration Manager (NCM) by SolarWinds, Inc.

July 14, 2009 - (Free Research)
Check out this download to see how the Orion Network Configuration Manager aids in managing network configuration files in multi-vendor network environments, monitoring changes to device configurations and ensuring compliance with federal and corporate policies. 
(TRIAL SOFTWARE) READ ABSTRACT |

Virtual Chassis Performance: Juniper Networks EX Series Ethernet Switches by Juniper Networks, Inc.

December 06, 2010 - (Free Research)
Juniper Networks commissioned Network Test to assess the performance of Virtual Chassis technology on its EX Series Ethernet switches, especially in the areas of latency and high availability. The key objectives were to determine whether Virtual Chassis configurations would provide low latency and fast recovery from network failures. 
(CASE STUDY) READ ABSTRACT |

ASG-Discovery and Dependency Mapping (ASG-DDM) by ASG Software Solutions

February 23, 2010 - (Free Research)
This paper explains ASG's unique, automated solution for discovery and dependency mapping for change and configuration management. 
(WHITE PAPER) READ ABSTRACT |

Best Practices in Lifecycle Management: Comparing KACE, Altiris, LANDesk, and Microsoft SMS by KACE

January 2007 - (Free Research)
This Enterprise Management Associates (EMA) white paper explains key best practices in lifecycle management, uses these as a framework for functional comparison, and includes a cost comparison to determine overall solution value. 
(WHITE PAPER) READ ABSTRACT |

Protect, Detect, and Correct: What's New in Tripwire Enterprise 8 by Tripwire, Inc.

February 2011 - (Free Research)
Configurations that "drift" from compliance, by the accrual of gradual, sometimes minute changes often lead to exploits, audit failures, and unplanned repair time. Worse still, it takes even more time to bring new, fresh, out-of-the-box servers up to a compliant, audit-passing state—sometimes a half a day or more per machine. 
(DATA SHEET) READ ABSTRACT |

Automating IT Configuration Controls with Oracle Enterprise Manager Configuration Change Console by Oracle Corporation

October 2008 - (Free Research)
This whitepaper discusses how to define, track and enforce IT policies; automate IT compliance processes; and reduce the effort and cost of managing business applications. 
(WHITE PAPER) READ ABSTRACT |

Solutions Guide: Business Ready Configurations for Data Center Virtualization by Dell and VMware

July 2009 - (Free Research)
Business Ready Configurations for Virtualization are pre-configured, easy to order, bundled solutions that include Dell PowerEdge™ blade servers, Dell EqualLogic™ SAN, and VMware vSphere™. This white paper provides a detailed reference architecture for the Business Ready Configurations. 
(WHITE PAPER) READ ABSTRACT |

Microsoft Exchange 2010 on Dell Systems Simple Distributed Configurations by Dell and Microsoft

April 2013 - (Free Research)
This architectural reference guide provides nine sample hardware configurations for Exchange 2010 specifically designed for enterprises who want to leverage the native high-availability and disaster recovery features of this latest Exchange upgrade while simplifying operations and management. 
(WHITE PAPER) READ ABSTRACT |

ExtraView Enterprise by Extraview Corporation

ExtraView Enterprise enables organizations to quickly and cost-effectively, create user specific web-based solutions that conform to a corporation's unique business processes and workflow requirements. 
(ASP & SOFTWARE PRODUCT)

Configuration Assessment: Choosing the Right Solution by Tripwire, Inc.

July 2008 - (Free Research)
Check out this white paper to discover how automated configuration assessment solutions like Tripwire Enterprise help ease the burden on IT of achieving and maintaining compliance, securing the IT infrastructure, and generating evidence for mandatory audits. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Automating Virtual Machine Configuration by ePlus Technology

May 2009 - (Free Research)
Learn the different methods for automating virtual machine configuration in this expert webcast transcript. Edward L. Haletky also reviews the different automation tools available for automating virtual machine installation and patch management. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Cisco 1800 Series Integrated Services Routers Fixed Configuration Models by Cisco Systems, Inc.

The Cisco® 1800 Series integrated services routers intelligently embed data, security, and wireless technology into a single, resilient system for fast, secure, scalable delivery of mission-critical business applications. 
(HARDWARE PRODUCT)

Effective Security with a Continuous Approach to ISO 27001 Compliance by Tripwire, Inc.

July 2008 - (Free Research)
In this white paper, learn how with Tripwire Enterprise, organizations can quickly achieve IT configuration integrity by proactively assessing how their current configurations measure up to specifications as given in ISO 27001. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 480 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts