Configure Field Study SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Configure Field Study Security returned the following results.
RSS What is RSS?
Related Categories

 •   Mobile Field Sales/ Wireless Connectivity
 •   Wireless Technologies and Mobile Computing
 •   Network Security
 •   Data Security
 •   Mobile Device Management
 •   Virtualization
 •   Wireless Security
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)
 •   Data Center Management
 •   Availability, Performance and Problem Management

Related Searches
 •   Configure Capacity
 •   Configure Field Management
 •   Configure Field Recovery
 •   Configure Field Study Desktop
 •   Configure Field Utah
 •   Configure Mapping
 •   Configure Technologies
 •   Methods Configure Field
 •   Reservation Configure
 •   View Configure
Advertisement

ALL RESULTS
1 - 25 of 474 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..
Foglight - Application Management to Unify IT and the Business by Dell Software.
Your applications are the lifeblood of the service that IT delivers to end users and the business. Foglight, correlates application performance data and events from the entire more...
>> Discover more offerings from Dell Software.

Comparing MPLS and Internet Links for Delivering VoIP Services by Avaya Inc.

September 2005 - (Free Research)
This paper documents a real-world field study that concludes the availability and call quality of VoIP over Multi-protocol Label Switching (MPLS) is comparable to that of VoIP over the public Internet. 
(WHITE PAPER) READ ABSTRACT |

Crypto Complete Case Study: Field-Level Encryption Helps Retail Chain Achieve PCI Compliance by Linoma Software

July 2008 - (Free Research)
In this case study, Love's Travel Stops and Country Stores, a retail chain, used Crypto Complete in an effort to meet PCI standards. Love's found that Crypto Complete encrypted credit card numbers in a way that satisfies PCI compliance auditors. 
(CASE STUDY) READ ABSTRACT |

Food Manufacturer Extends Its Workforce with Secure Remote Access by Cisco Systems, Inc.

April 2008 - (Free Research)
This case study describes how one of the most well-known food producers and distributors achieved cost savings, increased productivity, and solved business challenges through deployment of the Cisco Adaptive Security Appliance (ASA) VPN Edition. 
(CASE STUDY) READ ABSTRACT |

Cisco Catalyst 2950 Series Switches with Enhanced Image SW by Cisco Systems, Inc.

The Cisco Catalyst 2950 Series switches offer enhanced data security through a wide range of security features. 
(HARDWARE PRODUCT)

VMware ACE 2 Enterprise Edition: Desktop Virtualization Solution by AMD and VMware, Inc (E-mail this company)

VMware ACE 2 Enterprise Edition delivers desktop virtualization solutions for enterprise users. Use VMware ACE 2 to deploy an ACE virtual machine as an IT managed “virtual laptop” to remote workers, provision controlled desktop images as sandbox environments or run legacy operating systems & applications on an existing PC as you migrate to Vista. 
(SOFTWARE PRODUCT)

ExtraView Enterprise by Extraview Corporation

ExtraView Enterprise enables organizations to quickly and cost-effectively, create user specific web-based solutions that conform to a corporation's unique business processes and workflow requirements. 
(ASP & SOFTWARE PRODUCT)

2012 Trends to Watch: Storage by ComputerWeekly.com

February 2012 - (Free Research)
Ovum analyses data growth, big data, disk shortages, public cloud storage, flash memory, and other storage trends. 
(ANALYST BRIEF) READ ABSTRACT |

Leveling the playing field: How companies use data for competitive advantage by SAP America, Inc.

September 2012 - (Free Research)
Data is a critical asset to the competitiveness of your organization, yet only 27% of people in a recent study said their companies do a better job using information than their competitors. Read this study by the Economist Intelligence Unit to find best practices about developing data initiatives to gain a competitive advantage. 
(WHITE PAPER) READ ABSTRACT |

Improved Chilled Water Piping Distribution Methodology for Data Centers by Schneider Electric

October 2011 - (Free Research)
This white paper details the issues involved with chilled water piping and offers flexible piping as a reliable solution. 
(WHITE PAPER) READ ABSTRACT |

Comparing Data Center Power Distribution Architectures by Schneider Electric

October 2013 - (Free Research)
This white paper compares 5 common data center power distribution methods. 
(WHITE PAPER) READ ABSTRACT |

2010 Endpoint Risk Assessment: Internal Vulnerabilities by Promisec

May 2011 - (Free Research)
This study will show you the most common security issues that were found and how they were dealt with by the various organizations. 
(WHITE PAPER) READ ABSTRACT |

SecureAnywhere Web Security service by Webroot

May 2013 - (Free Research)
This case study highlights one organization's journey in finding a simple to install and easy to configure web filtering service that is as effective on the client side as it is on their network. Learn how they were able to boost their ability to effectively identify and protect all of their mobile users. 
(CASE STUDY) READ ABSTRACT |

BGMX Retail Solutions Case Study by SonicWALL

February 2011 - (Free Research)
BGMX's primary challenge is having the proper bandwidth to adhere to all VLAN specifications in PCI compliance standards. Desko also must meet even tighter SAS-70 regulations, as well as his bank's internal security guidelines. 
(CASE STUDY) READ ABSTRACT |

Bring Your Own iPad to Work by Aruba Networks, Inc.

March 2011 - (Free Research)
Many CIOs face overwhelming user demand to support personal mobile devices on the WLAN. This paper reviews the issues IT organizations face when employees demand to use their personal mobile devices in the office. 
(WHITE PAPER) READ ABSTRACT |

Case Study: Transitioning to Server Virtualization with Hyper-V and NetApp by NetApp and Microsoft

December 2008 - (Free Research)
Learn how one IT team transitioned to server virtualization with Microsoft® Hyper-V<sup>™</sup> coupled with NetApp storage to enable a variety of flexible disaster recovery and availability scenarios. 
(CASE STUDY) READ ABSTRACT |

Understanding the Total Cost of Ownership for Endpoint Security Solutions by Sophos, Inc.

March 2009 - (Free Research)
When moving to an endpoint security solution, should you stick with your current vendor or shop around? To shed some light on this issue, Sophos commissioned an independent research study to quantify all of the cost areas involved in migrating to an endpoint security product and managing that solution afterward to create a TCO comparison. 
(ANALYST REPORT)

Understanding the Total Cost of Ownership for Endpoint Security Solutions by Sophos, Inc.

March 2009 - (Free Research)
When moving to an endpoint security solution, should you stick with your current vendor or shop around? To shed some light on this issue, Sophos commissioned an independent research study to quantify all of the cost areas involved in migrating to an endpoint security product and managing that solution afterward to create a TCO comparison. 
(ANALYST REPORT) READ ABSTRACT |

How Microsoft Designs the Virtualization Host and Network Infrastructure by Microsoft Corporation India Pvt Ltd

December 2009 - (Free Research)
This case study provides IT professionals and technical decision makers working in large enterprises with the information they need to plan and deploy server virtualization by using Windows Server 2008 Hyper-V. 
(CASE STUDY) READ ABSTRACT |

z Cisco Aironet 1200 Series Access Point by Cisco Systems, Inc.

Cisco® Aironet® 1200 Series access points deliver the investment protection, versatility, and enterprise-class features demanded by wireless LAN customers. 
(HARDWARE PRODUCT)

Computer Weekly – 13 November 2012: Government commits to open standards by ComputerWeekly.com

November 2012 - (Free Research)
In this week's Computer Weekly, we look at the government's controversial new policy on open standards and what it means for public sector IT. After hurricane Sandy hit New York, we talk to one datacentre operator about how it kept services running. And our latest buyers' guide examines the market for infrastructure on demand. Read the issue now. 
(EZINE) READ ABSTRACT |

Case Study: Protection and Replication for Remote Data Sources by Iron Mountain

May 2011 - (Free Research)
Employees sometimes lose track of their laptops, either through misplacing them or through theft. One of the main concerns of IT was to protect vital business data on laptops, to prevent that data from falling into the wrong hands, and also to get the employee's system working again. Read this case study to learn one company's solution. 
(CASE STUDY) READ ABSTRACT |

Installing Windows 2008 Hyper-V Best Practices for Xiotech Emprise 7000 by Xiotech Corporation

June 2010 - (Free Research)
This document provides step-by-step instructions on installing Hyper-V and a host operating system. Windows 2008 must be installed and configured prior to installing Hyper-V. In addition, all other server configuration tasks, such as network configuration, domain membership, must be complete before installing Hyper-V. 
(WHITE PAPER) READ ABSTRACT |

Epicor's IT Service Management - Expert IT Help Desk Software by Epicor Software Corporation

 
(SOFTWARE PRODUCT)

Managing Application Push in the Blackberry Enterprise Solution by BlackBerry

January 2009 - (Free Research)
In this webcast you will learn that application push is the process of remotely installing software on a BlackBerry smartphone. 
(WEBCAST) READ ABSTRACT |

The 2008 (ISC)2 Global Information Security Workforce Study by ISC2

May 2008 - (Free Research)
Information security professionals are facing a growing amount of pressure. This survey provides detailed insight into the important trends and opportunities emerging in the information security profession worldwide. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 474 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts