Consulting SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Consulting Security returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Security Policies
 •   Security Monitoring
 •   Endpoint Security
 •   Managed Security Services
 •   Enterprise Data Protection and Privacy
 •   Network Security
 •   Application Security
 •   Wireless Security
 •   Compliance Management/ Sarbanes-Oxley Compliance

Related Searches
 •   Computerized Consulting Security
 •   Consulting Erp
 •   Consulting Security Connecticut
 •   Consulting Security Management
 •   Consulting Security Quality
 •   Consulting Technologies
 •   Cycle Consulting
 •   Specialists Consulting Security
 •   Survey Consulting
Advertisement

ALL RESULTS
1 - 25 of 496 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

The Total Economic Impact of CA Identity Manager by CA Technologies.

February 19, 2010 - (Free Research)
In January 2010, CA commissioned Forrester Consulting to examine the total economic impact and potential return on investment (ROI) enterprises may realize by deploying CA Identity Manager (CA IM). Read this paper to learn what they found. 
(WHITE PAPER) READ ABSTRACT |

CW+: PA Consulting: Securing data in the cloud by ComputerWeekly.com

August 05, 2010 - (Free Research)
Economies of scale, flexibility and costreduction – cloud advocates have made sure that we are familiar with these potential benefits, even if we have yet to agree on an exact definition of cloud computing. But doubters argue that none of these benefits will actually be available unless some fundamental security issues can be overcome. 
(WHITE PAPER) READ ABSTRACT |

Outbound Email and Content Security in Today's Enterprise by Proofpoint, Inc.

July 2008 - (Free Research)
Discover surprising statistics about how large companies manage the risks associated with outbound email. Read this report which summarizes the key findings from a survey of technology decision makers conducted by Proofpoint and Forrester Consulting. 
(WHITE PAPER) READ ABSTRACT |

ITS Group Consulting Offers "More 9's" and Killer RTO/RPO with Replay AppImage by AppAssure Software, Inc.

March 2009 - (Free Research)
Replay AppImage's ability to restore messages and systems quickly and with little effort allowed ITS Group to grow its customer base while keeping overhead low. 
(CASE STUDY) READ ABSTRACT |

Deloitte Consulting Presents: Risk and TCO in Single and Multivendor Networks by Cisco Systems, Inc.

March 2012 - (Free Research)
Can a multivendor network infrastructure actually reduce your overall costs, as some claim? To answer this question, Deloitte Consulting conducted in-depth research looking at enterprises' total cost of ownership (TCO), including capital outlays, operating expenses, and analyzed risks associated with the network. 
(WHITE PAPER)

Forrester Consulting Study - The Total Economic Impact of IBM’s Real-Time Compression Solution by IBM

October 2011 - (Free Research)
In October 2010, IBM commissioned Forrester Consulting to examine the total economic impact and potential return on investment enterprises may realise by deploying IBM’s Real-time Compression solution. Read this case study to learn the results. 
(WHITE PAPER) READ ABSTRACT |

Learn How PGi Addresses Security, Resilience and Business Continuity by Premiere Global Services

February 2014 - (Free Research)
Consult the following case study to hear from a global provider of advanced virtual meetings, PGi, as they reveal their best practices for security, integrity, and business continuity. 
(WHITE PAPER) READ ABSTRACT |

Rewriting the Rules of Patch Management by IBM

February 2011 - (Free Research)
By implementing more patches, software vendors are keeping pace with malware exploits. Consult this informative white paper to learn more about patch management and how it can benefit your business. Virtually eliminate the risks to your company by following these steps. 
(WHITE PAPER) READ ABSTRACT |

Webroot Secure Anywhere Business Value Assessment by Webroot

August 2012 - (Free Research)
Consult this helpful resource to get financial justification for endpoint protection. Though you can't slap a price tag on a fully secured business enterprise, these eight simple questions can help you rest easy knowing you made the right choice! 
(WHITE PAPER) READ ABSTRACT |

How can Cisco cloud security accelerate cloud adoption? by Cisco Systems, Inc.

October 2012 - (Free Research)
Cloud computing is quickly becoming a popular solution for customers. Consult this study to learn more about why security is one of the top barriers in regards to cloud computing. Uncover some of the risks and concerns you can face by implementing cloud computing in your enterprise. 
(WHITE PAPER) READ ABSTRACT |

Mobility, Virtualization and the Next-Generation Workplace by Cisco Systems, Inc.

June 2012 - (Free Research)
By reading this report from Forrester Consulting, you’ll gain an understanding of the benefits, challenges and timelines for implementing workspace initiatives such as BYOD programs as well as collaboration, desktop virtualization, app virtualization and security solutions. 
(WHITE PAPER) READ ABSTRACT |

Identity and Access Intelligence: Transforming Enterprise Security by IBM

March 2013 - (Free Research)
Consult this white paper to learn more about how the concepts of business IT are transforming. It describes the nature of identity and access intelligence and the factors that are behind this new and emerging aspect of security evolution. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 18 February 2014: Swapping notepads for iPads – creating a digital police force by ComputerWeekly.com

February 2014 - (Free Research)
In this week's Computer Weekly, we examine the new digital strategy at the Metropolitan Police, as the London force puts technology at the heart of crime fighting. IBM is spending $1.2bn developing cloud datacentres – we assess the plans. And we ask how the NSA web surveillance revelations are affecting IT security strategies. Read the issue now. 
(EZINE) READ ABSTRACT |

Your Enterprise Database Security Strategy (Forrester Consulting Report) by IBM

September 2009 - (Free Research)
Database security is the last line of defense, so it deserves greater focus on the protection of private data from both internal and external attacks than IT pros have traditionally given it. Read this paper to learn what steps you can take to improve database security in your organization. 
(WHITE PAPER) READ ABSTRACT |

SharePoint Security in Action: Best Practices Drive Secure Collaboration by CA Technologies.

September 2012 - (Free Research)
Microsoft SharePoint is a widely deployed enterprise content management (ECM) and collaboration system because it delivers a functional user experience. However, it also presents some security concerns. Consult this informative white paper to learn more about some of the challenges and how to remedy these obstacles. 
(WHITE PAPER) READ ABSTRACT |

The Total Economic Impact of Lumension Security's Sanctuary by Lumension

September 2007 - (Free Research)
Lumension&#39s Sanctuary Application and Device Control is an IT-driven solution that automatically enforces endpoint security policies. The financial impact of moving from a &#34voluntary&#34 compliance solution to an &#34automatic&#34 one is illustrated 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: The Cybercrime War; When Are We Going to Win? by Dell SecureWorks UK

August 2011 - (Free Research)
Why are information security issues so persistent? Why does it feel like we win small battles, yet the war keeps escalating? What does the next 20 years look like? Erik Petersen, Vice President of Security and Risk Consulting at Dell SecureWorks discuss micro and macro-economic theory to grapple with the core questions of “why.” 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Tripwire Log Center Product Brief by Tripwire, Inc.

October 2012 - (Free Research)
Consult this informative white paper to learn how log management is helping to better identify threats and deploy security information and event management systems (SIEM). Learn how you can uncover suspicious activities and improve security by reading this asset now. 
(WHITE PAPER) READ ABSTRACT |

A Pragmatic Approach to SIEM: Buy for Compliance, Use for Security by Tripwire, Inc.

October 2012 - (Free Research)
Consult this informative white paper so you can gain a better understanding of the definition of SIEM and log management tools and what they can do for you. Find out more about the features of SIEM and what you should look for when selecting a product. 
(WHITE PAPER) READ ABSTRACT |

EMA Analyst Report on the Mobile Device Management Marketspace by IBM

August 2012 - (Free Research)
Consult this informative white paper to gain better understanding of mobile device management with traditional desktop management capabilities. Use a consolidated endpoint management experience that can meet all enterprise challenges. 
(WHITE PAPER) READ ABSTRACT |

Total Cost Comparison of Backup Technologies: IT Decision-Maker Perspectives on NetApp SnapVault Disk-to-Disk versus Traditional Tape-Based Backup Solutions by NetApp

January 2009 - (Free Research)
Download this exclusive article to gain insight on why a NetApp SnapVault backup system is 54% less expensive than a similar tape-based backup solution over a typical backup product lifecycle. 
(WHITE PAPER) READ ABSTRACT |

Industry Analyst Reports - Getting in Front of IT Compliance and Risk Management by CA Technologies.

July 2010 - (Free Research)
Read this Forrester Consulting analyst report to find out about the trends in managing IT compliance and risk. This report discusses the result of an evaluation conducted by Forrester for CA Technologies. 
(ANALYST REPORT) READ ABSTRACT |

The trust advantage: How to win at big data by ComputerWeekly.com

November 2013 - (Free Research)
Without consumer trust, most of the trillions of dollars of social and economic value promised from big data will go to waste, this report from The Boston Consulting Group reveals. 
(ANALYST REPORT) READ ABSTRACT |

Ixia ControlTower Architecture by Ixia

May 2013 - (Free Research)
As networks grow in size and complexity, the need for visibilty becomes even more essential. Consult this resource to learn more about how you can increase scale, flexible deployments and the need for application and security monitoring in the network. 
(WHITE PAPER) READ ABSTRACT |

JBoss Enterprise Middleware Cloud Services: Ensuring Optimal Deployments of JBoss Solutions in the Cloud by Red Hat and JBoss

February 2011 - (Free Research)
Delivered by the Red Hat’s Consulting middleware practice, this paper provides strategic recommendations and on-site technical expertise to set up middleware as a service in your cloud environment. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 496 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts