Container Security InitiativeWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Container Security Initiative returned the following results.
RSS What is RSS?
Related Categories

 •   Virtualization
 •   Data Security
 •   Data and Application Distribution
 •   Network Security
 •   Application Management and Maintenance
 •   Application Security
 •   Enterprise Systems Management
 •   Endpoint Security
 •   Security Monitoring
 •   Data Center Management

Related Searches
 •   Container Security Initiative Cycle
 •   Container Security Initiative Import
 •   Container Security Initiative Indiana
 •   Container Security Oregon
 •   Container Security Samples
 •   Facts Container
 •   Maintain Container
 •   Reservation Container
 •   Standard Container
Advertisement

ALL RESULTS
1 - 25 of 469 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Consolidating Applications with Oracle Solaris Containers by Oracle Corporation

May 03, 2010 - (Free Research)
Oracle Solaris Containers implement OS virtualization using containers that are designed to provide a complete, isolated, secure runtime environment for applications—and in situations where resources can be managed with sub-CPU granularity. 
(WHITE PAPER) READ ABSTRACT |

Consolidating Applications with Oracle Solaris Containers by Oracle Corporation UK Ltd

May 01, 2010 - (Free Research)
The goal of this white paper is to provide information about consolidating applications onto a single server using Oracle Solaris Containers to isolate applications and efficiently manage system resources between them. 
(WHITE PAPER) READ ABSTRACT |

Successfully Scanning Shipping Container Codes by Intermec

August 13, 2013 - (Free Research)
Read this case study to learn how a large European shipping company integrated an Intermec Imaging Solution to resolve issues associated with their manual recording process of container codes and estimates considerable man-hour savings and improved container code recording accuracy. 
(CASE STUDY) READ ABSTRACT |

Mobile Data Security Finding the Balance by IBM

April 30, 2013 - (Free Research)
Access this white paper to learn how to develop a secure mobile strategy that not only protects business data, but keeps the user experience simple and efficient. 
(WHITE PAPER) READ ABSTRACT |

McAfee Enterprise Mobility Management platform by McAfee, Inc.

May 30, 2013 - (Free Research)
Learn how you can say "yes" to mobile productivity while still protecting your most valuable company data and assets. Learn how you can properly secure today's next-generation endpoint for business - the mobile device - with comprehensive authentication and encryption enforcement, remote device locking, secure containers, and more. 
(WHITE PAPER) READ ABSTRACT |

The Future of Desktop Computing: Preparing for effective desktop delivery in the post PC-era by SearchDataCenter.com

July 16, 2013 - (Free Research)
Leading industry experts Gabe Knuth and Brian Madden dig into the real future of the desktop. Gain insight into the challenges Windows 8 presents in end user satisfaction, what our future desktops will look like, and how the consumerization of IT will blur the lines for desktop admins. 
(EGUIDE) READ ABSTRACT |

Minimizing Downtime in SAP Environments by Sun Microsystems, Inc.

October 2008 - (Free Research)
Learn how to use standard features of Solaris 10, Containers and Zones and ZFS to optimize your SAP data centre, virtualize your infrastructure and drive down cost and raise flexibility. 
(WHITE PAPER) READ ABSTRACT |

Smart enterprise mobility solutions are powered by Smart Containerization™ by CA Technologies.

June 2014 - (Free Research)
This informative white paper examines a technique called containerization, which allows you to keep enterprise data segregated in its own "container" so that you can apply security policies without affecting any data that isn't work related. 
(WHITE PAPER) READ ABSTRACT |

June Information Security Magazine by SearchSecurity.com

June 2013 - (Free Research)
Mobile device management (MDM) continues to grow at a feverish pace, both in terms of adoption and mobile security features. Our June cover story provides insight into adoption trends, cross-industry issues, and MDM solutions best fit to varying requirements. We also look at big data analytics and security and provide an update on FedRAMP. 
(EZINE) READ ABSTRACT |

Trusted Computing: Establishing Device Authentication by Wave Systems Corp.

August 2010 - (Free Research)
View this video to learn the secret to better IT security may be at your fingertips. More likely than not, your PC contains a Trusted Platform Module (TPM), security chip on its motherboard. 
(VIDEOCAST) READ ABSTRACT |

Dynamic Virtual Clients by Intel

November 2009 - (Free Research)
In this video, Dave Buchholz and Clyde Hedrick explain how Intel IT is considering implementing Dynamic Virtual Client (DVC) technology that will provide a more robust and flexible platform that users want and that the enterprise needs. 
(VIDEO)

Solaris 10 Operating System Innovation Matters-Increase Business Efficiency and Lower Costs by Sun Microsystems, Inc.

December 2008 - (Free Research)
The Solaris OS is the strategic platform for today's demanding enterprise and is the only open operating system that has delivered proven results, running everything from mission-critical enterprise databases to high performance Web farms. 
(WHITE PAPER) READ ABSTRACT |

Storage Europe: December 2011 by SearchStorage.com

December 2011 - (Free Research)
Object-based storage dispenses with the hierarchical file system, so there are no nested subfolders. Instead, it uses an indexed flatfile structure in which each object is given a unique ID. This issue of IT in Europe includes case studies of how object-based storage products are being implemented in Europe. 
(EZINE) READ ABSTRACT |

OpenBench Labs Analysis: Maximize Storage Utilization and Network Bandwidth Automating Virtual System Backup by CommVault Systems, Inc.

February 2010 - (Free Research)
Simpana® from CommVault® enables IT to leverage a single solution that integrates backup, archive, replication and storage resource management across physical and virtual servers. Simpana helps IT deal with the challenges associated with critical backup recovery issues within a virtual infrastructure. 
(WHITE PAPER)

Client Computing with Virtual User Environment by Intel Corporation

November 2008 - (Free Research)
Intel IT developed a new computing approach that combines multiple emerging technologies, including client virtualization and streaming, to potentially transform the way we deliver computing to users. 
(WHITE PAPER)

Updating Rules for COBOL Generated Code to Use CICS Channels and Containers by IBM

July 2011 - (Free Research)
An organization’s success depends largely upon its ability to respond quickly to today’s complex, ever changing markets and regulatory climate. Read this publication to learn more about IBM WebSphere ILOG Rules for COBOL. 
(WHITE PAPER) READ ABSTRACT |

Updating Rules for COBOL Generated Code to Use CICS Channels and Containers by IBM

December 2010 - (Free Research)
Businesses today need a Business Rule Management Systems (BRMS) solution that supports business changes and cycles far more effectively than traditional methods and takes direct advantage of business expertise. This IBM Redpaper™ publication is intended for anyone who is interested in learning more about IBM WebSphere ILOG Rules for COBOL. 
(WHITE PAPER) READ ABSTRACT |

Musings on datacentres by ComputerWeekly.com

March 2013 - (Free Research)
Analyst Clive Longbottom discusses the key issues in managing and designing data centres. 
(ANALYST REPORT) READ ABSTRACT |

Open Source Enterprise Application Platforms for Developers: How lightweight and fast are they? by Red Hat

December 2013 - (Free Research)
JBoss Modules is a modular class loading and execution environment. It is not a container; it is a wrapper. It is small, lightweight, and efficient. But, how? Access this white paper today to get the details that explain what these benefits really entail. 
(WHITE PAPER) READ ABSTRACT |

A New Generation of PaaS by Red Hat

September 2013 - (Free Research)
The Platform-as-a-Service (PaaS) market is evolving into more than just application container services, but traditionally, PaaS hasn't offered support for complex apps distributed across disparate infrastructures -- until now. 
(WHITE PAPER) READ ABSTRACT |

Fulfilling the Lean Software Promise: Building and Running Spring Applications on VMware vFabric tc Server by VMware, Inc.

February 2012 - (Free Research)
Lean software development and deployment should figure prominently in every organization’s IT strategy. The growing pervasiveness of virtual and cloud environments makes the need even more urgent.  Read this paper to learn why your peers are replacing JEE containers with lean, lightweight application servers - and what you can gain from the move. 
(WHITE PAPER) READ ABSTRACT |

Fulfilling the Lean Software Promise: Building and Running Spring Applications on VMware vFabric tc Server™ by VMware, Inc.

March 2011 - (Free Research)
Java developers by the millions have discarded bloated JEE containers in favor of lean software platforms. The choice of a large majority of Java developers today, these lightweight frameworks and application servers harmonize development with IT operations. Continue reading to learn more. 
(WHITE PAPER) READ ABSTRACT |

Enterprise Grid Solutions from Sun and Oracle: Taking IT to a Higher Level by Sun Microsystems, Inc.

November 2009 - (Free Research)
If you're already running your business on an enterprise grid—good. And if you're running on Sun and Oracle—even better. But if you want to maximize the advantages of your grid, it's time to upgrade to the latest generation of enterprise grid computing products from Sun and Oracle. 
(ARTICLE) READ ABSTRACT |

Understanding Desktop Virtualization by Intel

September 2011 - (Free Research)
This white paper describes the variety of desktop virtualization models available, how each works, and the advantages and limitations of each model for key vectors such as security, manageability, and power consumption. Also identified are the major providers of software solutions and the end-point devices to deploy each model. 
(WHITE PAPER) READ ABSTRACT |

Sustainability: A Green Model for Data Governance by Baseline Consulting

August 2009 - (Free Research)
An effective governance program will determine what kinds of data are inputs, outputs or byproducts, and will enable the company to quickly distinguish and process data elements accordingly. Read this paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 469 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts