Control StudyWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Control Study returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Security Policies
 •   Access Control
 •   Security Monitoring
 •   Application Security
 •   Business Process Management (BPM)
 •   Network Security
 •   Endpoint Security
 •   Virtualization
 •   Enterprise Content Management (ECM)

Related Searches
 •   Buying Control Study
 •   Control Conversion
 •   Control Diagrams
 •   Control Study Communication
 •   Control Study Flowchart
 •   Control Study Packages
 •   Markets Control Study
 •   Media Control
 •   Notes Control Study
 •   Problems Control Study
Advertisement

ALL RESULTS
1 - 25 of 459 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

The Total Economic Impact of Lumension Security's Sanctuary by Lumension

September 2007 - (Free Research)
Lumension&#39s Sanctuary Application and Device Control is an IT-driven solution that automatically enforces endpoint security policies. The financial impact of moving from a &#34voluntary&#34 compliance solution to an &#34automatic&#34 one is illustrated 
(WHITE PAPER) READ ABSTRACT |

On Lockdown: HMV/Waterstone’s asserts control over user activity by Safestone Technologies

September 2011 - (Free Research)
Download this case study to discover how, by deploying Safestone’s DetectIT solution, the organization can now granularly control access to areas their systems and meet their compliance requirements. 
(CASE STUDY) READ ABSTRACT |

Reliability Analysis of the APC Symmetra MW Power System by APC by Schneider Electric

January 2010 - (Free Research)
MTechnology, Inc. (MTech) performed a quantitative reliability analysis of the APC Symmetra MW UPS. The study used techniques of Probabilistic Risk Assessment (PRA) to calculate the likelihood of over 680,000 potential failure modes. 
(WHITE PAPER) READ ABSTRACT |

The Total Economic Impact of Lumension Security’s Sanctuary Application And Device Control by Lumension

September 2012 - (Free Research)
Consult this study to find out more about the financial impact of moving from "voluntary" compliance solution to an IT-driven solution that automatically enforces endpoint security policies. Read in-depth interviews with John C. Lincoln hospitals to see the benefits first-hand. 
(WHITE PAPER) READ ABSTRACT |

VMworld Europe Case Study: DER Deutsches Reisebüro by ComputerWeekly.com

November 2012 - (Free Research)
A Germany travel agent gained control of its IT and increased its profits after implementing a desk top virtualisation project. 
(CASE STUDY) READ ABSTRACT |

Case Study: Globalscape® WAFS Expands the Panama Canal by GlobalScape

December 2013 - (Free Research)
This case study reveals a wide area file services solution that the engineering firms working on the Panama Canal expansion chose to securely exchange large files and collaborate efficiently. 
(CASE STUDY) READ ABSTRACT |

Automate Spending Controls for Big Savings, a Case Study by ExpenseWatch.com

March 2008 - (Free Research)
In this case study, learn how one company automated company expense reporting, saving thousands of dollars a year and accelerating the review and approval process. 
(CASE STUDY) READ ABSTRACT |

Case Study: Compliant and In Control: Sysmex America Tackles J-SOX with Security Weaver by Security Weaver

November 2010 - (Free Research)
In January 2008 Sysmex America deployed SAP for financial processes. While SAP access lets employees streamline workflow, it also created a potential SOD problem. Learn how Security Weaver has allowed better control of user access to its financial system, clearer role definitions, and a clear, accurate data trail suitable for any possible audit. 
(CASE STUDY) READ ABSTRACT |

The State of System i Security 2008 by PowerTech

August 2008 - (Free Research)
This paper explains a number of common security exposures and configuration management practices that must be mitigated in order to protect the data that resides on the System i. 
(WHITE PAPER) READ ABSTRACT |

Case Study: SSB Wind Systems, End-To-End Service Mitigates Information Risks by Iron Mountain

December 2012 - (Free Research)
This short white paper discusses how one organisation transformed its data and records management processes through end-to-end off-site data protection and records management services. 
(CASE STUDY) READ ABSTRACT |

The Global CFO Study 2008 by IBM Line of Business

October 2007 - (Free Research)
This study, conducted in cooperation with Wharton Business School and the Economist Intelligence Unit, explores how CFOs can help balance risk and performance in a rapidly changing business climate. 
(WHITE PAPER)

After a Thorough Search and Exhaustive Testing of Device Control Solutions, Greenwood Academies Trust Chooses Lumension® by Lumension

October 2013 - (Free Research)
This case study focuses on one organization that implemented device control to better manage its sensitive data across all endpoints and removable devices without any worry. 
(WHITE PAPER) READ ABSTRACT |

PhoneFactor Case Study: Fredrikson & Byron, P.A. by PhoneFactor

April 2013 - (Free Research)
Discover how phone-based authentication helped a global law firm ensure that their on-the-go attorneys received secure access to client data and communications without compromising the safety of the confidential information. 
(CASE STUDY) READ ABSTRACT |

Automotive Dealership Takes Control and Enhances Employee Productivity with NETGEAR® UTM Appliances by NETGEAR Inc.

May 2011 - (Free Research)
Find out how Netgears UTM appliance helped an auto dealership solve all their network security issues. 
(CASE STUDY) READ ABSTRACT |

Managing Paper Patient Records In a Clinical Practice by Nuance

October 2011 - (Free Research)
Read this study conducted by Nuance Communications to better understand the bottlenecks and issues that arise from using paper documents in the health care field and how electronic document management can greatly eliminate these issues. 
(WHITE PAPER) READ ABSTRACT |

Data Center Facilities IT Handbook: Mastering data center climate control by Dell, Inc. and Intel®

May 2009 - (Free Research)
This SearchDataCenter.com eBook takes a look at how to master the climate control for the data center. Organizations are creating more heat in smaller places which in turn requires efficient and effective climate control. Read this paper to learn more about how to properly cool your data center. 
(EBOOK)

Consolidating Service Provider Points of Presence Using Virtualization to Optimize and Consolidate Networks by Juniper Networks, Inc.

March 2010 - (Free Research)
This white paper outlines the challenges that service providers are facing in the points of presence (POP), and presents the results of the NSP study quantifying the operational and capital savings possible through POP consolidation with virtualization. Read this white paper to learn how to improve the efficiency of POPs through virtualization. 
(WHITE PAPER) READ ABSTRACT |

Case Study: Bellevue School District by Websense, Inc.

November 2008 - (Free Research)
Read this case study to learn how the Bellevue School District dramatically improved their web security and productivity by extending their security policy management and administrator controls to additional IT staff members. 
(CASE STUDY) READ ABSTRACT |

RocketSpace case study by Dell Software

August 2012 - (Free Research)
In this case study, see how RocketSpace got both high security and high performance with Dell™ SonicWALL™ E-Class Network Security Appliance (NSA) E5500 Next-Generation Firewall with application intelligence, control and visualization. 
(CASE STUDY) READ ABSTRACT |

Midway Independent School District Case Study: Power to the Teachers by Dell, Inc.

February 2010 - (Free Research)
Midway Independent School District sought to gain control over server sprawl and implement a consolidated solution for growth. Read this case study to learn how Dell servers, storage and Intel technology provided a firm foundation for education applications, growth and 50% power and cooling savings. 
(CASE STUDY) READ ABSTRACT |

Using Informatica to Improve Data Management, Increase User Productivity, and Reduce Costs: A Case Study of AT&T by Informatica

May 2010 - (Free Research)
Read this paper to learn how AT&T utilized Informatica Data Archive to bring its database growth under control and improve application performance by reducing the amount of total storage required as well as trimming the amount of time required to load and back up its application data sets. 
(CASE STUDY) READ ABSTRACT |

Microsoft Dynamics ERP Case Study: Premium Specialty Coffee Roaster and Distributor Manages Growth with Outstanding Quality by Microsoft

August 2010 - (Free Research)
Read this case study to learn how Peet’s wanted to ensure best product quality while continuing to grow; make business technology more scalable, reliable, and manageable; and be more effective in taking control of the business. 
(CASE STUDY) READ ABSTRACT |

The Total Economic Impact of WANdisco SVN MultiSite by WANdisco (E-mail this company)

July 2013 - (Free Research)
This Forrester Total Economic Impact™ report unveils how one solution provides LAN-speed collaboration between distributed teams, giving them the feeling that they're all working in the same room. View now to uncover how this solution helped one global software engineering company enjoy a 357% ROI with a payback period of less than two months. 
(WHITE PAPER) READ ABSTRACT |

Case Study: Leading Bank Reels in Data Center Management by nlyte Software

February 2013 - (Free Research)
This case study covers a banking industry leader that had a data center that was spiraling out of control and details the solution they went with to ease management. 
(CASE STUDY) READ ABSTRACT |

Ponemon Study: The State of Advanced Persistent Threats by Trusteer

December 2013 - (Free Research)
Enterprises are unprepared to deal with APT attacks. According to a new Ponemon Institute study, APTs are changing the threat landscape, rendering current security controls ineffective. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 459 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts