Controls What IsWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Controls What Is returned the following results.
RSS What is RSS?
Related Categories

 •   Data Center Management
 •   Network Management
 •   Storage Management
 •   Virtualization
 •   Data Security
 •   Authentication / Password Management
 •   Security Policies
 •   Networks
 •   Network Security
 •   Storage Security

Related Searches
 •   Controls Search
 •   Controls What Improvement
 •   Controls What Is Example
 •   Controls What Is Missouri
 •   Controls What Parts
 •   Designs Controls What
 •   Finds Controls What Is
 •   Latest Controls What Is
 •   Network Controls
 •   Supplier Controls What
Advertisement

ALL RESULTS
1 - 25 of 479 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Exchange Insider E-Zine Volume 9: Exchange Server: To Host or Not to Host? by SearchExchange.com

April 27, 2011 - (Free Research)
Some applications are a natural fit for the cloud; some are better kept within your administrators’ control. What about Exchange Server? Volume 9 of the Exchange Insider E-zine outlines the pros, cons and costs of running Exchange Server in-house and in the cloud. 
(EZINE)

Protecting the Network Perimeter: Controlling what gets through—into and out of your organization by McAfee.

February 01, 2012 - (Free Research)
The traffic allowed to flow through the network perimeter – both good and bad – can determine the success or potential downfall of an organisation. View this paper to explore how McAfee can help protect network perimeters with a solution that enables organisations to easily, effectively, and securely manage traffic flow. 
(WHITE PAPER) READ ABSTRACT |

Top Eight Do's and Don'ts of Managing Access Control in the Windows/AD Environment by Dell Software

October 02, 2009 - (Free Research)
This tech brief presents eight recommendations to help you proactively address the difficulties of access control in a Microsoft-centric environment, and avoid the common pitfalls, risks and costs. 
(WHITE PAPER) READ ABSTRACT |

HP Bring your own device to Healthcare by HP & Intel®

June 19, 2012 - (Free Research)
This white paper offers valuable insight for health care providers looking to harness the potential of BYOD initiatives by allowing caregivers and administrators to use their own mobile devices in a way that is secure and operationally efficient. 
(WHITE PAPER) READ ABSTRACT |

A More Secure Front Door: SSO and Strong Authentication by Imprivata

February 10, 2011 - (Free Research)
Times change. Sometimes they change even faster than we might expect, as recent developments in Strong Authentication have shown. Just a few years ago, the idea of requiring users to provide a second form of identity to gain access to IT resources was seen by many as only necessary for remote access security or top-secret jobs. 
(WHITE PAPER) READ ABSTRACT |

All-in-one Email Security Reduces Spam and IT Administration Time by Sunbelt Software

August 2008 - (Free Research)
After using an earlier version of Sunbelt’s enterprise anti-spam solution, Roberts Wesleyan College reviewed a number of software solutions and found Ninja to be the best product at the best price. 
(CASE STUDY) READ ABSTRACT |

Multi-Step Authentication and Why You Should Use It by Global Knowledge

August 2013 - (Free Research)
Authentication is one of the essential components of security. It is one part of the concept known as authentication, authorization, and accounting (AAA). All three of these should be addressed when constructing a system in order to have a reasonable foundation for reliable security. 
(WHITE PAPER) READ ABSTRACT |

Avaya Aura Communication Manager COR/FRL/AAR Simplified by Global Knowledge

March 2014 - (Free Research)
This white paper provides a useful list of Avaya Site Administration commands that will allow you to control what kind of calls employees are authorized to make and ensure least cost routing of outbound calls to keep phone bills down. 
(WHITE PAPER) READ ABSTRACT |

Implementing a Telecommuting Program by Avaya Inc.

January 2008 - (Free Research)
This paper discusses several issues related to implementing a telecommuting home worker program for contact center agents. Certainly, the particular requirements of each company will dictate the extent to which these and other concepts are implemented. 
(WHITE PAPER) READ ABSTRACT |

The State of Privacy and Data Security Compliance by Sophos, Inc.

November 2009 - (Free Research)
The purpose of the study is to determine if various international, federal and state data security laws improve an organization’s security posture. What is the value of compliance and does it correlate with the value of the compliance effort? Read on to find out. 
(ANALYST REPORT) READ ABSTRACT |

Cloud Adoption from Development to the Data Center by Dell, Inc.

June 2013 - (Free Research)
This infographic answers some key questions about cloud computing. 
(WHITE PAPER) READ ABSTRACT |

Understanding the Advantages of Hybrid Clouds by Brocade

July 2011 - (Free Research)
Access this brief Q&A to learn more about hybrid clouds and the advantages they can bring to your organization. 
(WHITE PAPER) READ ABSTRACT |

Tip Guide: Big Data: Giant Wave or Huge Precipice? by SAP America, Inc.

November 2011 - (Free Research)
In this tip guide, industry expert Barry Devlin will explore what exactly big data is and where it comes from. 
(EGUIDE) READ ABSTRACT |

Security Threat Report: 2010 by Sophos, Inc.

March 2010 - (Free Research)
The first decade of the 21st century saw a dramatic change in the nature of cybercrime. Hackers have evolved from teenage boys spreading graffiti for kicks and notoriety to organized, financially motivated gangs. Read this white paper for a better understanding of the history of malware and learn to craft a better, safer future for internet users. 
(WHITE PAPER) READ ABSTRACT |

Dedupe Simply – Presentation transcript by EMC Backup and Recovery Solutions

September 2009 - (Free Research)
Please read this presentation transcript in which Brian Biles, VP of Product Management and the Co-founder of Data Domain, discusses data deduplication. And, why is it important? What exactly is it? What are the things that make different implementations different? Learn the questions you should be asking. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Chapter 1: What is Private Cloud? by Dell, Inc.

June 2013 - (Free Research)
Download part one in this four-part expert series to access an outline of the basics in private cloud computing detailing the key characteristics, long-term vision and c-level elevator pitch for the private cloud. 
(EBOOK) READ ABSTRACT |

Managing Today's Data Centers: Avoiding the Impending Crisis by Aperture - An Emerson Network Brand

February 2008 - (Free Research)
High-density equipment has created significant benefits for organizations. However, there are challenges with high-density that could negatively impact organizations. Download this paper for a look at challenges and key issues facing organizations. 
(WHITE PAPER) READ ABSTRACT |

LTO Tape Technology Continues to Evolve with LTO-5 by Overland Storage

May 2010 - (Free Research)
Read this FAQ featuring W. Curtis Preston, which outlines how Linear Tape-Open (LTO) tape differs from other tape media, the various generations of LTO and the pros and cons of this backup technology. Also learn about the newest model, LTO-5, being released this year. 
(WHITE PAPER) READ ABSTRACT |

Best Practices: Enterprise SATA Deployment with High Performance and Reliability by DataDirect Networks

February 2008 - (Free Research)
Across many organizations, the rapid growth of data is outpacing storage budgets. SATA disk based archive storage is the perfect solution. Download this white paper to learn more about disk based archive storage and see if it will work for you. 
(WHITE PAPER) READ ABSTRACT |

What Are Your Obligations to Retain Email and Other Electronic Content? by EMC Backup and Recovery Solutions

March 2011 - (Free Research)
This white paper discusses what drives organizations in heavily regulated and less regulated industries to retain email and other electronic content. It explores the content retention challenges faced by those organizations in the midst of stringent litigation and regulatory compliance demands. Also provided with this paper is an overview of EMC. 
(WHITE PAPER) READ ABSTRACT |

ESG Report: Data De-duplication and Disk-to-Disk Backup Systems: Technical and Business Considerations by EMC Backup and Recovery Solutions

April 2009 - (Free Research)
Data de-duplication offers landscape changing value that is easy to quantify, improves reliability, simplifies management and provides rapid recovery of data. Read this ESG report to learn more about it. 
(WHITE PAPER) READ ABSTRACT |

Cloud Services: What Are They, What Value Do They Provide? by AT&T Corp

August 2010 - (Free Research)
AT&T defines the cloud as a way for enterprises to quickly and easily tap computing, storage, software, development and network resources on demand. The model offloads the capex burden from enterprise budgets and moves it into a "pay-as-you-use" service model, reducing overall IT spend and service commitment terms.<!-- /Executive Summary --> 
(WHITE PAPER)

What is FakeAV? by Sophos, Inc.

May 2010 - (Free Research)
FakeAV, or Fake AntiVirus, is a class of malware that display false alert messages concerning threats that do not really exist. The alerts prompt users to visit a website where they will be asked to pay for these non-existent threats to be cleaned up. Read on to learn where FakeAV comes from, how they act, and how to protect yourself. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: What is End-to-End Application Performance Management? by Compuware Corporation

August 2009 - (Free Research)
It's a top priority to keep your applications running and end users happy. Discover how application performance management can help you quickly dive into the root causes of problems, before they negatively affect your network and users. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

E-Guide: What are 'Zero Clients,' and How are They Different from Thin Clients? by Dell, Inc.

January 2013 - (Free Research)
In this critical guide, desktop virtualization guru Brian Madden takes a look at "zero clients", pointing out the key differences between them and thin clients. Read on and learn how this solution can simplify the management of your virtual desktop infrastructure. 
(EGUIDE) READ ABSTRACT |

1 - 25 of 479 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts