Controls WhitepaperWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Controls Whitepaper returned the following results.
RSS What is RSS?
Related Categories

 •   Network Security
 •   Data Security
 •   Application Security
 •   Endpoint Security
 •   Managed Security Services
 •   Wireless Security
 •   Business Intelligence Solutions
 •   Network Management
 •   Security Monitoring
 •   Unified Communications / Voice & Data Convergence

Related Searches
 •   Capacity Controls Whitepaper
 •   Controls Experts
 •   Controls Practice
 •   Controls Technical
 •   Controls Whitepaper Integrated
 •   Controls Whitepaper Resource
 •   Controls Whitepaper Strategy
 •   Matrix Controls
 •   Outsourcing Controls
 •   Security Controls Whitepaper
Advertisement

ALL RESULTS
1 - 25 of 462 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Whitepaper: Control Application Data Growth Before It Controls Your Business by IBM

December 2008 - (Free Research)
Businesses rely on ERP and CRM applications which collects information from a variety of sources to support business operations. This paper describes some ways organizations can address data growth issues through the power of enterprise data managemt. 
(WHITE PAPER) READ ABSTRACT |

Why Choice and Control are Critical to a Successful Cloud Strategy by IBM

June 2012 - (Free Research)
This exclusive whitepaper details the importance of a cloud approach that emphasizes choice and control. 
(WHITE PAPER) READ ABSTRACT |

Optimized Energy Efficiency with Controlled Cold Aisle Containments by Emerson Network Power

May 2014 - (Free Research)
This whitepaper explains why control via temperature may be a considerably better option over pressure control when it comes to increasing power usage efficiency, creating reliability and reducing the impact on IT equipment. 
(WHITE PAPER) READ ABSTRACT |

Running A Fully Controlled Windows Desktop Environment with Application Whitelisting by Bit9, Inc.

June 2009 - (Free Research)
Getting control over desktop PCs is fast becoming a major strategic objective of CIOs and IT departments. This whitepaper will discuss “The Five Elements of Desktop Control” and how each are required in order to fully realize the benefits of a controlled environment. 
(WHITE PAPER) READ ABSTRACT |

Web Content Control: Five Steps to a Successful Implementation by Untangle, Inc.

October 2009 - (Free Research)
Implementing Web Content Control can seem intimidating. It represents the uneasy marriage of network administration and human resource management. With a little forethought, however, it becomes straightforward and very effective. Read this whitepaper for a step-by-step overview of a successful web content control implementation. 
(WHITE PAPER) READ ABSTRACT |

Access Certification: Addressing and Building on a Critical Security Control by Oracle Corporation

January 2010 - (Free Research)
This white paper discusses the forces driving security controls related to access and how to use automated access certification processes to address these critical issues. The detailed whitepaper walks thorugh the key components of an enterprise-grade access certification solution and highlights the results achieved by customers. 
(WHITE PAPER) READ ABSTRACT |

Demystifying Switch-based ACLs by Global Knowledge

February 2013 - (Free Research)
This whitepaper aims to help you better understand switch-based Access Control Lists (ACLs) by exploring what they are used for and how to best utilize them on IOS-based Catalyst devices. View now to learn more! 
(WHITE PAPER) READ ABSTRACT |

Configuration Audit and Control: 10 Critical Factors to Change and Configuration Management Success by Tripwire, Inc.

October 2008 - (Free Research)
As businesses have instituted internal, industry, and government mandated regulatory compliance, the need for audit data to prove conformity has also become a necessity. Read this white paper to learn how configuration audit and control provides a single, independent source for enforcing and reporting on a change policy across an organization. 
(WHITE PAPER) READ ABSTRACT |

Continuous Quality Assurance whitepaper by Micro Focus

June 2012 - (Free Research)
<p>Read this white paper to learn how a continuous quality assurance approach focusing on requirements, change, and test management can help provide the visibility, control and validation to efficiently deliver quality software.</p> 
(WHITE PAPER) READ ABSTRACT |

Beyond Passwords: Protect the mobile enterprise with smarter security solutions by IBM

September 2013 - (Free Research)
This whitepaper examines the major challenges of providing secure access in mobile environments and explores new security models, policies and controls that can help keep critical apps and data secure. 
(WHITE PAPER) READ ABSTRACT |

Accellion vs Box: 5 Key Reasons Enterprises Select Accellion by Accellion, Inc.

April 2014 - (Free Research)
Read this whitepaper to learn how Accellion's private cloud answers the need for a mobile, scalable, flexible file sharing solution that extends and reinforces enterprise security policies and controls. 
(WHITE PAPER) READ ABSTRACT |

Create Unified Management From a Single Control Point Virtualization and Cloud Management by HP and Intel

August 2013 - (Free Research)
This whitepaper covers the importance and difference management makes in cloud and virtual environments and offers a solution that will provide open management. 
(WHITE PAPER) READ ABSTRACT |

Unified Communication Manager - Class of Service by Global Knowledge

February 2013 - (Free Research)
This whitepaper unveils how Class of Service within Cisco's Unified Communication Manager can help you control which phone numbers can be called by particular devices. View now to learn how this simple, flexible solution can be effective in numerous situations. 
(WHITE PAPER) READ ABSTRACT |

Business Activity Monitoring: Process Control for the Enterprise by SL Corporation

May 2008 - (Free Research)
This whitepaper discusses how lessons can be taken from traditional process monitoring applications and applied in today's more complex multi-dimensional environments. 
(WHITE PAPER) READ ABSTRACT |

No Silver Bullet: Eight Ways Malware Defeats Strong Security Controls by IBM

December 2013 - (Free Research)
This whitepaper explores 8 ways malware can defeat your security strategy and outlines some key techniques for preventing these intrusions. 
(WHITE PAPER) READ ABSTRACT |

Smart Strategies for Securing Extranet Access by Oracle Corporation

March 2010 - (Free Research)
Download this whitepaper to learn how you can mitigate risk, improve extranet security, streamline compliance and enable your organization to boost its bottom-line by taking advantage of advanced access management technologies. 
(WHITE PAPER) READ ABSTRACT |

The ClearPass Access Management System by Aruba Networks

May 2013 - (Free Research)
This whitepaper describes a way that you can take back control of your company network without having to string together a multitude of loosely integrated point-products that only lead to more complexity. Read on and learn how you can manage all things BYOD from one place. 
(WHITE PAPER) READ ABSTRACT |

Desktop Virtualization Solutions Introduction to the Dell DVS Enterprise Solution by Dell and Microsoft

December 2013 - (Free Research)
This whitepaper examines a tested methodology that can be used to enable a “capable” architecture that maximizes IT control while optimizing the end-user experience. 
(WHITE PAPER) READ ABSTRACT |

Single Point of Access, Single Point of Control by Citrix

January 2014 - (Free Research)
Read on to learn how desktop virtualization can help support remote connectivity better than VPN. 
(WHITE PAPER) READ ABSTRACT |

Next-generation firewalls and your security strategy by Cisco (E-mail this company)

April 2013 - (Free Research)
This whitepaper addresses the blurred lines between business and pleasure created by today's mobile trends and offers a new strategy to deal with it. 
(WHITE PAPER) READ ABSTRACT |

Simplify, Automate and Optimize Management of Your Storage Infrastructure by IBM

February 2014 - (Free Research)
This whitepaper discusses a system that helps to increase visibility, control and automation for data and storage infrastructures without the use of various, multi-vendor solutions. 
(WHITE PAPER) READ ABSTRACT |

Strategies for Secure Virtual Desktop Infrastructure by Citrix Systems, Inc. (E-mail this company)

October 2013 - (Free Research)
Learn how by integrating an extensive set of network and application-layer protection mechanisms, advanced access and action control capabilities, deep visibility, and other key capabilities can help you deliver the security and available you need to be successful with VDI. 
(WHITE PAPER) READ ABSTRACT |

The Data Center Dilemma: Controlling Costs While Managing Risk by Emerson Network Power

July 2010 - (Free Research)
The escalation in data center costs has been driven by the demand for computing. IT has responded to this demand by adding more servers and replacing older servers with newer devices that deliver more power in less space. Read this whitepaper to learn more. 
(WHITE PAPER) READ ABSTRACT |

Mastering Exchange Migrations: Controlling the Top Ten Critical Issues by Dell Software

May 2013 - (Free Research)
This whitepaper details the top 10 Microsoft Exchange migration pain points and how you can avoid them. 
(WHITE PAPER) READ ABSTRACT |

Enterprise Grade Management for OpenStack by Red Hat

April 2013 - (Free Research)
This whitepaper details a set of management and automation tools that will help IT handle the added challenges of hybrid cloud computing service models. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 462 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts