Controls WhitepaperWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Controls Whitepaper returned the following results.
RSS What is RSS?
Related Categories

 •   Network Security
 •   Data Security
 •   Application Security
 •   Security Monitoring
 •   Endpoint Security
 •   Managed Security Services
 •   Network Management
 •   Virtualization
 •   Wireless Security
 •   Business Intelligence Solutions

Related Searches
 •   Controls Whitepaper Expert
 •   Controls Whitepaper Record
 •   Controls Whitepaper Security
 •   Controls Whitepaper Unix
 •   Indian Controls Whitepaper
 •   Manuals Controls Whitepaper
 •   Publishing Controls
 •   Sheets Controls Whitepaper
 •   Study Controls
 •   Support Controls Whitepaper
Advertisement

ALL RESULTS
1 - 25 of 471 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Whitepaper: Control Application Data Growth Before It Controls Your Business by IBM

December 2008 - (Free Research)
Businesses rely on ERP and CRM applications which collects information from a variety of sources to support business operations. This paper describes some ways organizations can address data growth issues through the power of enterprise data managemt. 
(WHITE PAPER) READ ABSTRACT |

Running A Fully Controlled Windows Desktop Environment with Application Whitelisting by Bit9, Inc.

June 2009 - (Free Research)
Getting control over desktop PCs is fast becoming a major strategic objective of CIOs and IT departments. This whitepaper will discuss “The Five Elements of Desktop Control” and how each are required in order to fully realize the benefits of a controlled environment. 
(WHITE PAPER) READ ABSTRACT |

Web Content Control: Five Steps to a Successful Implementation by Untangle, Inc.

October 2009 - (Free Research)
Implementing Web Content Control can seem intimidating. It represents the uneasy marriage of network administration and human resource management. With a little forethought, however, it becomes straightforward and very effective. Read this whitepaper for a step-by-step overview of a successful web content control implementation. 
(WHITE PAPER) READ ABSTRACT |

Access Certification: Addressing and Building on a Critical Security Control by Oracle Corporation

January 2010 - (Free Research)
This white paper discusses the forces driving security controls related to access and how to use automated access certification processes to address these critical issues. The detailed whitepaper walks thorugh the key components of an enterprise-grade access certification solution and highlights the results achieved by customers. 
(WHITE PAPER) READ ABSTRACT |

Why Choice and Control are Critical to a Successful Cloud Strategy by IBM

June 2012 - (Free Research)
This whitepaper covers the reasons why some are hesitant to adopt the cloud and offers four tips for an effective cloud strategy. 
(WHITE PAPER) READ ABSTRACT |

Protecting Control Networks: Key Considerations For Protection by Sourcefire

December 2013 - (Free Research)
This whitepaper takes a look at how to secure control networks, with strategies before, during and after an attack. 
(WHITE PAPER) READ ABSTRACT |

Configuration Audit and Control: 10 Critical Factors to Change and Configuration Management Success by Tripwire, Inc.

October 2008 - (Free Research)
As businesses have instituted internal, industry, and government mandated regulatory compliance, the need for audit data to prove conformity has also become a necessity. Read this white paper to learn how configuration audit and control provides a single, independent source for enforcing and reporting on a change policy across an organization. 
(WHITE PAPER) READ ABSTRACT |

Continuous Quality Assurance whitepaper by Micro Focus

June 2012 - (Free Research)
<p>Read this white paper to learn how a continuous quality assurance approach focusing on requirements, change, and test management can help provide the visibility, control and validation to efficiently deliver quality software.</p> 
(WHITE PAPER) READ ABSTRACT |

Demystifying Switch-based ACLs by Global Knowledge

February 2013 - (Free Research)
This whitepaper aims to help you better understand switch-based Access Control Lists (ACLs) by exploring what they are used for and how to best utilize them on IOS-based Catalyst devices. View now to learn more! 
(WHITE PAPER) READ ABSTRACT |

No Silver Bullet: Eight Ways Malware Defeats Strong Security Controls by IBM

December 2013 - (Free Research)
This whitepaper explores 8 ways malware can defeat your security strategy and outlines some key strategies for preventing these intrusions. 
(WHITE PAPER) READ ABSTRACT |

Desktop Virtualization Solutions Introduction to the Dell DVS Enterprise Solution by Dell and Microsoft

December 2013 - (Free Research)
This whitepaper examines a tested methodology that can be used to enable a “capable” architecture that maximizes IT control while optimizing the end-user experience. 
(WHITE PAPER) READ ABSTRACT |

Beyond Passwords: Protect the mobile enterprise with smarter security solutions by IBM

September 2013 - (Free Research)
This whitepaper examines the major challenges of providing secure access in mobile environments and explores new security models, policies and controls that can help keep critical apps and data secure. 
(WHITE PAPER) READ ABSTRACT |

Business Activity Monitoring: Process Control for the Enterprise by SL Corporation

May 2008 - (Free Research)
This whitepaper discusses how lessons can be taken from traditional process monitoring applications and applied in today's more complex multi-dimensional environments. 
(WHITE PAPER) READ ABSTRACT |

Smart Strategies for Securing Extranet Access by Oracle Corporation

March 2010 - (Free Research)
Download this whitepaper to learn how you can mitigate risk, improve extranet security, streamline compliance and enable your organization to boost its bottom-line by taking advantage of advanced access management technologies. 
(WHITE PAPER) READ ABSTRACT |

The ClearPass Access Management System by Aruba Networks

May 2013 - (Free Research)
This whitepaper describes a way that you can take back control of your company network without having to string together a multitude of loosely integrated point-products that only lead to more complexity. Read on and learn how you can manage all things BYOD from one place. 
(WHITE PAPER) READ ABSTRACT |

Enterprise Grade Management for OpenStack by Red Hat

April 2013 - (Free Research)
This whitepaper details a set of management and automation tools that will help IT handle the added challenges of hybrid cloud computing service models. 
(WHITE PAPER) READ ABSTRACT |

Simplify, Automate and Optimize Management of Your Storage Infrastructure by IBM

February 2014 - (Free Research)
This whitepaper discusses a system that helps to increase visibility, control and automation for data and storage infrastructures without the use of various, multi-vendor solutions. 
(WHITE PAPER) READ ABSTRACT |

Building a Highly-Available Enterprise Network with Juniper Networks EX Series Ethernet Switches by Juniper Networks, Inc.

February 2009 - (Free Research)
With the introduction of its EX Series Ethernet Switches, Juniper Networks is advancing the economics of networking, enabling customers to build the high-performance, highly available communication infrastructure they need for non-stop operations, while at the same time lowering capital and operational expenses. Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

Cisco Unified Communications: New Deployment Models for Communications and Collaboration by Cisco Systems, Inc.

November 2011 - (Free Research)
Access this whitepaper for insight on building the best unified communications solution for your business. 
(WHITE PAPER) READ ABSTRACT |

Cisco Unified Communications: New Deployment Models for Communications and Collaboration by Cisco Systems, Inc.

July 2011 - (Free Research)
This whitepaper examines the differences between the options and show you how Cisco Unified Communications and Collaboration solutions give you the flexibility to determine the best option for your business. 
(WHITE PAPER)

Cisco Unified Communications: New Deployment Models for Communications and Collaboration by Cisco Systems, Inc.

July 2011 - (Free Research)
Access this whitepaper for insight on building the best unified communications solution for your business. 
(WHITE PAPER) READ ABSTRACT |

Getting the Most Out of Your Next-Generation Firewall by Cisco (E-mail this company)

April 2013 - (Free Research)
This whitepaper addresses the blurred lines between business and pleasure created by today's mobile trends and offers a new strategy to deal with it. 
(WHITE PAPER) READ ABSTRACT |

Ease GLBA Compliance with LogRhythm by LogRhythm, Inc.

October 2012 - (Free Research)
Explore the ins and outs of the Gramm-Leach-Bliley Act (GLBA) and how it protects customer records and information. In addition, explore the consequences of non-compliance and learn how a particular log management solution can help you ease the compliance and reporting process. 
(WHITE PAPER) READ ABSTRACT |

The Security Risks Exposed by Sharepoint Search by Dell Software

September 2013 - (Free Research)
This whitepaper features a breakdown of the security risks that come with search in SharePoint 2013 and how to deal with them. 
(WHITE PAPER) READ ABSTRACT |

Securing Virtual Desktop Infrastructure by Citrix Systems, Inc. (E-mail this company)

October 2013 - (Free Research)
Learn how by integrating an extensive set of network and application-layer protection mechanisms, advanced access and action control capabilities, deep visibility, and other key capabilities can help you deliver the security and available you need to be successful with VDI. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 471 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts