Customers Application SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Customers Application Security returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Application Management and Maintenance
 •   Application Security
 •   Storage Security
 •   Endpoint Security
 •   Application Integration
 •   Network Security
 •   Application Lifecycle Management(ALM)
 •   Authentication / Password Management
 •   Managed Security Services

Related Searches
 •   Customers Activities
 •   Customers Application Cost
 •   Customers Application Infrastructure
 •   Customers Application Security Implement
 •   Customers Application Security Kentucky
 •   Customers Fast
 •   License Customers Application Security
 •   Manufacturers Customers
 •   Size Customers
Advertisement

ALL RESULTS
1 - 25 of 480 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

The US Department of Defense Maintains Application Security and Eliminates Software Conflicts When Deploying Applications to Locked-down Desktops by Thinstall

January 2008 - (Free Research)
The DOD chose Thinstall to address the demanding deployment requirements, using it initially for 12 applications. 
(CASE STUDY) READ ABSTRACT |

Windows Azure Platform Security Essentials for Technical Decision Makers by Microsoft

December 2010 - (Free Research)
In this video, Graham Calladine, Security Architect with Microsoft Services, answers the most common security concerns CxOs and other technical decision-makers have regarding the security of their data in Windows Azure cloud platform. 
(WEBCAST) READ ABSTRACT |

Windows Azure Platform Security Essentials for Business Decision Makers by Microsoft

November 2010 - (Free Research)
In this video, Graham Calladine, Security Architect with Microsoft Services, answers the most common security concerns CxOs and other business decision-makers have regarding the security of their data in Windows Azure cloud platform. Watch this video to learn more! 
(VIDEO) READ ABSTRACT |

Advanced Authentication Methods: Software vs Hardware by CA Technologies.

June 2011 - (Free Research)
View this webcast to discover the advantages of a software-based authentication solution and how it can help your organization extend strong authentication to all of your employees, partners and customers in a secure, convenient, cost effective manner. 
(WEBCAST) READ ABSTRACT |

Financial Giant Cuts Costs through Offshore Testing Services by Hexaware Technologies

April 2008 - (Free Research)
Learn how one company was able to utilize cost effective offshore support for use acceptance testing (UAT) of customer applications, ensuring cost benefits and reduce failure rates. 
(WHITE PAPER) READ ABSTRACT |

Microsoft Technology Center Reduced SharePoint 2010 Migration by Two Months with DocAve by AvePoint, Inc.

January 2012 - (Free Research)
Read this case study to see how The Microsoft Technology Center successfully completed a SharePoint 2007 to SharePoint 2010 migration quicker than expected with DocAve. 
(CASE STUDY) READ ABSTRACT |

ABBYY FlexiCapture Engine Drives Business For the Insurance Industry by ABBYY

May 2012 - (Free Research)
Access this case study to read about how an insurance company leveraged an automated conversion strategy to upload applications almost instantly to their management system. Discover how you can implement a similar system to facilitate the automation of submitting application forms. 
(CASE STUDY) READ ABSTRACT |

Network Boost: control all data in your network and accelerate your data exchanges by Orange Business Services

April 2009 - (Free Research)
This quick Flash presentation gives us an overview of Network Boost, a turn-key networking solution that offers application acceleration tools that are focused on achieving performance objectives. 
(PRODUCT OVERVIEW) READ ABSTRACT |

Business Customers Find Mainframe Costs out of Step with Data Center Budgets by Hewlett-Packard Company

November 2008 - (Free Research)
This press release explains how more than 250 companies worldwide have migrated to HP Integrity systems from mainframes over the past two years, saving up to 70 percent in operational costs. 
(ARTICLE) READ ABSTRACT |

Network Foundation - Cisco 1700 Series by Cisco Systems

Cisco 1700 Series modular routers are ideal for enterprise small branch offices and small and medium-sized businesses that need secure access to business applications, network resources, and Internet services. The Cisco 1700 Series delivers fast, reliable and secure Internet/network access through a wide-range of high-speed WAN access technologies. 
(HARDWARE PRODUCT)

Celina Insurance Group Streamlines Collaborative Processes with Agents to Stay ahead of the Competition by IBM

March 2009 - (Free Research)
Read this case study to see how Celina Insurance Group implemented a collaborative extranet based on IBM Lotus Notes and Lotus Domino to enhance their competitive edge. 
(CASE STUDY) READ ABSTRACT |

Confidence in Commerce: Enabling e-banking and online services with two-factor authentication by SafeNet, Inc.

September 2009 - (Free Research)
Many financial organizations are looking to implement proactive security measures to combat identity theft. Strong authentication – a security method which employs the use of more than one factor to identify users accessing private networks and applications – is among today’s leading choices. 
(WHITE PAPER) READ ABSTRACT |

Data Quality and Identity Resolution by Informatica

May 2008 - (Free Research)
This paper describes how identity resolution complements and extends the application of data quality and data integration processes into business applications. 
(WHITE PAPER) READ ABSTRACT |

Using SLAs to Gain a Competitive Advantage by BlueCoat

December 2008 - (Free Research)
This whitepaper will discuss these managed service trends and challenges, and will identify the steps to success to meet customers. Escalating application and security requirements. 
(ANALYST REPORT) READ ABSTRACT |

Customer Experience Management in the New Era of Mobility by IBM

August 2012 - (Free Research)
View this white paper to learn more about how your business can obtain higher revenues, lower costs and higher customer satisfaction. Mobility provides businesses with the opportunity to provide customers with unique value. It gives customers a channel to interact with their preferred companies. 
(WHITE PAPER) READ ABSTRACT |

Mobility - Aironet 1100 Series by Cisco Systems

The Cisco Aironet® 1100 Series delivers an affordable and upgradable 802.11b wireless LAN (WLAN) solution, setting the enterprise standard for high performance, secure, manageable, and reliable WLANs. 
(HARDWARE PRODUCT)

Why Cloud? Better Security than Most Companies Can Provide Themselves by Five9

May 2013 - (Free Research)
This white paper explains how cloud security may be the safer investment for businesses, including customer-oriented organizations and contact centers. Discover why moving applications to the cloud could better protect your data than if it were kept on-premise. 
(WHITE PAPER) READ ABSTRACT |

Debunking Security Concerns with Hosted Call Centers by inContact

January 2011 - (Free Research)
This paper discusses the different layers requiring security, how security should be addressed in each layer, and how to select a qualified hosted call center provider. Read this white paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

Wireless - Aironet 350 Series by Cisco Systems

The Cisco Aironet 350 Series of wireless LAN (WLAN) products leads the industry in performance, security, and reliability with cost effective solutions for the enterprise and small and medium-sized businesses. The Cisco Aironet 350 Series access point provides an ideal solution for customers who desire a non-upgradable IEEE 802.11b solution. 
(HARDWARE PRODUCT)

CSC partners with VCE to jump-start cloud business with Vblock™ Infrastructure Systems by VCE (E-mail this company)

December 2011 - (Free Research)
This case study explores the solution one of your peers implemented to meet the growing needs of their client base, ensure availability, performance, and security, and increase their competitive advantage in the cloud services market. 
(CASE STUDY) READ ABSTRACT |

Application Delivery Networks: The New Imperative for IT Visibility, Acceleration and Security by BlueCoat

September 2010 - (Free Research)
Your business depends on one thing: getting the right information to the right people at the right time. To gain a competitive advantage, improve customer service and access more business intelligence, you have to ensure fast and responsive application delivery to users wherever they are. 
(WHITE PAPER) READ ABSTRACT |

Verity Credit Union Streamlines Application Access, Reduces Helpdesk Costs and Improves Customer Service by Imprivata

February 2010 - (Free Research)
This case study shares one credit union's experience with an authentication solution that helped it efficiently manage user access across all applications without hindering productivity or adding costs. 
(WHITE PAPER) READ ABSTRACT |

The MSP Report Advantage by N-able Technologies

December 2012 - (Free Research)
Discover why professional, standardized reports have emerged as a key success factor for many MSPs and IT services providers, helping prove relevance and demonstrate the value of service delivered to their clients. View now to learn how such reporting can help you gain the title of "Trusted Advisor." 
(WHITE PAPER) READ ABSTRACT |

It’s All About the App: Mobile Security That Helps Enable the Business by CA Technologies.

November 2013 - (Free Research)
With mobility strategies quickly becoming a priority for the majority of organizations, this informative guide provides information on mobile security strategies that every business needs to learn more about. 
(WHITE PAPER) READ ABSTRACT |

Achieving PCI Compliance at the Point Of Sale Using Bit9 Parity™ to Protect Cardholder Data by Bit9, Inc.

June 2009 - (Free Research)
As the technology used by merchants and their partners has evolved, card fraud has become more sophisticated. In response to this evolving threat, the major credit card companies have created a set of security standards to protect their customers from security breaches. Read this whitepaper to find out how Bit9 Parity helps achieve compliance... 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 480 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts