Data Security OperateWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Data Security Operate returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Application Security
 •   Network Security
 •   Endpoint Security
 •   Operating Systems and Subsystems
 •   Security Monitoring
 •   Virtualization
 •   Wireless Security
 •   Security Policies
 •   Enterprise Data Protection and Privacy

Related Searches
 •   Balancing Data
 •   Data Security Alabama
 •   Data Security Recovery
 •   Data Security Secure
 •   Data Security Standards
 •   Data Vendor
 •   Implementation Of Data Security
 •   Internet-Based Data Security
 •   Organization Data Security
 •   Services Data Security Operate
Advertisement

ALL RESULTS
1 - 25 of 459 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Mobile Device Security Overview by SearchSecurity.com

September 29, 2011 - (Free Research)
This expert E-Guide highlights the 3 components for solid mobile device security, top mobile operating systems and more. 
(EGUIDE) READ ABSTRACT |

Leverage Technology at the Point of Care with Services from CDW Healthcare : Your Point-of-Care Services Solution Overview by CDW Healthcare

October 17, 2011 - (Free Research)
Choosing the right PoC technology can improve your hospital’s ability to deliver quality patient care. This means you need to adopt PoC solutions that are readily compatible with existing systems, accommodate your budget and can comply with government criteria. Learn about services available to ensure a smooth transition to PoC. 
(WHITE PAPER) READ ABSTRACT |

Bringing Your IT Platforms Together with Managed File Transfer by GlobalScape

May 20, 2014 - (Free Research)
This brief resource highlights the ability of managed file transfer (MFT) in securing and consolidating diverse platform environments. 
(WHITE PAPER) READ ABSTRACT |

Choosing an Enterprise-Class Wireless Operating System: A Comparison of Android, BlackBerry, iPhone, and Windows Mobile by BlackBerry

November 03, 2011 - (Free Research)
When selecting a mobile computing platform, organizations have to keep security and manageability at the forefront of their considerations. Access this comprehensive resource to explore the key criteria in selecting, deploying and managing a mobile operating system. 
(WHITE PAPER) READ ABSTRACT |

Core IMPACT Essential by Core Security Technologies

January 06, 2009 - (Free Research)
How do you keep up with remediation efforts and strengthen your defenses against round-the-clock threats while still having time to do your day job? CORE IMPACT Essential can help. 
(PRODUCT DEMO) READ ABSTRACT |

Getting Ready for Microsoft Windows Server 2008 by Dell, Inc.

April 25, 2008 - (Free Research)
Read this article to learn about the many capabilities and benefits of Microsoft Windows Server 2008 and how Dell products can help simplify the migration to this new operating system. 
(TECHNICAL ARTICLE) READ ABSTRACT |

The new era of big data security analytics by SearchSecurity.com

October 10, 2013 - (Free Research)
This expert guide examines the reasons why Big Data security is so important, providing helpful tips for adapting and utilizing it to your business' advantage. 
(EGUIDE) READ ABSTRACT |

Securing your Online Data Transfer with SSL by Thawte Inc.

July 05, 2012 - (Free Research)
This white paper provides an introduction to SSL security highlighting how it operates. Also included, is a discussion of the various applications of SSL certificates as well as their appropriate deployment. Additionally, uncover details regarding how to test SSL certificates on your web server. 
(WHITE PAPER) READ ABSTRACT |

Planning for the Security Features of Windows 7 Professional by Dell, Inc. and Microsoft Windows 7

October 21, 2009 - (Free Research)
With Windows 7 Professional, Microsoft has added and extended many security capabilities in its flagship Windows operating system (OS). Deciding which features to activate as well as testing will impact the planning for every Windows 7 rollout. This analyst report will analyze the major security capabilities of Windows 7 in order of importance. 
(ANALYST REPORT) READ ABSTRACT |

Best Practices for Windows Vista Planning, Migration, and Ongoing Management by Symantec Corporation

March 2008 - (Free Research)
It is vital to ensure PC system and data security during migration to Windows Vista. This white paper highlights considerations that must be addressed over the entire migration process. 
(WHITE PAPER) READ ABSTRACT |

Managing the Dynamic Desktop with System Center Solutions by Microsoft

September 2009 - (Free Research)
System Center desktop solutions help IT to reconcile competing demands of security with resource availability by streamlining the connection of any authorized user to any application, regardless of their location or connectivity, through a unified system that provides both secure access and the consistent, optimized performance your users expect. 
(DATA SHEET) READ ABSTRACT |

Delivering Enterprise Information Securely on Android and Apple iOS Devices by Citrix

April 2012 - (Free Research)
This white paper describes the issues that can arise when incorporating Android and iOS-based tablets and smartphones into the enterprise – with special attention paid to the latest Android 4.0 and iOS 5.1 versions. In addition, uncover the steps you should take to maintain security and control. 
(WHITE PAPER) READ ABSTRACT |

PCI Compliance for IBM System i (AS/400) by PowerTech

November 2007 - (Free Research)
This whitepaper examines how the standard relates to the System i (AS/400). When applicable, specific operating systems commands and configuration settings are provided. 
(WHITE PAPER) READ ABSTRACT |

Security Whitepaper: Google Apps Messaging and Collaboration Products by Google Apps

January 2011 - (Free Research)
Google Apps provide familiar, easy to use products and services for business settings. These services enable customers to access their data virtually anytime and anywhere from Internet-capable devices. This computing environment is called "the cloud." Read this white paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

Business-Driven Identity and Access Management: Why This New Approach Matters by Aveksa

August 2012 - (Free Research)
This informative white paper explains why today's IAM systems fail to properly reflect business context and why embracing business-driven identity and access management can help reduce costs while strengthening security. Learn more about a step-by-step process to deploy this practice in your business with this resource. 
(WHITE PAPER) READ ABSTRACT |

Choosing a Network Access Control (NAC) Solution that is Right for Your Network by ForeScout Technologies, Inc.

March 2011 - (Free Research)
This white paper provides a comprehensive overview between a number of available deployment, device interrogation and policy enforcement methods to help you determine which Network Access Control (NAC) solution is right for your company's network. 
(WHITE PAPER) READ ABSTRACT |

CISO Guide to Next Generation Threats by FireEye

May 2011 - (Free Research)
The only way to protect yourself against next generation threats is to have next generation protection. Traditional firewalls, IPS, anitivirus, and signature based systems are still useful against known threats, but they don't stand a chance against new ones 
(WHITE PAPER) READ ABSTRACT |

Content-Aware Identity & Access Management in a Virtual Environment by CA Technologies

June 2010 - (Free Research)
Read this white paper to learn how CA Technologies Content-Aware IAM solutions help protect customers in the physical world and similarly protect virtual environments by controlling identities, access, and information usage. 
(WHITE PAPER) READ ABSTRACT |

Deep Security as a Service: Cloud Security for Amazon Web Services (AWS) by Trend Micro

December 2013 - (Free Research)
Access this white paper to unveil a deep security as a service option that offers scalable protection for the cloud's elastic environment. Click now to see how to get maximum value out of your cloud investment. 
(WHITE PAPER) READ ABSTRACT |

Managed Public Key Infrastructure: Securing Your Business Applications by VeriSign EMEA

December 2005 - (Free Research)
The VeriSign® Managed PKI service is an outsourced offering that enables enterprises of any size to rapidly and confidently deploy PKI services. It alleviates the burden of planning, building, and maintaining a PKI, while allowing enterprises to maintain internal control over digital-certificate issuance, suspension, and revocation. 
(WHITE PAPER) READ ABSTRACT |

Content-Aware Identity & Access Management in a Virtual Environment by CA Technologies.

June 2010 - (Free Research)
Read this white paper to learn how CA Content-Aware IAM solutions help protect customers in the physical world and similarly protect virtual environments by controlling identities, access, and information usage.  
(WHITE PAPER) READ ABSTRACT |

Computer Weekly 8 November 2011: Read this week's issue of the UK's leading technology publication, with the news, analysis and opinion that matters to IT managers. by ComputerWeekly.com

November 2011 - (Free Research)
In this week's Computer Weekly, we report from the London Cyberspace Conference where world leaders gathered to discuss internet security. We examine the tools available to help migrate from Windows XP to Windows 7; and hear from Royal Bank of Scotland about how to build a business case for virtual desktops. Download the new issue now. 
(EZINE)

Dell Cuts IT Work, Tightens Security, Improves Performance with New Software by Dell, Inc. and Intel®

November 2009 - (Free Research)
Dell is planning to upgrade its 100,000 desktop and portable computers to the Windows® 7 operating system to reduce desktop management costs and enhance data security. Read this case study to learn more about Dell's business needs as well as the features and benefits achieved from Microsoft's solutions. 
(CASE STUDY) READ ABSTRACT |

Podcast: Intel IT: Best Practices for Operating and Managing our Private Cloud by Intel

October 2011 - (Free Research)
Listen to this podcast to learn about one cloud platform that enhances traditional benefits and learn how your enterprise can take advantage of immediate provisioning, higher responsiveness, lower business costs and much more. 
(PODCAST) READ ABSTRACT |

byREQUEST®: Automatically Sweeps Files into Sharepoint by Hillary Software

July 2009 - (Free Research)
From any operating system or any application, byREQUEST® can automatically pickup and move reports, documents, files and data directly into SharePoint on an hourly, daily, weekly and monthly schedule. 
(TRIAL SOFTWARE) READ ABSTRACT |

1 - 25 of 459 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts