Distributions SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Distributions Security returned the following results.
RSS What is RSS?
Related Categories

 •   Technology ROI Tools
 •   Business Intelligence Solutions
 •   Patch Management
 •   Index Servers
 •   Mainframe/ High-end Servers
 •   Midframe/ Midrange Servers

Related Searches
 •   Audit Distributions
 •   Coding Distributions Security
 •   Distributions Purchasing
 •   Distributions Security New York
 •   Distributions Security Related
 •   Financial Distributions Security
 •   Framework Distributions Security
 •   Impact Distributions
 •   Issues Distributions Security
 •   Manage Distributions Security
Advertisement

ALL RESULTS
1 - 25 of 480 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Unix, Linux Uptime and Reliability Increase; Patch Management Woes Plague Windows by IBM

January 2008 - (Free Research)
Use this report, the Yankee Group's Global Server Operating System Reliability Survey, to make an informed choice on which servers best fit your needs. 
(WHITE PAPER) READ ABSTRACT |

SmartDL 4.0, Dynamic Group Management by Imanami

August 2006 - (Free Research)
Distribution list changes happen frequently and often slip through the cracks decreasing your control over network access rights. This free trial IT download increases the accuracy of distribution lists and security groups with an automated solution. 
(TRIAL SOFTWARE)

How to Choose a Distribution System by Sage Software

January 2012 - (Free Research)
Read this white paper to learn best practices for selecting the best distribution strategy and accompanying enterprise resource planning (ERP) software for your organization. 
(WHITE PAPER) READ ABSTRACT |

Practical Uses for Radio Frequency Identification (RFID) Technology in Manufacturing and Distribution Applications by Intermec

March 2009 - (Free Research)
More than a great technology, RFID is an excellent business tool that helps manage supply chains, increase margins and profits, and decrease costs. 
(WHITE PAPER) READ ABSTRACT |

Symantec Report on Rogue Security Software by Symantec Corporation

October 2009 - (Free Research)
The Symantec Report on Rogue Security Software is an in-depth analysis of rogue security software programs. Read this report to learn the specifics about security software scams. 
(WHITE PAPER) READ ABSTRACT |

Video: SaaS Endpoint Visibility and Security with Tivoli Endpoint Manager by IBM

August 2011 - (Free Research)
Check out this series of quick, user-focused videos to learn what customers are saying about Tivoli Endpoint Manager. Discover if this security and management solution is right for your organization's needs by clicking through to learn more. 
(VIDEO) READ ABSTRACT |

Infosecurity Europe 2014 by ComputerWeekly.com

February 2014 - (Free Research)
Infosecurity Europe is the largest IT security event in Europe. Held in London, it is a free exhibition with over 325 exhibitors featuring the most diverse range of new products and services and an unrivalled free education programme. Register today! 
(BROCHURE) READ ABSTRACT |

Advanced Authentication Methods: Software vs Hardware by CA Technologies.

June 2011 - (Free Research)
View this webcast to discover the advantages of a software-based authentication solution and how it can help your organization extend strong authentication to all of your employees, partners and customers in a secure, convenient, cost effective manner. 
(WEBCAST) READ ABSTRACT |

Shavlik Integrates Sunbelt Software Technology: Keeping Endpoints Secure, Compliant and Well-Managed by Shavlik Technologies

May 2009 - (Free Research)
This Market Alert from Aberdeen group draws on current research findings to analyze endpoint security solutions and identify Best-in-Class companies as far as protecting and managing endpoints. Read this analyst written article to learn more. 
(ANALYST NEWS) READ ABSTRACT |

Desktop Virtualization: The Key for Securing Your Enterprise by Citrix

October 2010 - (Free Research)
In this paper, Citrix® unveils how desktop virtualization provide IT organizations visibility and control over data to help achieve security and regulatory requirements, without compromising business performance, productivity, and the user experience. 
(WHITE PAPER)

Open Trusted Technology Provider Standard (O-TTPS) by ComputerWeekly.com

April 2013 - (Free Research)
This standard is aimed at enhancing the integrity of commercial off the shelf ICT products and helping customers to manage sourcing risk. 
(WHITE PAPER) READ ABSTRACT |

UK IT priorities 2012 by ComputerWeekly.com

August 2012 - (Free Research)
This exclusive Computer Weekly research reveals how UK IT departments are prioritising their budgets in 2012, which technologies they are investing in, and the impact of cloud computing, mobile and other disruptive technology on their IT strategies. 
(IT BRIEFING) READ ABSTRACT |

The New Reality of Stealth Crimeware by McAfee.

November 2011 - (Free Research)
The new reality of crimeware consists of the stealth, creativity and patience of stuxnet, and the commercialism, wide distribution and easy-to-use toolkits of Zeus, making it even more challenging to detect and protect against. Organisations must go beyond the traditional security to ensure their intellectual property is safe. 
(WHITE PAPER) READ ABSTRACT |

Malware Security Report: Protecting Your Business, Customers and Bottom Line by VeriSign Australia

August 2010 - (Free Research)
This white paper will help you understand the threats from Malware and how it can impact your online business. You’ll learn about criminals’ motivations for distributing malware through the web and how they infect web servers to make distribution possible, as well as techniques administrators can use to detect them. 
(WHITE PAPER) READ ABSTRACT |

Malware Security Report: Protecting Your Business, Customers, and the Bottom Line by VeriSign EMEA

February 2011 - (Free Research)
This white paper will help you understand the threat from malware and how it can impact your online business. You’ll learn about criminals’ motivations for distributing malware through the web and how they infect web servers to make distribution possible. 
(WHITE PAPER) READ ABSTRACT |

Shavlik Integrates Sunbelt Software Technology: Keeping Endpoints Secure, Compliant and Well-Managed by Shavlik Technologies

May 2005 - (Free Research)
This Market Alert from Aberdeen group draws on current research findings to analyze endpoint security solutions and identify Best-in-Class companies as far as protecting and managing endpoints. Read this analyst written article to learn more. 
(ANALYST REPORT)

City of Ulm Case Study by Centennial-Software

July 2008 - (Free Research)
The City of Ulm turns to Enteo v6 to rollout Windows Vista and applications on all clients with minimal effort and high degree of reliability. 
(CASE STUDY) READ ABSTRACT |

SL Enterprise RTView for Operational and Strategic Dashboards by SL Corporation

February 2008 - (Free Research)
SL Enterprise RTView is a business information delivery platform that is used by IT Managers to rapidly configure, deploy, maintain and extend real-time and other critical enterprise information systems. 
(WHITE PAPER) READ ABSTRACT |

Back to the Future: The New IT Infrastructure Opportunity by Avocent

June 2011 - (Free Research)
Access this exclusive resources to discover new technology and solutions to address security and operating expense (OPEX) issues related to distributed computing such as thin client, fast client, diskless workstations, SaaS, and VDI. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Patch Management for the IT Infrastructure by GFI Software

May 2011 - (Free Research)
Keeping up with patches is a tedious and time consuming task for security pros, and often prompts them to look for a more efficient and effective solution. This presentation transcript discusses a patch management approach that offers effective monitoring and increased productivity. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Computer Weekly – 5 March 2013: Planning for a 4G future by ComputerWeekly.com

March 2013 - (Free Research)
In this week's Computer Weekly, now the 4G spectrum auction is over, we look at what happens next for the future of mobile networking. Cloud computing promises to save costs – we examine how to ensure a return on investment. And we report from the RSA conference on how big data is helping tackle cyber security threats. Read the issue now. 
(EZINE) READ ABSTRACT |

CW+: Quocirca report: Digital Britain – opportunities and risks for UK businesses by ComputerWeekly.com

September 2010 - (Free Research)
Digital Britain is the UK government’s strategic vision for the UK digital economy. While social inclusion and rights protection are major themes, the plans will also have a significant impact on businesses. 
(WHITE PAPER) READ ABSTRACT |

Application Hardening: Evolving Techniques for Proactive Enterprise Application Security by SearchSecurity.com

October 2013 - (Free Research)
This expert guide from SearchSecurity.com provides crucial tips for creating an effective threat and vulnerability management program and examines how you can strengthen and streamline your application security. 
(EBOOK) READ ABSTRACT |

Top 10 Reasons to Strengthen Information Security with Desktop Virtualization by Citrix

June 2013 - (Free Research)
Read this white paper to learn more about how deploying desktop virtualization can ensure your information is secure, allowing you to embrace workshifting and emerging technology. 
(WHITE PAPER) READ ABSTRACT |

Improved Chilled Water Piping Distribution Methodology for Data Centers by Schneider Electric

October 2011 - (Free Research)
This white paper details the issues involved with chilled water piping and offers flexible piping as a reliable solution. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 480 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts