Egov Security White PaperWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Egov Security White Paper returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Network Security
 •   Storage Security
 •   Enterprise Information Integration/ Metadata Management
 •   Application Security
 •   Security Policies
 •   Enterprise Data Protection and Privacy
 •   Business Intelligence Solutions
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Business Process Management (BPM)

Related Searches
 •   Customers Egov Security
 •   Egov Accounting
 •   Egov Security Cases
 •   Egov Security White Mac
 •   Egov Security White Manuals
 •   Egov Solutions
 •   Measurement Of Egov Security White
 •   Parts Of Egov Security
 •   Spreadsheet Egov Security
 •   Tools Egov Security White
Advertisement

ALL RESULTS
1 - 25 of 499 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Citrix GoToMyPCCorporate - Security White Paper by Citrix Online - GotoMyPC

June 2008 - (Free Research)
In this white paper you will learn how Citrix® GoToMyPC® Corporate provides industry-leading security, end-point management and centralized control. 
(WHITE PAPER) READ ABSTRACT |

A Guide to Understanding Hosted and Managed Messaging - An Osterman Research White Paper by ZANTAZ

January 2008 - (Free Research)
Email messaging is a mission-critical function for virtually all organizations and it is becoming more so. Learn how you can manage email to meet regulation requirements, increase messaging security and reliability, and streamline storage... 
(WHITE PAPER) READ ABSTRACT |

White Paper: Closing the Data Privacy Gap: Protecting Sensitive Data in Non-production Environments by IBM

March 2010 - (Free Research)
By downloading this complimentary White Paper, you'll gain insight into the requirements for protecting privacy in non-production environments and what to look for in an effective data privacy solution. 
(WHITE PAPER) READ ABSTRACT |

ESG: Lowering the Cost of Information Retention with Effective Disk-based Archives by ProStor Systems

December 2007 - (Free Research)
Managing data growth is more challenging than ever, especially with recent compliance mandates. Read this white paper how to solve these challenges with an integrated archiving solution, with features that also address compliance requirements. 
(WHITE PAPER) READ ABSTRACT |

Multi-Layer Security Platforms: The New Definition of Best of Breed by Fortinet, Inc.

June 2006 - (Free Research)
Significant changes in the threat, technology, and regulatory landscapes are forcing organizations to implement an array of security controls. This white paper explores the benefits of integrating multiple security layers into a single solution. 
(WHITE PAPER) READ ABSTRACT |

White paper: Consolidation Using the SPARC M6-32 High End Server by Oracle Corporation

December 2013 - (Free Research)
This guide explores the Oracle's SPARC M6-32, a unique server consolidation tool that can help you jump over the hurdles of deployment and enhance your business services. 
(WHITE PAPER) READ ABSTRACT |

ESG White Paper: NetApp Simplifies Storage Management for Virtual Server Environments by NetApp

July 2010 - (Free Research)
Read ESG’s report on the crucial role of storage management to simplify administration and advance virtualization adoption and benefits: efficiency, productivity and cost reduction. 
(WHITE PAPER) READ ABSTRACT |

IBM Tivoli Service Request Manager White Paper by IBM

January 2010 - (Free Research)
This IBM white paper will show you how you can help your organization manage incidents and problems, restore critical services, and minimize service desk calls in this white paper. 
(WHITE PAPER) READ ABSTRACT |

True Enterprise-Quality Linux Support: Edison Group White Paper by Oracle Corporation

November 2008 - (Free Research)
This white paper discovers how organization can increase operational efficiency while cutting costs with Oracle Unbreakable Linux, a support program that delivers enterprise-quality support for Linux at a lower cost. 
(WHITE PAPER) READ ABSTRACT |

IDC WP - Accelerating Converged Infrastructure with the FlexPod Datacenter Solution and the Support Alliance by NetApp

July 2011 - (Free Research)
This IDC white paper explores one such technology - a data center solution designed to help organizations achieve timely, repeatable and consistent virtual deployments - and explores how it stands up against some of today's most pressing virtualization challenges. Also included are today's best practices regarding virtual environments. 
(WHITE PAPER) READ ABSTRACT |

Instant Messaging Tough Enough for Business: No Server Required by CA Technologies.

September 2008 - (Free Research)
This white paper discusses the important benefits that business IM can provide to any sized organization, the risks that organizations face from unmanaged use of IM. 
(WHITE PAPER) READ ABSTRACT |

CA White Paper: Getting Started with a Project Management Office (PMO) by CA Technologies.

September 2007 - (Free Research)
This paper contains practical insights and best practices for better IT project delivery. It details ways of moving from an ad-hoc approach to a more effective process by implementing a project management office (PMO). 
(WHITE PAPER) READ ABSTRACT |

IDC White Paper: The Evolution of Job Scheduling - CA's Approach to Workload Automation by CA Technologies.

February 2008 - (Free Research)
This IDC paper presents the key concerns driving IT management and how they translate into needs that can be addressed through modern approaches to job scheduling and workload automation. 
(WHITE PAPER) READ ABSTRACT |

Understanding and Detecting Malware Threats Based on File Size by Fortinet, Inc.

December 2006 - (Free Research)
Malware is typically within files that are less than one megabyte(MB) in size. According to Fortine research, 97% of malware discovered since the beginning of 2006 is below one MB in size. 
(WHITE PAPER) READ ABSTRACT |

Ten Steps to Better Requirements Management White Paper by IBM

October 2008 - (Free Research)
This white paper explains the characteristics of a good requirement and presents ten steps to better requirements management. 
(WHITE PAPER) READ ABSTRACT |

White Paper: The Dynamic Warehousing Infrastructure - Establishing a Foundation to Meet New Information Requirements by IBM

January 2009 - (Free Research)
Learn how to create a roadmap for a truly dynamic warehousing infrastructure, and move ahead of your competition with your business intelligence system. 
(WHITE PAPER) READ ABSTRACT |

White Paper: Save Money, Reduce Risk, and Increase Agility When Deploying Oracle Database Systems by Oracle Corporation

December 2013 - (Free Research)
In this white paper, learn how Oracle Optimized Solution for Oracle Database promises to help IT consolidate database services, better utilize resources, and contain infrastructure costs. 
(WHITE PAPER) READ ABSTRACT |

White paper: Enterprise Database Cloud Deployment with Oracle SuperCluster T5-8 by Oracle Corporation

June 2013 - (Free Research)
In this white paper, learn about a platform ideal for building an enterprise database cloud that consolidates application database workloads and lowers total cost of ownership (TCO). 
(WHITE PAPER) READ ABSTRACT |

White paper: Benefits of Deploying a Cloud to Deliver Database as a Service by Oracle Corporation

January 2013 - (Free Research)
Cloud computing doesn't just mean virtualization -- it applies to higher level services, such as database and application services as well. In this white paper, explore the benefits of a technology designed specifically for deploying a Database-as-a-Service (DBaaS) cloud environment. 
(WHITE PAPER) READ ABSTRACT |

CA White Paper: Evolving the Maturity Level of Your Project Management Office (PMO) by CA Technologies.

September 2007 - (Free Research)
In the pursuit of improving IT project delivery, many companies tend to focus primarily on the process but might overlook a crucial step: benchmarking effectiveness. 
(WHITE PAPER) READ ABSTRACT |

FortiGate DoS Protection - Block Malicious Traffic Before It Affects Critical Applications and Systems by Fortinet, Inc.

July 2011 - (Free Research)
This white paper describes common DoS techniques, explains the technology integrated into every FortiGate consolidated security platform that helps in blocking DoS attacks, and offers suggestions on how to prevent an organization’s network from being used to attack another organization. 
(WHITE PAPER) READ ABSTRACT |

Managing Risk in the Cloud by NetApp

October 2009 - (Free Research)
This white paper explores today's top security concerns in cloud environments, and aims to dispel the common (and growing) myth that a cloud-based infrastructure introduces new risks that cannot be quantified nor controlled. In this paper, you'll learn how a holistic approach to information security can help your company successfully combat risks. 
(WHITE PAPER) READ ABSTRACT |

Oracle Business Intelligence Resource Center by Oracle Corporation

March 2012 - (Free Research)
This resource center offers up white papers, videos and more on the business intelligence (BI) capabilities of Oracle's products. The first paper provides an overview of the Oracle BI Foundation Suite, discussing its features and technical architecture, while another piece outlines cloud-ready BI with Oracle Business Intelligence 11g. 
(RESOURCE CENTER)

The Ten Layers of Security in BIRT iHub by Actuate

June 2014 - (Free Research)
The following white paper explores the 10 layers of security in the BIRT iHub. Learn how to manage each layer successfully, how to enable central configuration, and more. 
(WHITE PAPER) READ ABSTRACT |

NSS Labs:  2013 Next Generation Firewall Security Value Map by Fortinet, Inc.

March 2014 - (Free Research)
This crucial white paper uses analytical data of the top next generation firewall solution on the market to create a security value map (SVM). Find out which tool offers the most effective services and which best satisfies your organization's specific needs. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 499 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts