Electronic Security ArchitectureWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Electronic Security Architecture returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Security Policies
 •   Network Security
 •   Service Oriented Architecture (SOA)
 •   Records Management
 •   Security Monitoring
 •   Electronic Commerce Interchange (EDI-XML)
 •   Endpoint Security
 •   Managed Security Services
 •   Application Security

Related Searches
 •   Change Electronic Security Architecture
 •   Comparing Electronic
 •   Electronic Matrix
 •   Electronic Measures
 •   Electronic Security Architecture B2C
 •   Electronic Terms
 •   Graph Electronic
 •   Schema Electronic
 •   Time Electronic Security Architecture
Advertisement

ALL RESULTS
1 - 25 of 481 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

EMC Documentum Information Rights Management by EMC Corporation

December 2006 - (Free Research)
This White Paper provides an overview of the technical architecture of the Documentum IRM Server and Docuentum IRM clients. 
(WHITE PAPER) READ ABSTRACT |

Forum Sentry™ - Web Services Security Gateway - Drive Return on Investment by Forum Systems

Forum Sentry™ provides a security infrastructure that drives a return on investment by enabling secure XML and Web services communications for mission critical applications. Forum Systems is the leader in Web Services Security. 
(SOFTWARE PRODUCT)

The Foundation of High-Value Business Intelligence: A Description of the WebFOCUS 7.1 Architecture by Information Builders

June 2006 - (Free Research)
Good architecture for information systems is as important as good engineering is for automobiles and with good architecture, applications can be scaled up with less hardware. 
(WHITE PAPER) READ ABSTRACT |

Solution Profile: PCI Compliance by Third Brigade

January 2008 - (Free Research)
This comprehensive white paper shows you how to proactively protect customer account data and successfully achieve PCI compliance. 
(WHITE PAPER) READ ABSTRACT |

Dell Mobile Clinical Computing - AlwaysOn Point of Care by Dell and VMware

December 2012 - (Free Research)
This resource discusses why modernization of the point-of-care desktop has become an urgent health IT priority. Inside, learn how the right virtualization architecture can give caregivers the information access and protection that they need. 
(WHITE PAPER) READ ABSTRACT |

Secure SOA Infrastructure - Better Control Mission Critial SOA Deployments by Forum Systems

September 2005 - (Free Research)
Industry wide SOA rollouts have seen enterprises deploy critical supporting infrastructure around Web services security and Web services management. Forum Systems and Oracle Corporation "Secure SOA Infrastructure" is a market-leading solution that integrates software and hardware for mission critical SOA deployments. Find out more. 
(WHITE PAPER) READ ABSTRACT |

How to create inherently secure communications by ComputerWeekly.com

November 2010 - (Free Research)
In earlier times, if an enterprise presumed it had control over its network, and if it had few external connections or communication, it was feasible that the connections between operational computers probably were not an unacceptable risk. 
(WHITE PAPER) READ ABSTRACT |

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc. (E-mail this company)

WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support every level of the global organization – executive, analytical, & operational – and make data available, accessible, and meaningful to every person or application that needs it. 
(SOFTWARE PRODUCT)

Dynamic Changes in Healthcare Create Challenges in Hospital Campus Networks by Brocade

December 2011 - (Free Research)
The next-generation of campus networks is here – and they require increased reliability, performance, and security … plus controlled costs.   
(WHITE PAPER) READ ABSTRACT |

Securing Medical Devices by McAfee, Inc.

May 2012 - (Free Research)
This white paper highlights a centralized, efficient and effective risk mitigation solution for the health care industry. Within, discover how to implement the necessary controls to significantly reduce the potential compromise of sensitive patient information. 
(WHITE PAPER) READ ABSTRACT |

New York Stock Exchange Chooses Juniper for Next-Generation Datacenters by Juniper Networks, Inc.

July 2009 - (Free Research)
This IDC Buyer Case Study examines the decision of NYSE Euronext to choose Juniper Networks as the primary supplier for the company's datacenter, Ethernet switching, and routing needs. Read on to learn more about how Juniper Networks is bringing the New York Stock Exchange into the twenty-first century. 
(CASE STUDY) READ ABSTRACT |

Dell Fluid Data architecture provides the backbone for patient information at Kansas Spine Hospital by Dell, Inc.

March 2012 - (Free Research)
Read this brief case study to learn more about the storage scalability challenges that Kansas Spine Hospital faced, how it overcame them a Dell solution and the benefits it reaped, including simplified administration, reduced bandwidth and capacity costs, about 85% of acquisition costs for a backup solution by leveraging DR features and more. 
(CASE STUDY) READ ABSTRACT |

Automating Fax and Email Orders into SAP to Complete Your E-Vision by Esker Inc.

December 2010 - (Free Research)
This paper gives an overview of key considerations for implementing a solution to automate fax and email orders into your SAP system. Highlighting the advantages of an all-in-one platform approach vs. maintaining a mix of different applications, this paper outlines how to eliminate the time, cost and errors of manual order processing. 
(WHITE PAPER) READ ABSTRACT |

Reducing the Cost of Electronic Gaming Machine Support with Intel® vPro™ Technology by Wipro Technologies

February 2009 - (Free Research)
This paper illustrates the expected cost savings of deploying this technology to support electronic gaming operations. 
(ARTICLE) READ ABSTRACT |

Introduction to XML Gateways: Best Practices, Benefits & Requirements by Forum Systems

September 2009 - (Free Research)
This paper will give you an overview of enabling virtualization and control, enforcing data-level privacy and integrity and control and audit information flow. You'll learn the best practices, benefits and requirements of XML Gateways. 
(WHITE PAPER) READ ABSTRACT |

How to Effectively Secure Electronic Health Records by HP and Intel

February 2012 - (Free Research)
In the ongoing effort to reach HIPPA Electronic Medical Record (EMR) compliance standards, one of the biggest concerns is security. Download this whitepaper to see how to develop a blanket of security for patients and your reputation through leveraging best practices for automated threat protection! 
(WHITE PAPER) READ ABSTRACT |

DocuSign - Electronic Signature Services by DocuSign, Inc.

DocuSign is a secure and convenient way to get a legally binding electronic signature. It's fast and easy-to-use. For businesses, DocuSign can dramatically increase efficiency and accelerate growth while reducing administrative costs. 
(ASP)

Records Management’s Breaking Point: Managing Electronic Records in High Volume Environments by ASG Software Solutions

December 2010 - (Free Research)
This white paper outlines some of the issues that make electronic records management so challenging, highlights why organizations need to tame the high-volume transactional records beast, and lastly, describes what to look for in a transactional records management solution. 
(WHITE PAPER) READ ABSTRACT |

Archive Attender™ for Exchange - Affordable Email Archiving by Sherpa Software

Archive Attender is a solution designed to move or copy messages from mailboxes, PST files and public folders. Administrators search indexed archives and view reports for storage and compliance. No SQL database or proprietary hardware required. Offers flexible archiving architecture. Free Trial available. 
(SOFTWARE PRODUCT)

Unifying Management of Physical and Electronic Records: The Records Management Imperative by EMC Corporation

March 2008 - (Free Research)
This white paper explains the features and benefits of such a unified approach to enterprise records management, and describes how the EMC Documentum/OmniRIM solution works. 
(WHITE PAPER) READ ABSTRACT |

e-Book: Chapter 2 - Building Bridges between IT Shops, Legal Teams and Security Staff by Symantec Corporation

May 2008 - (Free Research)
This e-book provides expert information on how to bridge the gap between IT management, security staff, and legal terminology. 
(BOOK) READ ABSTRACT |

How To Secure Electronic Healthcare Records Effectively by HP & Intel®

June 2012 - (Free Research)
This white paper highlights important ways to prevent intrusion and block attacks with a security approach that’s comprehensive, automated, and proactive. That way, your organization can ease the worry of facing hefty financial penalties in the face of a data breach. 
(WHITE PAPER) READ ABSTRACT |

Healthcare Information at Risk: Encryption is not a Panacea by Intel

June 2012 - (Free Research)
This resource demonstrates how encryption technology can play a key role in safeguarding sensitive patient information. But encryption isn’t a cure-all – there are still some downfalls associated with exclusive reliance on upon it. Read now to learn about the benefits and shortcomings of encryption, as well as other ways to protect electronic data. 
(WHITE PAPER) READ ABSTRACT |

Fair exchange protocols with anonymity and non-repudiation for payments by ComputerWeekly.com

May 2013 - (Free Research)
This article in our Royal Holloway Information Security series looks in detail at two key principles necessary for secure payments: fair exchange and non-repudiation. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Modelling the Insurance Enterprise by ComputerWeekly.com

February 2013 - (Free Research)
This report from the Open Group is aimed at managers, architects, and designers that serve the insurance industry or have an interest in integrating the TOGAF and ArchiMate standards. 
(ESSENTIAL GUIDE) READ ABSTRACT |

1 - 25 of 481 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts