Enterprise Implementation It SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Enterprise Implementation It Security returned the following results.
RSS What is RSS?
Related Categories

 •   Virtualization
 •   Data Security
 •   Application Management and Maintenance
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)
 •   Data and Application Distribution
 •   Operating Systems and Subsystems
 •   Contact Center Management
 •   Authentication / Password Management
 •   Customer Self-service/ e-Self Help
 •   Wireless Security

Related Searches
 •   Enterprise General
 •   Enterprise Implementation Export
 •   Enterprise Implementation It Consults
 •   Enterprise Implementation Retail
 •   Enterprise Rfi
 •   Network Enterprise
 •   Part Enterprise Implementation It
 •   Proposals Enterprise Implementation
 •   Regional Enterprise Implementation
Advertisement

ALL RESULTS
1 - 25 of 478 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

A Guide for Enterprise VMware ThinApp Deployments by VMware, Inc.

February 23, 2011 - (Free Research)
This guide provides the insight you need to ensure a successful enterprise implementation of ThinApp, with guidance on deployment of virtualized applications in the enterprise, addressing multiple use cases for physical and virtual desktops, with design considerations of multiple components for each use case. 
(EGUIDE) READ ABSTRACT |

5 Web Self-Service Pitfalls: What Every Contact Center Manager Must Know by eGain Communications Corp.

February 17, 2010 - (Free Research)
This paper discusses and analyzes 5 myths frequently encountered in the context of self-service strategies and implementations, and offers proven industry best practices to counter them. This paper will be a valuable resource for you as you develop, implement, and refine your customer self-service strategy. 
(WHITE PAPER) READ ABSTRACT |

Best Practices in PC Grid Computing by Univa UD

February 2008 - (Free Research)
In this white paper, we explore the features, components and benefits of a state-of-the-art PC grid computing solution - and how to choose one that's best for your organization. 
(WHITE PAPER) READ ABSTRACT |

Information security for SMEs by ComputerWeekly.com

May 2014 - (Free Research)
In this article, from our Royal Holloway Security Thesis series, we propose a simplified implementation approach for an information security management system (ISMS) for SMEs. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Business-Critical Benefits of Workload Automation Solutions by ASG Software Solutions

February 2010 - (Free Research)
Enterprises have struggled with workload automation (WLA) implementation because of its complexities, dependencies, and costs. These obstacles existed primarily because WLA was simply not a mature technology. However, today WLA solutions are widely accessible and achievable. Read this paper to learn about the latest innovations. 
(WHITE PAPER) READ ABSTRACT |

Aligning Application Infrastructure with Business through SOA Delivery by F5 Networks

March 2007 - (Free Research)
A successful SOA implementation relies as much on the flexibility of your network as it does the services which will be delivered on it. This white paper explores the unique challenges when implementing a service oriented architecture. 
(WHITE PAPER) READ ABSTRACT |

Intel® Cloud Builders Guide: Cloud Design and Deployment on Intel® Platforms - Enhanced Cloud Security with HyTrust* and VMware* by Intel

April 2011 - (Free Research)
This reference architecture explains a secure cloud infrastructure deployment and operation. It describes a cloud built with VMware, vSphere*, Intel® Xeon® processor 5600 series-based server platforms, and a HyTrust Appliance* designed to enforce cloud security policies, including those based on platform trust attestation provided by Intel® TXT. 
(WHITE PAPER) READ ABSTRACT |

The Desktop Admin's Guide to BYOD: Pros and Cons of BYOD by SearchSecurity.com

May 2012 - (Free Research)
Despite the fact that BYOD and BYOPC can reduce costs, add IT flexibility, and keep employees happy, they are not without issues. Check out this E-Book from SearchConsumerization.com to learn the promises and pitfalls of BYOD and BYOPC and discover how to successfully embrace them in your organization. 
(EBOOK) READ ABSTRACT |

Enterprise Security and your Technology by Hewlett-Packard Company

June 2014 - (Free Research)
This informative resource outlines a top-tier security tool and explains how it can help secure your enterprise. 
(WEBCAST) READ ABSTRACT |

5 Keys to a Successful Identity and Access Management Implementation by CA Technologies.

December 2007 - (Free Research)
An effective Identity and Access Management (IAM) solution is quickly becoming a must-have or enterprise organizations. In this paper learn the five keys to successful identity and access management implementation. 
(WHITE PAPER) READ ABSTRACT |

Mobility - Aironet 1100 Series by Cisco Systems

The Cisco Aironet® 1100 Series delivers an affordable and upgradable 802.11b wireless LAN (WLAN) solution, setting the enterprise standard for high performance, secure, manageable, and reliable WLANs. 
(HARDWARE PRODUCT)

VOIP Infrastructure for the Evolving Enterprise: How to Control Costs, Mitigate Risk, and Ensure Service Levels in an Ever-Changing Network Environment by NET Quintum

November 2008 - (Free Research)
There are significant differences in VoIP hardware functionality that affect the cost, risk and consumption of staff resources. This white paper outlines what to consider when selecting a VoIP gateway/switching solutio 
(WHITE PAPER) READ ABSTRACT |

Strengthening Enterprise Security through Notebook Encryption by Intel Corporation

December 2008 - (Free Research)
Implementing notebook computer encryption is significantly less costly than the potential expense of one data breach. Read this paper to learn why Intel recommends adopting notebook encryption and how to implement it in a cost-effective manner. 
(WHITE PAPER)

Wireless - Aironet 350 Series by Cisco Systems

The Cisco Aironet 350 Series of wireless LAN (WLAN) products leads the industry in performance, security, and reliability with cost effective solutions for the enterprise and small and medium-sized businesses. The Cisco Aironet 350 Series access point provides an ideal solution for customers who desire a non-upgradable IEEE 802.11b solution. 
(HARDWARE PRODUCT)

Security - Pix 500 Series Firewalls by Cisco Systems

The world-leading Cisco PIX Security Appliance Series provides robust, enterprise-class, integrated network security services including stateful inspection firewalling, protocol and application inspection, virtual private networking, in-line intrusion protection, and rich multimedia and voice security-in cost-effective, easy-to-deploy solutions. 
(HARDWARE PRODUCT)

Intel® Cloud Builders Guide: Cloud Design and Deployment on Intel® Platforms - Enhancing Server Platform Security with VMware by Intel

April 2011 - (Free Research)
Intel® Cloud Builders built a cloud with the use of a technology preview version of VMware vCenter Server, VMware vSphere Hypervisor, Intel Xeon processor 5600 series based server platforms and a plug in designed to interface with Intel Trusted Execution technology to provide platform attestration in the cloud. 
(WHITE PAPER) READ ABSTRACT |

ESG: A Phased Approach to Network Access Control (NAC) by Symantec Corporation

July 2008 - (Free Research)
Learn how Symantec Network Access Control can provide the secret to NAC success by offering a practical, phased implementation approach and by aligning NAC with business requirements.</ 
(WHITE PAPER) READ ABSTRACT |

Secure Wireless Made Easy -- Selecting a Next-Generation Solution for Pervasive WLAN Implementations by SonicWALL

July 2009 - (Free Research)
This paper examines the characteristics of a next-generation solution that helps alleviate the prevailing issues and challenges associated with today's WLAN implementations. The emergence of products that conform to related criteria holds the key to enabling enterprises to fully realize the important benefits that wireless technology has to offer. 
(WHITE PAPER) READ ABSTRACT |

Resin Application Server Java EE 6 Web Profile by Caucho Technology

March 2010 - (Free Research)
Caucho Technology aims to certify the Resin 4 application server on the newly finalized Java EE 6 Web Profile. This white paper discusses the Java EE 6 Web Profile and how it fits with the development philosophy of Resin as well as the details of our implementation including Resin extensions to the Java EE 6 Web Profile. 
(WHITE PAPER) READ ABSTRACT |

Ericom Desktop Virtualization Solutions by Ericom Software

Ericom virtualization solutions enable you to administer virtual desktops from a centralized location, reducing the cost and complexity of virtual desktop deployment and upkeep. Supported virtualization servers include VMware, Microsoft and others. 
(SOFTWARE PRODUCT)

UK IT priorities 2012 by ComputerWeekly.com

August 2012 - (Free Research)
This exclusive Computer Weekly research reveals how UK IT departments are prioritising their budgets in 2012, which technologies they are investing in, and the impact of cloud computing, mobile and other disruptive technology on their IT strategies. 
(IT BRIEFING) READ ABSTRACT |

February Issue of Information Security magazine: “Safety Check: Enforcing endpoint security requires careful planning and deployment” by Information Security Magazine

January 2011 - (Free Research)
This month’s Information Security Magazine Online cover story explores the current state of endpoint security enforcement and the challenges enterprises face during implementation. 
(EGUIDE) READ ABSTRACT |

Getting a Head Start in Software Asset Management: Managing Software for Improved Cost Control, Better Security and Reduced Risk by Centennial-Software

July 2008 - (Free Research)
This white paper provides a general overview of SAM benefits, and then addresses the specific issues involved in getting SAM up and running in your organization. 
(WHITE PAPER) READ ABSTRACT |

Network Foundation - Cisco 1700 Series by Cisco Systems

Cisco 1700 Series modular routers are ideal for enterprise small branch offices and small and medium-sized businesses that need secure access to business applications, network resources, and Internet services. The Cisco 1700 Series delivers fast, reliable and secure Internet/network access through a wide-range of high-speed WAN access technologies. 
(HARDWARE PRODUCT)

VMware Enlisted to Serve Marine Corps Enterprise Networking Requirements by VMware, Inc.

December 2008 - (Free Research)
The MCNOSC needed an affordable and easy-to-manage alternate site with real-time data transfer that would be reliable in the event of a catastrophe so they implemented VMware virtual infrastructure which effectively met their requirements. 
(CASE STUDY) READ ABSTRACT |

1 - 25 of 478 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts