Enterprise Vendor PoliciesWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Enterprise Vendor Policies returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Security Policies
 •   Enterprise Systems Management
 •   Endpoint Security
 •   Virtualization
 •   Network Security
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Storage Management
 •   Enterprise Data Protection and Privacy
 •   Business Intelligence Solutions

Related Searches
 •   Architecture Enterprise
 •   Configure Enterprise Vendor Policies
 •   Developments Enterprise Vendor Policies
 •   Enterprise Remote
 •   Guidelines Enterprise
 •   Mapping Enterprise
 •   Payment Enterprise
 •   Risks Enterprise
 •   Script Enterprise Vendor
 •   Vendors Enterprise Vendor
Advertisement

ALL RESULTS
1 - 25 of 472 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

The EMA All-Stars in Enterprise Systems Management for 2008 by CA Technologies.

March 2008 - (Free Research)
Analyst firm EMA has released the results of their first ever All-Stars in Enterprise Systems Management for 2008 report, covering 18 different systems management disciplines. 
(WHITE PAPER) READ ABSTRACT |

Storage Magazine finds Dell top Enterprise NAS vendor by Dell, Inc.

January 2014 - (Free Research)
Dive into this Storage magazine article to discover what Rich Castagna, editorial director of TechTarget's Storage Media Group, has to say about the 2 top dogs for NAS systems. Read on to see which vendor claimed the best enterprise-class NAS system, and which topped the midrange group in our 8th Quality Awards survey. 
(JOURNAL ARTICLE) READ ABSTRACT |

Storage Magazine Online: December 2012 – 6 Hot Storage Technologies for 2013 by SearchStorage.com

December 2012 - (Free Research)
Our final issue of Storage Magazine Online in 2012 features one of our most popular annual columns: Hot Technologies for Next Year. Explore this month’s cover story, in which our team of editors team up to tell you the six technologies to watch in 2013 - and why they should be on your radar if they’re not already. 
(EZINE) READ ABSTRACT |

Storage Magazine Online: December 2012 – 6 Hot Storage Technologies for 2013 by Dell and VMware

December 2012 - (Free Research)
Our final issue of Storage Magazine Online in 2012 features one of our most popular annual columns: Hot Technologies for Next Year. Explore this month's cover story, in which our team of editors team up to tell you the six technologies to watch in 2013 - and why they should be on your radar if they're not already. 
(EZINE) READ ABSTRACT |

Sybase Analytic Appliance on IBM Power Systems by Sybase, an SAP company

July 2009 - (Free Research)
The Sybase Analytic Appliance is revolutionizing the data warehouse appliance market by integrating the leading column-based analytic software with hardware from the industry's number one provider of UNIX systems. Read this paper for more. 
(WHITE PAPER) READ ABSTRACT |

Upgrading to 802.11n by SearchSecurity.com

January 2012 - (Free Research)
This E-Guide identifies key questions that enterprise customers should ask prospective WLAN vendors and also provides a list of vendors that will suit the needs specific to your business. 
(EGUIDE) READ ABSTRACT |

IT Decision Checklist: Virtual Desktop Infrastructure Security by Trend Micro

November 2010 - (Free Research)
Traditional approaches to endpoint security have been challenged to keep up with malware and data loss. VDI presents enterprises with dynamic opportunities to improve security. Read this white paper to learn what those are and receive guidance on evaluating VDI security products. 
(EGUIDE) READ ABSTRACT |

Evaluation of Enterprise Backup and Recovery Software and Vendors by CommVault Systems, Inc.

June 2013 - (Free Research)
Access this exclusive resource for a complete list of findings of an enterprise backup and recovery software and vendor evaluation conducted by Forrester Research, Inc. 
(RESOURCE) READ ABSTRACT |

McAfee Total Protection for Secure Business by Insight

March 2010 - (Free Research)
McAfee solutions cover all the critical elements of security medium businesses need: desktop and server protection, data protection, email and web security, and compliance. Total Protection for Secure Business provides comprehensive protection against the most lethal threats and exploits - in one package, from one trusted and proven vendor. 
(WHITE PAPER) READ ABSTRACT |

VMware ACE 2 Enterprise Edition: Desktop Virtualization Solution by AMD and VMware, Inc (E-mail this company)

VMware ACE 2 Enterprise Edition delivers desktop virtualization solutions for enterprise users. Use VMware ACE 2 to deploy an ACE virtual machine as an IT managed “virtual laptop” to remote workers, provision controlled desktop images as sandbox environments or run legacy operating systems & applications on an existing PC as you migrate to Vista. 
(SOFTWARE PRODUCT)

Remote Vendor Access: Not All Access Should Be Treated Equally by Dell Software

September 2012 - (Free Research)
This white paper explains why Remote Vendor Access (RVA) should not be treated the same as traditional remote access for employees. Explore how a new set of remote access requirements can ensure that your enterprise remains in step with both compliance regulations and security expectations. 
(WHITE PAPER) READ ABSTRACT |

Information Security Magazine – December 2010: Understanding the Data Accountability and Trust Act by Information Security Magazine

December 2010 - (Free Research)
This month’s issue of Information Security magazine takes you deep inside the Data Accountability And Trust Act (DATA), pending legislation that could reshape the national privacy landscape and impact the way enterprises and midmarket companies architect their security operations. 
(EZINE)

Security Virtual Jam Session: The Secured Enterprise by IBM

February 2008 - (Free Research)
Join IBM Security Executives for an informative session on the current security landscape, the requirements for a new approach to securing the enterprise, and a rare live Q&A session with IBM security leaders. 
(WEBCAST)

2014 Gartner Magic Quadrant for Enterprise Mobility Management by Citrix

August 2013 - (Free Research)
The enterprise mobility landscape is changing and you need a solution that has you covered no matter what the future brings. Read the report to find out why Citrix has been named a leader. 
(WHITE PAPER) READ ABSTRACT |

Achieving PCI Compliance with Red Hat Enterprise Linux by Red Hat and JBoss

August 2009 - (Free Research)
While enterprises are often able to achieve compliance during an audit, they often have difficulty maintaining compliance on an ongoing basis. Learn how Red Hat Enterprise Linux's built-in features will allow your business to develop a robust implementation for managing all security necessary to achieve and maintain compliance on an on-going basis. 
(WHITE PAPER) READ ABSTRACT |

IT Download - Orion Network Configuration Manager (NCM) by SolarWinds, Inc.

February 2009 - (Free Research)
Check out this download to see how the Orion Network Configuration Manager aids in managing network configuration files in multi-vendor network environments, monitoring changes to device configurations and ensuring compliance with federal and corporate policies. 
(TRIAL SOFTWARE) READ ABSTRACT |

Virtualization Licensing and Support Lethargy: Curing the Disease That Stalls Virtualization Adoption by Burton Group

July 2008 - (Free Research)
Today, most applications can efficiently run inside virtual machines (VMs), and application vendors have a responsibility to develop licensing and support policies offering virtualization compatibility without the expense of added management to... 
(WHITE PAPER) READ ABSTRACT |

Practical Advice for Migrating to Cloud Collaboration by Cisco Systems, Inc.

November 2013 - (Free Research)
The following white paper outlines the importance of unified communications and how to go about deploying a successful solution. Discover trends of success with application prioritization, best practices for unification, and collaboration solutions. 
(WHITE PAPER) READ ABSTRACT |

Data Deduplication Approaches: Solving Today's Most Common Backup Problems by Quantum Corporation

December 2008 - (Free Research)
This Technology Brief discusses different approaches to data deduplication in the market today along with the pros and cons of each, and then matches some of the most common backup problems to a recommended deduplication approach. The brief close with a spotlight on Quantum's DXi7500 enterprise disk backup and replication system 
(ANALYST REPORT) READ ABSTRACT |

E-Guide: Data Migration, Virtual NAS, Hybrid Cloud storage, and more by Nasuni Corporation

June 2011 - (Free Research)
This E-Guide explains how IT professionals can create a more effective system by using data migration and also provides you with a business case study on a featured vendor. Continue reading to learn how to go about planning your data migration strategy, the challenges of business intelligence, your options with the cloud, and new vendor solutions. 
(EGUIDE) READ ABSTRACT |

The Decision Maker's Guide to Compliant Records Management by Iron Mountain

April 2012 - (Free Research)
This expert e-guide reviews the resources and characteristics you need to ensure your records management strategy is up to par. Gain insights on how to achieve compliance goals, develop your policy, determine costs and evaluate vendors. 
(EGUIDE) READ ABSTRACT |

Endpoint Security Suites Take Center Stage in the Enterprise by Symantec Corporation

January 2013 - (Free Research)
This Forrester report on endpoint security explores how nine top vendors in the market – F-Secure, IBM, Kaspersky, LANDesk, Lumension, McAfee, Sophos, Symantec, and Trend Micro – stacked up against each other. 
(ANALYST REPORT) READ ABSTRACT |

Just Released: Magic Quadrant for Network Access Control by ForeScout Technologies, Inc.

December 2013 - (Free Research)
Network access control (NAC) vendors are realizing the necessity of integration with other mobile device management (MDM) and security technologies. When choosing a NAC solution, the ability to integrate is a top concern -- but what else should you consider when evaluating various vendors? 
(ANALYST REPORT) READ ABSTRACT |

The Forrester Wave™: Risk-Based Authentication, Q1 2012 by RSA, The Security Division of EMC

February 2012 - (Free Research)
This white paper reviews the top six risk-based authentication (RBA) vendors in the market today. Discover the pros and cons of each and how they stack up to one another. Review evaluations of each based on 16 key criteria, including customer satisfaction, mobile strategy, product revenue, and much more. 
(WHITE PAPER) READ ABSTRACT |

Oracle's Accelerate Initiative: An Assessment of Oracle's Applications for Midsize Organizations by Oracle Corporation

October 2007 - (Free Research)
Does Oracle Accelerate have what it takes to deliver genuine value to midsize organizations? This white paper answers with an emphatic 'yes.' Read on for all the details. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 472 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts