Evaluating Technology Solutions For SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Evaluating Technology Solutions For Security returned the following results.
RSS What is RSS?
Related Categories

 •   Virtualization
 •   Data Security
 •   Enterprise Systems Management
 •   Security Monitoring
 •   Intrusion Prevention Solutions
 •   Data Center Management
 •   Network Security
 •   Managed Security Services
 •   Technology Planning and Analysis
 •   Intrusion Detection/ Forensics

Related Searches
 •   Building Evaluating Technology Solutions
 •   Email Evaluating
 •   Evaluating Contacts
 •   Evaluating Purchasing
 •   Evaluating Reporting
 •   Evaluating Technology Distribution
 •   Evaluating User
 •   Own Evaluating Technology Solutions
 •   Tool Evaluating Technology
Advertisement

ALL RESULTS
1 - 25 of 463 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Presentation Transcript: Evaluating Technology Solution Options For a Desktop Virtualization Pilot by Dell, Inc. and Intel®

July 12, 2010 - (Free Research)
For the purposes of this learning series, the speakers will discuss the pros of using Dell hardware with Intel processors along with Citrix's XenDesktop 4 for desktop virtualization. The session will also review how Dell is currently working with Citrix to package the XenDesktop Quick PoC Kit into their POC offering. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

A Guide to Evaluating Email Security Solutions by SonicWALL

April 2008 - (Free Research)
E-mail threats evolve daily. Read this guide to learn the challenges of implementing an email security solution and administrative considerations to make when evaluating potential email security solutions. 
(WHITE PAPER) READ ABSTRACT |

Best Practices when Evaluating Cloud Computing Services by Insight Integrated Systems

January 2012 - (Free Research)
In this expert e-guide, find out how you can evaluate cloud computing services to find the best fit for your company. Review critical factors to consider, such as cost, SLAs, APIs, security and more. 
(EGUIDE) READ ABSTRACT |

Seven Criteria for Evaluating Security as-a-Service (SaaS) Solutions by Websense, Inc.

November 2010 - (Free Research)
This white paper examines the security challenges organizations are facing today; addresses misconceptions about Security as-a-Service (SaaS); and provides criteria to help you evaluate SaaS solutions. 
(WHITE PAPER) READ ABSTRACT |

10 Common Pitfalls to Avoid When Evaluating Security Information Management (SIM) Solutions by netForensics

September 2009 - (Free Research)
This paper was created to help companies searching for a SIM solution narrow their options and determine which technology is the right one for their IT environment and security objectives. 
(WHITE PAPER) READ ABSTRACT |

Server and Application Protection - Behind the Lines by Trend Micro

February 2009 - (Free Research)
For organizations evaluating the benefits of server and application protection systems and making a case for incorporating them into the IT infrastructure, Trend Micro recommends examining nine different areas of business interest. This white paper details these topics and examines Trend Micro server and application protection software. 
(WHITE PAPER) READ ABSTRACT |

Intel Laptop Processor Comparison Tool by Intel

December 2012 - (Free Research)
See how you can use this handy comparison tool to evaluate the performance, security, and manageability features and benefits of different laptop processors. Strategically choose the solution that best matches your business needs -- click through now to get started! 
(ASSESSMENT TOOL) READ ABSTRACT |

E-Guide: Evaluating the Impact of Cloud Technology on IT Staff and Resources by Insight Integrated Systems

March 2011 - (Free Research)
This e-guide from SearchCloudComputing.com explains why increased IT staffing may be needed with cloud computing implementation. Gain insight into how this technology can optimize capacity and utilize IT resources effectively. Also, discover which steps to take to ensure job security even during the shift to a cloud computing infrastructure. 
(EGUIDE) READ ABSTRACT |

Top Ten Considerations When Evaluating Unified Communications Solutions - Learn the top solution differentiators to look for before deciding by Cisco Systems, Inc.

August 2011 - (Free Research)
This paper breaks down ten areas to consider when evaluating an upgrade of your unified communications solution. 
(WEBCAST)

Solution Spotlight: Evaluating Cloud Security Concerns by SearchSecurity.com

December 2012 - (Free Research)
Access this expert e-guide that reveals successful strategies for protecting sensitive data in the cloud, as well as how to  effectively defend against the latest threats and maintain compliance while taking advantage of the benefits of cloud computing. 
(EGUIDE) READ ABSTRACT |

Presentation Transcript: Integrating Virtual-Aware Security Technologies by Intel

August 2011 - (Free Research)
There are a growing number of virtual aware security technologies that promise to help you keep data moving between virtual machines safe. This transcript is intended to help you evaluate the technologies and how best to integrate them into your existing network topology for a complete view of activity, vulnerabilities and remediation options. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Best Practices In Document Management: Five Tests to Evaluate Cloud Enterprise Content Management (ECM) by SpringCM

January 2007 - (Free Research)
Document management, either as a stand-alone technology or as part of a broader ECM initiative, enables an organization to effectively and efficiently control and leverage its content. This white paper will explore five tests to determine whether your organization can benefit from a Cloud ECM solution. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Evaluating network security virtualization products by Sophos, Inc.

August 2013 - (Free Research)
This expert e-guide from SearchSecurity.com will help you determine whether virtual security options are a good fit for your organization. Inside, uncover the value of network security virtualization products, learn about security features to look for, and more. 
(EGUIDE) READ ABSTRACT |

IT Decision Checklist: Virtual Desktop Infrastructure Security by Trend Micro

November 2010 - (Free Research)
Traditional approaches to endpoint security have been challenged to keep up with malware and data loss. VDI presents enterprises with dynamic opportunities to improve security. Read this white paper to learn what those are and receive guidance on evaluating VDI security products. 
(EGUIDE) READ ABSTRACT |

WLAN Best Practices: 10 Questions to Ask When Evaluating Solutions by SearchSecurity.com

May 2013 - (Free Research)
Read this e-guide from our experts at SearchNetworking.com to gain a better understanding of WLAN solutions and how to evaluate them. Inside you'll find critical questions you should ask when exploring solutions as well as a discussion about the myths surrounding cloud-managed WLANs. 
(EGUIDE) READ ABSTRACT |

ESG Brief: Nexsan and FalconStor Team for High Performance, Operationally Efficient Disk-based Backup by FalconStor Software

August 2009 - (Free Research)
Disk-based backup, deduplication, and MAID are three of the most talked about technologies in the storage industry—each is so popular that organizations often purchase them individually just to see the capabilities they can bring to their environments. Now, all three are available in Nexsan's DeDupe SG. 
(ANALYST REPORT) READ ABSTRACT |

Security for Wireless Networks: A Comparison among SSL, IPSec and Mobile VPNs by NetMotion Wireless

June 2008 - (Free Research)
This paper outlines common threats and issues regarding wireless security in the context of typical uses of mobile devices over wireless networks and evaluates secure remote access solutions in comparison with NetMotion Mobility XE. 
(WHITE PAPER) READ ABSTRACT |

Evaluating Thin-Client Security in a Changing Threat Landscape by Intel

April 2010 - (Free Research)
Intel IT's security team continually analyzes our computing model to determine how it needs to evolve in response to an ever-changing threat landscape. Continue reading to learn more about our analysis and conclusions in this paper. 
(WHITE PAPER)

4 Questions to Ask When Evaluating Network Security Solutions by WatchGuard Technologies, Inc.

August 2013 - (Free Research)
This brief yet informative resource reveals the four questions you must ask when evaluating potential multilayer network security products to ensure you get the most out of your new investment. 
(WHITE PAPER) READ ABSTRACT |

The Top 10 Questions You Should Ask Vendors When Evaluating an In-House eDiscovery Solution. by StoredIQ

July 2008 - (Free Research)
This document examines the 10 top questions you should consider when evaluating an in-house eDiscovery solution. 
(WHITE PAPER) READ ABSTRACT |

Evaluating BI in the Cloud by Indicee

March 2014 - (Free Research)
In this expert e-guide, explore the reasons many businesses are hesitant to put BI systems in the cloud, including security and compliance concerns, and why the time to start evaluating BI in the cloud is now. Read now to discover Wayne Eckerson's top six considerations before jumping into a cloud BI project. 
(EGUIDE) READ ABSTRACT |

Building the Transparent Cloud by Intel

January 2012 - (Free Research)
Learn how Expedient Communications expanded from a managed service provider into cloud computing, with a focus on auditability and security. Gain insight into best practices for building private clouds and evaluating external cloud services from Alex Rodriguez, Expedient’s Vice President of Systems Engineering and Product Development. 
(CASE STUDY) READ ABSTRACT |

Magic Quadrant for Static Application Security Testing by Veracode, Inc.

February 2011 - (Free Research)
In this research, we analyze the evolution of the static application security testing market, and evaluate its vendors according to their business and technology vision, as well as their ability to execute against that vision in their products and services. 
(WHITE PAPER) READ ABSTRACT |

5 Cloud Security Concerns You Must Address by Hewlett-Packard Company

May 2012 - (Free Research)
This white paper explains why security is a top deterrent to cloud adoption. Discover threats to consider when evaluating cloud for your organization and learn how to minimize risk by establishing an effective defense strategy. 
(WHITE PAPER) READ ABSTRACT |

All-in-One Internet Filtering Solution Solves Costly Problems for Easton Bell Sports by Bloxx, Inc.

September 2008 - (Free Research)
Easton-Bell Sports was growing increasingly concerned about its bandwidth consumption, as well as the time IT staff members were spending removing malware from employees' computers. 
(CASE STUDY) READ ABSTRACT |

1 - 25 of 463 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts