Events White Paper SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Events White Paper Security returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Storage Management
 •   Virtualization
 •   Security Monitoring
 •   Network Security
 •   Enterprise Data Protection and Privacy
 •   Disaster Recovery
 •   Security Policies
 •   Enterprise Resource Planning (ERP)
 •   Databases

Related Searches
 •   Computerized Events White Paper
 •   Database Events White
 •   Events Needs
 •   Events Scheduling
 •   Events White Backup
 •   Events White Paper Publishing
 •   Events White Paper Schedules
 •   Events White Samples
 •   Features Events
 •   Tool Events White
Advertisement

ALL RESULTS
1 - 25 of 473 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..
E-mail Recovery, Restoration, Search & Analysis by Ontrack® PowerControls™ by Kroll Ontrack.
Ontrack® PowerControls™ is a simple yet powerful tool for copying, searching, recovering and analyzing mailbox items directly from Microsoft Exchange Server more...
>> Discover more offerings from Ontrack® PowerControls™ by Kroll Ontrack.

Reducing Costs and Creating a More Secure IT Environment with a Holistic Approach to Data Protection: An ROI Analysis of FalconStor Storage Management Solutions by FalconStor Software

October 22, 2010 - (Free Research)
Data protection and disaster recovery continue to be overarching challenges for most firms. To remedy a myriad of problems with data protection as well as operational and disaster recovery, companies are replacing legacy backup methods with new approaches. Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

Kazeon Data Privacy & Security Solution by Kazeon

November 01, 2006 - (Free Research)
This white paper examines an Information Classification Management (ICM) solution that helps classify and secure your company's sensitive information and overcome the challenges of securing data while complying with federal guidelines. 
(WHITE PAPER)

10 Ways Excel Drives More Value From Your SAP® Investment... While Making Your SAP Life Easier by Winshuttle, LLC

August 31, 2010 - (Free Research)
This white paper highlights 10 ways Winshuttle's tools and applications utilize Microsoft Office applications and allow you to optimize your SAP investment. The benefits outlined in this white paper are realized by the reduction of SAP operational costs, delivering across the board efficiencies and accelerating top and bottom line improvements. 
(WHITE PAPER) READ ABSTRACT |

Thawte in Education by Thawte Inc.

September 30, 2013 - (Free Research)
Access this white paper to discover a number of trends accelerating the urgency of deploying SSL across distributed campuses and how this approach can ensure safety and security in higher educational networks. 
(WHITE PAPER) READ ABSTRACT |

10 Best Practices for Microsoft SharePoint Security by Thawte Inc.

September 27, 2013 - (Free Research)
In this white paper, you will discover ten best practices everyone should follow when using a leading collaboration and content management application designed to eradicate vulnerabilities in your organization. 
(WHITE PAPER) READ ABSTRACT |

IP Networking and Its Impact on Video Surveillance by NETGEAR Inc.

October 28, 2010 - (Free Research)
Video surveillance is critical for business. Different organizations use video surveillance to protect people’s safety, protect valuable assets, or minimize risks associated with criminal activity. One of the biggest trends in surveillance is the accelerating shift to IP from analog. Read this white paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

Securing your Online Data Transfer with SSL by Thawte Inc.

July 05, 2012 - (Free Research)
This white paper provides an introduction to SSL security highlighting how it operates. Also included, is a discussion of the various applications of SSL certificates as well as their appropriate deployment. Additionally, uncover details regarding how to test SSL certificates on your web server. 
(WHITE PAPER) READ ABSTRACT |

Securing microsoft exchange 2010 With Thawte SSL Certificates by Thawte Inc.

July 12, 2011 - (Free Research)
Security continues to be a facet of Exchange technology that must be managed, and your secure sockets layer (SSL) certificates are the key to managing security for Exchange servers. Access this expert white paper now to get an overview of SSL certificates for Exchange 2010. 
(WHITE PAPER) READ ABSTRACT |

The Children's Internet Protection Act by NETGEAR Inc.

December 17, 2010 - (Free Research)
Schools and libraries must certify they have complied with, or are in the process of complying with, the CIPA requirements by filing a form with the Federal government in order to receive discounts on the telecommunication charges for access or connection costs. Are you certified? Read this white paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

5 Steps to Secure the Wireless Network by NETGEAR Inc.

October 25, 2010 - (Free Research)
Today’s organizations increasingly rely on the ease and lower cost of wireless networking. Schools and businesses are investing in Wi-Fi to leverage benefits including more flexible network connectivity, improved productivity, and reduced capital expense. Read this white paper to learn how to incorporate wireless connectivity into your everyday. 
(WHITE PAPER) READ ABSTRACT |

Agentless Backup—Separating Myth from Reality by Asigra

June 11, 2013 - (Free Research)
This white paper explores a backup solution that eliminates the requirement for locally installed agents, enabling substantial time and cost savings and simplified management. 
(WHITE PAPER) READ ABSTRACT |

What You Need to Know about Cloud Backup: 10 FAQs Answered by Asigra

June 12, 2013 - (Free Research)
This white paper discusses the ten most common questions that companies are asking about cloud backup. 
(WHITE PAPER) READ ABSTRACT |

The Top Six Risks of Employee Internet Use and How to Stop Them by St. Bernard Software

May 10, 2010 - (Free Research)
Due to the serious nature of many threats, the Internet use of even one unmonitored employee on a single unmanaged system can ravage a company’s internal network, irrevocably delete critical data, and ultimately ruin the company’s ability to conduct business. Read this white paper to learn how to protect your organization. 
(WHITE PAPER) READ ABSTRACT |

Server Virtualization: A Game-Changer For SMB Customers by NETGEAR Inc.

November 04, 2010 - (Free Research)
Server virtualization can address issues involving logistics and finances and also transform testing and development environments while radically changing business continuity and disaster recovery practices. Read this white paper to learn more about what server virtualization can do for you. 
(WHITE PAPER) READ ABSTRACT |

Building A Network Foundation for Virtualization by NETGEAR Inc.

November 04, 2010 - (Free Research)
The deployment of virtualization technology has allowed businesses of all sizes to reduce costs and optimize resources. The impact has been particularly dramatic with server virtualization. By virtualizing their servers, many organizations have dramatically reduced their IT investment in hardware procurement. Read this white paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

The CISO's Guide to Virtualization Security by Rapid7

January 12, 2012 - (Free Research)
Security incidents that occur in a virtual environment can cause significant, sometimes crippling damage to businesses. It's essential that security professionals outline their efforts and making securing virtual infrastructure a priority. 
(WHITE PAPER) READ ABSTRACT |

Best Practices to Protect the Cardholder Data Environment and Achieve PCI Compliance by Rapid7

July 18, 2012 - (Free Research)
Cyber-attacks that target customer and financial information are becoming more popular and businesses need to protect their data. Prevent attackers from taking advantage of the gaps in your security plan by creating a comprehensive information security policy. 
(WHITE PAPER) READ ABSTRACT |

FalconStor® RecoverTrac™: Automated Service-oriented Disaster Recovery by FalconStor Software

February 04, 2013 - (Free Research)
This white paper explores a disaster recovery solution that gives you peace of mind by removing complexity from the equation. Read on to get a detailed account of FalconStor's RecoverTrac technology and how it can help you address a full range of disaster recovery challenges. 
(WHITE PAPER) READ ABSTRACT |

Secure and Effective Data Extraction from the SAP® ERP System by Winshuttle, LLC

December 2008 - (Free Research)
This white paper describes the variety of tools available for such ad-hoc reporting applications and compares and contrasts these tools in terms of their ease-of-use and security. 
(WHITE PAPER) READ ABSTRACT |

Leveraging Virtualization in the Data Center by Force10 Networks

April 2007 - (Free Research)
Data center networking must change with the implementation of server virtualization. This white paper provides best practices for building a network architecture in a virtual environment and offers tips on advanced Ethernet witch/routers and more. 
(WHITE PAPER) READ ABSTRACT |

How to Choose a Cloud Backup Provider by Asigra

August 2011 - (Free Research)
Many people think the only question is to ask when thinking about backup and recovery is "What is the best way to make backups?" That’s certainly a critical question but business data is the very lifeblood of your business. You can’t afford to look at only half the equation. Recovery is vital as well, especially when choosing a cloud provider. 
(WHITE PAPER) READ ABSTRACT |

New Storage Model Reflects Business Value and Immediate Cost Savings by Asigra

November 2013 - (Free Research)
This white paper showcases the impact that trends like the cloud, mobile computing and big data are having on today's IT landscape, and introduces a software licensing solution designed to help you keep backup and recovery costs to a minimum. Read now to learn more! 
(WHITE PAPER) READ ABSTRACT |

The Complete Guide to Log and Event Management by Novell, Inc.

May 2011 - (Free Research)
This white paper will provide you with the information you need to purchase an Event and Log Management soutions. This paper outlines both the upside and downside to using both these services sepearte and together. 
(WHITE PAPER) READ ABSTRACT |

Magic Quadrant for Security Information and Event Management by LogRhythm, Inc.

July 2012 - (Free Research)
Access this white paper for a comprehensive comparison of the leading security information and event management (SIEM) providers. Read on for an overview of the SIEM market and the vendor landscape to help you evaluate your options. 
(WHITE PAPER) READ ABSTRACT |

Time-addressable and Event-addressable Storage: Combining Snapshots and Data Journaling for True Continuous Data Protection by American Megatrends Inc.

April 2008 - (Free Research)
Although there are many different ideas of what CDP is, it is clear that it must protect data in a manner that is both time-addressable and event-addressable. This white paper explains what this means and gives an overview of effective CDP ... 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 473 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts