Fidelis Security 4 IntroductionWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Fidelis Security 4 Introduction returned the following results.
RSS What is RSS?
Related Categories

 •   Network Security
 •   Data Security
 •   Virtualization
 •   Storage Management
 •   Storage Security
 •   Application Security
 •   Data Center Management
 •   Endpoint Security
 •   Wireless Security
 •   Enterprise Data Protection and Privacy

Related Searches
 •   Fidelis Creation
 •   Fidelis Matrix
 •   Fidelis Multi
 •   Fidelis Security 4 Reseller
 •   Fidelis Security Budgets
 •   Fidelis Security Rfp
 •   Fidelis Whitepaper
 •   Make Fidelis
 •   Organizational Fidelis Security 4
 •   Price Fidelis
Advertisement

ALL RESULTS
1 - 25 of 465 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Introduction to using VMware vSphere with Dell/EMC Unified Storage by Dell, Inc.

May 01, 2009 - (Free Research)
This document provides a detailed overview of using EMC Celerra with VMware vSphere 4. VMware vSphere is an infrastructure virtualization suite that provides virtualization, management, resource optimization, application availability, and operational automation capabilities in an integrated package. 
(WHITE PAPER) READ ABSTRACT |

The Total Economic Impact of Lumension Security's Sanctuary by Lumension

September 2007 - (Free Research)
Lumension&#39s Sanctuary Application and Device Control is an IT-driven solution that automatically enforces endpoint security policies. The financial impact of moving from a &#34voluntary&#34 compliance solution to an &#34automatic&#34 one is illustrated 
(WHITE PAPER) READ ABSTRACT |

Sleeping Android: the danger of dormant permissions by ComputerWeekly.com

March 2013 - (Free Research)
This article in our Royal Holloway Information Security Thesis series explains how weaknesses in the Android platform could leave users open to exploitation or abuse. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Take Advantage of Oracle's 2 Day DBA Course by Oracle Corporation

February 2009 - (Free Research)
This course is designed to complement the Oracle 2 Day DBA documentation. In this course you will find detailed information on the tasks outlined in the chapters of the Oracle 2 Day DBA manual, including step-by-step instructions. 
(TRAINING GUIDE) READ ABSTRACT |

Introduction to Microsoft Dynamics CRM Online by Microsoft

September 2009 - (Free Research)
This webcast, with an introduction from Steve Ballmer, Microsoft CEO, examines the importance of CRM software has on a company’s bottom line. 
(WEBCAST) READ ABSTRACT |

Introduction to the IP Multimedia Subsystem (IMS): IMS Basic Concepts and Terminology by F5 Networks

August 2007 - (Free Research)
IMS is a whole new way to deliver multimedia regardless of the device or the access medium. This paper will change the way you relate to an increasingly digital world. 
(WHITE PAPER) READ ABSTRACT |

Quantum vmPRO Software: All-in-One Protection Solution for Virtual Machines by Quantum Corporation

November 2011 - (Free Research)
Check out this white paper to discover an integrated hardware/software solution designed to provide a complete data protection solution for your VMs. Included in this brief paper is an introduction to the features and benefits of this security solution. 
(WHITE PAPER) READ ABSTRACT |

ExaGrid Helps U.S. Federal Government Agencies Reduce Backup Windows, Improve Data Protection by ExaGrid Systems, Inc.

February 2012 - (Free Research)
Check out this study to learn how ExaGrid solutions enabled several U.S. government agencies to reduce backup windows and improve overall data protection practices. This resource provides an introduction to the specific solutions used as well as their benefits, and explores emerging deduplication and scalability concerns as well. 
(CASE STUDY) READ ABSTRACT |

Protecting Healthcare Organizations from Patient Data Loss by Code Green Networks, Inc.

September 2009 - (Free Research)
Negative publicity from a data breach can have lasting consequences, undermining patient confidence and damaging an organization's reputation. This paper covers potential data breaches within healthcare organizations and strategies for preventing them. Read on to learn more about the steps you can take to protect patients' sensitive information. 
(WHITE PAPER) READ ABSTRACT |

Technology Brief: An Introduction to Video in the Enterprise by Fluke Networks

October 2010 - (Free Research)
To help you get ready for video, Fluke Networks developed a four-page technology primer “An Introduction to Video in the Enterprise” that covers key market drivers, the four major types of video, and illustrates how streaming applications works.  
(WHITE PAPER) READ ABSTRACT |

Managing the Virtualization Maturity Lifecycle by CA Technologies.

June 2010 - (Free Research)
This CA Technologies video provides an introduction to a simple 4-step virtualization lifecycle maturity model, and introduces the key management disciplines and activities needed to drive virtualization maturity — and success — at every stage of the virtualization lifecycle. 
(VIDEO) READ ABSTRACT |

Whitepaper - Simplifying Disaster Recovery (DR): One-Button Failover/Failback for Combined Physical/Virtual Data Centers by FalconStor Software

February 2010 - (Free Research)
The FalconStor® Continuous Data Protector (CDP) solution can be deployed in conjunction with VMware vCenter Site Recovery Manager. This unique implementation dramatically speeds both processes and reduces costs while ensuring achievement of recovery time objectives (RTO). 
(WHITE PAPER) READ ABSTRACT |

A Comprehensive Introduction to RSA SecurID User Authentication by RSA, The Security Division of EMC

November 2006 - (Free Research)
This white paper examines a two-factor authentication solution that helps efficiently manage the authentication of your company's users who access your network and web-based applications. 
(ARTICLE)

Introduction to Virtualization E-book, Chapter 6: How Virtual Infrastructures Change Security by SearchServerVirtualization

October 2009 - (Free Research)
Protecting the virtual data center doesn't need to be any more difficult than protecting a physical network. The key is to remain vigilant. In this chapter, you'll learn how to mitigate potential security risks to your resource pool and virtual machines without over-allocating administration. 
(EBOOK) READ ABSTRACT |

An Introduction to Security Assertion Markup Language (SAML) & Internet Single Sign-On by Ping Identity Corporation

August 2009 - (Free Research)
Check out this videocast to learn about Security Assertion Markup Language (SAML): what it is, how it works, and why it's important. 
(VIDEOCAST) READ ABSTRACT |

Introduction to Web Analytics for E-Commerce: How to Track Activity to Optimize Your Website by GeoTrust, Inc.

December 2011 - (Free Research)
This white paper explores the basics of web analytics and why they're important, what metrics you should track, and how you can use this information to optimize your site and encourage customers to visit often and buy more. 
(WHITE PAPER) READ ABSTRACT |

Introduction to Secure Coding for C/C++ by Klocwork

September 2011 - (Free Research)
When budgets, customers and reputations are at stake, software developers need every available tool to ensure that applications and code are as secure as possible. Going a step above and beyond, this interactive online learning center provides detailed lessons for securing C/C++ code. 
(RESOURCE CENTER) READ ABSTRACT |

Implementing a Telecommuting Program by Avaya Inc.

January 2008 - (Free Research)
This paper discusses several issues related to implementing a telecommuting home worker program for contact center agents. Certainly, the particular requirements of each company will dictate the extent to which these and other concepts are implemented. 
(WHITE PAPER) READ ABSTRACT |

The MATH, MYTH, & MAGIC: An Introduction to Identity Data Search-and-Match by Informatica

December 2008 - (Free Research)
This book is of value to both the person who is tackling a "name search" and "name matching" problem for the first time, as well as to the experienced specialist in "identification and search" systems. 
(BOOK) READ ABSTRACT |

An Introduction to Intelligent Desktop Virtualization (IDV) by Virtual Computer, Inc.

February 2012 - (Free Research)
Explore a desktop virtualization technology, Intelligent Desktop Virtualization (IDV), which can provide all the benefits of VDI with lower costs and complexity. Discover how IDV compares to VDI technology in this videocast. 
(VIDEOCAST) READ ABSTRACT |

Introduction to Virtualization E-book, Chapter 1: Virtualization Concepts in Disaster Recovery by Hewlett Packard Company and Intel

February 2009 - (Free Research)
Virtualization is changing the disaster recovery landscape. This E-Book is a beginners' guide to virtualization with chapters on disaster recovery (DR), test and development, server consolidation, high availability, storage, security and key technologies including VMware ESX,Microsoft Hyper-V and Citrix XenServer. 
(EBOOK) READ ABSTRACT |

SEKE Podcast - Introduction to Solera DeepSee by Solera Networks

February 2010 - (Free Research)
In this podcast presented by James Hilliard, host of the "See Everything, Know Everything" podcast, and Matthew Wood, Solera Networks' Chief Scientist, you'll learn about the DeepSee tool, which provides administrators, users and C-level executives at a corporation a way to see what is happening on a network in real-time. 
(PODCAST) READ ABSTRACT |

Provergent Suite - Telecom Order & Inventory Software by Digital Fairway, Inc.

The Provergent Communication Asset Management Suite helps to manage the planning, procuring, provisioning, auditing & delivering of communications services. Provergent allows you to build accurate & easy to manage centralized inventories, backed up by automated provisioning processes to manage all moves, adds, changes & deletes in the inventory. 
(SOFTWARE PRODUCT)

Introduction to Better Disk Backup for Virtual Machines by VMware, Inc.

November 2013 - (Free Research)
This white paper gives  an overview of the architecture, deployment, configuration and management of vSphere Data Protection, a backup and recovery solution for VMware, from VMware. 
(WHITE PAPER) READ ABSTRACT |

Securing your Online Data Transfer with SSL by Thawte Inc.

July 2012 - (Free Research)
This white paper provides an introduction to SSL security highlighting how it operates. Also included, is a discussion of the various applications of SSL certificates as well as their appropriate deployment. Additionally, uncover details regarding how to test SSL certificates on your web server. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 465 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts