Finds Wave Systems CorpWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Finds Wave Systems Corp returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Enterprise Data Protection and Privacy
 •   Network Security
 •   Virtualization
 •   Endpoint Security
 •   Storage Management
 •   Enterprise Systems Management
 •   Storage Security
 •   Security Policies
 •   Security Monitoring

Related Searches
 •   Finds Matrix
 •   Finds Technologies
 •   Finds Wave Demonstration
 •   Finds Wave Systems B2C
 •   Finds Wave Systems Improving
 •   Finds Wave Systems Profile
 •   Finds Wave Systems Repairs
 •   Full Finds Wave Systems
 •   Issues On Finds Wave
 •   Storage Finds
Advertisement

ALL RESULTS
1 - 25 of 468 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Information Security Magazine: “Health Care Data Protection” by Information Security Magazine

March 15, 2011 - (Free Research)
This month’s Information Security Magazine Online cover story dissects the recent HIPAA revisions made by the HITECH Act. 
(EGUIDE) READ ABSTRACT |

E-Book: Encryption - What, Where and How by SearchHealthIT.com

October 26, 2010 - (Free Research)
This e-book, brought to you by SearchHealthIT.com, discusses key issues health care IT pros are facing now, including: HIPAA, the HITECH Act and the new frontier for encryption, network and server encryption, using thin clients to keep data secure, and much more! 
(EBOOK)

E-Book: Data Protection Plans for Complying with Privacy Laws by SearchSecurity.com & SearchCompliance.com

October 21, 2010 - (Free Research)
This e-book, brought to you by SearchCompliance.com and SearchSecurity.com, discusses how to build a successful data protection strategy, as well as database security auditing tools, how to secure your mainframe, laptop encryption and more! 
(EBOOK) READ ABSTRACT |

WAVE SYSTEMS CASE STUDY - Mazda North American Operations by Wave Systems Corp.

September 27, 2010 - (Free Research)
THE CHALLENGE: Protect customer personal identifiable information and confidential business information on employee laptops scattered across North America without overburdening in-house IT resources. Read on to learn how they did it. 
(CASE STUDY) READ ABSTRACT |

EMBASSY Remote Administration Server (ERAS) by Wave Systems Corp.

February 01, 2008 - (Free Research)
Wave Systems' EMBASSY Remote Administration Server (ERAS) enables centralized IT administration to remotely deploy and manage PC clients that are equipped with Trusted Platform Modules (TPM) and/or Seagate Momentus® 5400 FDE.2 drives. 
(PRODUCT OVERVIEW) READ ABSTRACT |

Trusted Computing: What the Future Looks Like by Wave Systems Corp.

September 15, 2010 - (Free Research)
Ethernet transformed networking. USB forever shaped the perception of peripherals. Will Trusted Computing transform the way we compute? Hear Wave CEO Steven Sprague draw parallels between Trusted Computing and successes in the cellular and cable industries. 
(VIDEOCAST) READ ABSTRACT |

Data Breaches: A Growing Problem for the Healthcare Community by Wave Systems Corp.

March 17, 2011 - (Free Research)
While the pros of Electronic Medical Records (EMR) and online Healthcare Portals greatly outweigh the cons, their introduction comes at a price — an increased risk of both accidental and intentional data loss. 
(WHITE PAPER) READ ABSTRACT |

Trusted Computing: Leveraging Hardware Security in 350 Million Platforms by Wave Systems Corp.

August 24, 2010 - (Free Research)
Learn about Trusted Computing in today’s enterprise with this executive briefing on two different forms of embedded hardware security: the Trusted Platform Module (TPM) and self-encrypting drive (SED). Designed by the Trusted Computing Group (TCG) to counter the vulnerabilities of software-based security, and so much more. 
(VIDEOCAST) READ ABSTRACT |

Trusted Computing: Establishing Device Authentication by Wave Systems Corp.

August 24, 2010 - (Free Research)
View this video to learn the secret to better IT security may be at your fingertips. More likely than not, your PC contains a Trusted Platform Module (TPM), security chip on its motherboard. 
(VIDEOCAST) READ ABSTRACT |

April Essential Guide to Data Protection by SearchSecurity.com

April 11, 2012 - (Free Research)
In this Information Security Essentials Guide, gain expert insight into the increasing focus on data protection and uncover proven strategies for keeping your sensitive data secure. Explore topics including tokenization technology, 4 keys to DLP success, disaster recovery planning, and more. 
(EGUIDE) READ ABSTRACT |

August Technical Guide on Authentication by SearchSecurity.com

August 06, 2012 - (Free Research)
This white paper can help you discover why attackers can target the token vendor to take advantage of the security of the authentication system as a whole and how you can replace the ubiquitous authenticator in your business. 
(WHITE PAPER) READ ABSTRACT |

October Essentials Guide on Mobile Device Security by SearchSecurity.com

October 09, 2012 - (Free Research)
The October issue of Information Security offers advice on controlling the onslaught of employee-owned devices in your workplace, mitigating the risks of mobile applications, and changing your thought process when it comes to securing the consumerization of IT. 
(ESSENTIAL GUIDE) READ ABSTRACT |

The Forrester Wave: EnterpriseService Bus, Q2 2011 by Oracle Corporation

June 21, 2011 - (Free Research)
This Forrester’s Wave report provides an unbiased evaluation of the strengths and weaknesses of top ESB vendors across a range of criteria. This in-depth guide not only contains coverage of features, vendors and products, but also features real-world input from over 20 customers currently using the evaluated products. 
(ANALYST REPORT) READ ABSTRACT |

E-Guide: Chapter 3: Enterprise-Class Tape Library Purchase Considerations by Quantum Corporation

February 09, 2010 - (Free Research)
Now that you've reviewed the essential issues involved in any backup acquisition, this guide focuses on the specific considerations of enterprise-class tape libraries. You'll also find a series of specifications to help make on-the-spot product comparisons between vendors like Quantum Corp., Hewlett-Packard Corp., IBM, SpectraLogic Corp., and more. 
(EGUIDE) READ ABSTRACT |

Presentation Transcript: Virtualizing Business Critical Applications by Stratus Technologies

December 06, 2011 - (Free Research)
The second wave of virtualization will help many businesses extend the benefits of virtualization to additional applications and databases. Find out how self-managing, “zero-touch” infrastructure combined with vSphere virtualization and ftServer systems can help you immediately leverage the benefits of Stage 2 virtualization. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Podcast: Virtualizing Business Critical Applications by Stratus Technologies

November 22, 2011 - (Free Research)
The second wave of virtualization will help many businesses extend the benefits of virtualization to additional applications and databases. Find out how self-managing, “zero-touch” infrastructure combined with vSphere virtualization and ftServer systems can help you immediately leverage the benefits of Stage 2 virtualization. 
(PODCAST) READ ABSTRACT |

Protecting Your Multi-Platform Network: The New Wave of Attacks by ESET

June 20, 2011 - (Free Research)
Join us to examine some of the malware risks associated with heterogeneous computing environments and solutions to protect your valuable business assets. 
(WEBCAST) READ ABSTRACT |

Content Management Interoperable Services, A Social and Content-Centric Wave by IBM

September 13, 2011 - (Free Research)
Organizations have always struggled to find a common way to effectively manage, access, and govern content applications across multiple systems. Learn how CMIS can provide your business with improved operational efficiencies. 
(WHITE PAPER) READ ABSTRACT |

Choosing the Right Metropolitan Ring for Your Business by AT&T Corp

March 01, 2011 - (Free Research)
Businesses are evolving and looking for more effective and efficient methods of handling bandwidth, performance and end-point needs. In addition, they are trying to anticipate future needs to help make good networking decisions. 
(WHITE PAPER)

The Renewed Finance Function: Extending Performance Management Beyond Finance by SAP America, Inc.

September 2008 - (Free Research)
In August 2007, CFO Research Services launched a research program to explore the ways in which the role of the finance team has changed in recent years. This report presents the findings of our online survey of 255 senior finance executives. 
(WHITE PAPER) READ ABSTRACT |

The Forrester Wave: Mobile Collaboration, Q3 2011 by IBM

November 2011 - (Free Research)
Mobile communications have been a stronghold in the workforce. Mobile collaboration is putting collaboration workloads onto smartphones and tablets and delivering great user experience anytime, anywhere, on any device. 
(WHITE PAPER) READ ABSTRACT |

Maximize Your Storage Spend by Doing More with Less - Transcript by Red Hat

February 2012 - (Free Research)
Download this presentation transcript to discover how to free yourself from vendor lock-in by expensive proprietary storage hardware companies, and learn how you can take advantage of today's new wave of storage buying. Find out how you can do more with your existing storage and spend less time and money to accommodate changing workloads. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

The 18 Social Business Imperatives by Jive Software

January 2014 - (Free Research)
Access the following white paper to uncover 18 social business imperatives. Find out what knowledge, tools, and strategies you need to capitalize on the second wave of the social rise. 
(WHITE PAPER) READ ABSTRACT |

Storage Magazine finds Dell top Enterprise NAS vendor by Dell, Inc.

January 2014 - (Free Research)
Dive into this Storage magazine article to discover what Rich Castagna, editorial director of TechTarget's Storage Media Group, has to say about the 2 top dogs for NAS systems. Read on to see which vendor claimed the best enterprise-class NAS system, and which topped the midrange group in our 8th Quality Awards survey. 
(JOURNAL ARTICLE) READ ABSTRACT |

Employee-owned Smartphones: Seize the Opportunity by BlackBerry

September 2011 - (Free Research)
It’s no longer feasible for an IT department to ignore the smartphone push from the majority of the employee population. IT management must attempt to channel the chaos and determine ways to embrace the personal mobility wave while maintaining effective security and management measures, especially in relation to the corporate network. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 468 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts