Forrester Research Security 2006 2007Welcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Forrester Research Security 2006 2007 returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Virtualization
 •   Application Security
 •   Mobile Device Management
 •   Enterprise Systems Management
 •   Network Security
 •   Endpoint Security
 •   Security Policies
 •   Enterprise Data Protection and Privacy
 •   Wireless Technologies and Mobile Computing

Related Searches
 •   Designing Forrester
 •   Displays Forrester Research
 •   Forrester Lists
 •   Forrester Research Management
 •   Forrester Research Security Crm
 •   Forrester Research Security Missouri
 •   Forrester Research Tracking
 •   Forrester South Carolina
 •   Outsource Forrester Research
 •   Sales Forrester
Advertisement

ALL RESULTS
1 - 25 of 478 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Forrester Research: Improving Application Deployments - How an Application Delivery Architecture Can Help Businesses Overcome Deployment Challenges by F5 Networks

August 2007 - (Free Research)
Today's businesses must operate in a drastically changing environment. Forrester found most companies are not well equipped to reorient IT as a critical driver of top line success. This report showcases the results of an April 2007 Forrester survey. 
(WHITE PAPER) READ ABSTRACT |

The Total Economic Impact™ Of Dell’s Server Consolidation And Virtualization Solutions by Dell India

August 2007 - (Free Research)
The purpose of this Forrester study is to provide readers with a framework to evaluate the potential financial impact of the Dell Solution. Read this study to better understand and evaluate Dell's server consolidation and virtualization solutions. 
(ANALYST REPORT) READ ABSTRACT |

How Salesforce.com Transformed its Business to Agile by CA Technologies.

September 2010 - (Free Research)
Join this webcast to discover how cloud computing leader Salesforce.com transformed their software development process to Agile. Come and hear from expert Steve Greene, who led Salesforce.com’s transformation to Agile. 
(WEBCAST) READ ABSTRACT |

A Deep Dive on DevOps and Application Deployments, Featuring a Guest Speaker from Forrester Research, Inc. by Electric Cloud

September 2012 - (Free Research)
Watch this webcast to hear Forrester Research, Inc. analyst Glenn O'Donnell discuss current challenges in application deployment and best practices for creating strong communication and understanding between your development and operations teams. 
(WEBCAST) READ ABSTRACT |

The CIO As Portfolio Strategist by CA Technologies.

July 2011 - (Free Research)
As organizations undergo the transformation from IT to business technology (BT), they will have to make many important decisions in the process of moving from the current “as-is state” to the “to-be state.” Read this paper to learn how the CIO as a “portfolio strategist” can shape the decision-making relevant to implementing BT. 
(ANALYST REPORT) READ ABSTRACT |

Keep Your Enemies Closer - Get Proactive about Security by AT&T Corp

March 2011 - (Free Research)
Forrester Research Inc. guest speaker, Khalid Kark, VP-Research Director, along with Steve Hurst of AT&T, will highlight today's complex enterprise security environments, discuss the latest research on security infrastructure essentials and explain how managed security services can reduce your risk and simplify policy compliance. 
(WEBCAST)

Total Economic Impact of Oracle Enterprise Manager Database Management Packs by Oracle Corporation

February 2008 - (Free Research)
This study highlights the benefits and costs of deploying the Oracle Enterprise Manager Diagnostic Pack and Tuning Pack across the enterprise of a sample organization. The study examines the estimated ROI for the sample organization and presents aggregate findings derived from the interview and analysis process and Forrester's independent research. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Big Data Analytics: Emerging Techniques and Technology for Growth and Profitability by Endeca Technologies, Inc.

December 2011 - (Free Research)
This transcript of a webcast with Forrester Research principal analyst, Boris Evelson, will answer all your pressing questions about the value of your unstructured data and how you can successfully manage it. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Presentation Transcript: Determining First Network Access Control (NAC) Deployments For Your Organization by Bradford Networks

January 2009 - (Free Research)
Learn how different priorities trigger the need for network access control and see examples of how to get NAC up and running in a phased approach. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

The New Status Quo: Zero-Day and Targeted APT Attacks by FireEye

July 2011 - (Free Research)
During the webcast, Dr. Wang of Forrester Research and Ashar Aziz of FireEye will provide insight on data breach incidents and how to protect your company from cybercrime. 
(VIDEO) READ ABSTRACT |

Balancing Risk with Agility: Best Practices for Securing Cloud Deployments by Trend Micro

May 2014 - (Free Research)
Join a webinar hosted by Lauren E. Nelson, Lead Cloud Analyst, Forrester Research and Mark Nunnikhoven, Principal Engineer, Trend Micro on May 28, 2014 at 12PM EST for best practices to better secure cloud applications and data while minimizing cost and complexity. 
(WEBCAST) READ ABSTRACT |

Supporting the Zero Trust Model of Information Security: The Important Role of Today's Intrusion Prevention Systems by IBM

September 2013 - (Free Research)
This Forrester Research, Inc. report introduces a zero trust model to reduce risk of insider and outsider threats. Click through to learn how the intrusion prevention system (IPS) can be used to fulfill this model. 
(WHITE PAPER) READ ABSTRACT |

Build Your Identity And Access Management Strategy by Symplified

March 2012 - (Free Research)
This Forrester Research, Inc., paper explores the current and future states of identity and access management and describes steps your organization should take to create an IAM strategy and successfully put it into use. 
(WHITE PAPER) READ ABSTRACT |

Unlock security success: Is security intelligence the key? by IBM

December 2012 - (Free Research)
This report from Forrester Research takes an inside look at the security intelligence (SI) market, explaining why SI needs to be an IT priority. Also inside, learn about the ongoing challenges that CISOs face, discover the growing interest in security-as-a-service, and more. 
(ANALYST REPORT) READ ABSTRACT |

Expert Analyst Reviews the Ins and Outs of Database Encryption by Guardium, an IBM Company

February 2010 - (Free Research)
In this expert E-Guide, learn the ins and outs of database encryption. Jonathon Penn, principal analyst at Forrester Research Inc., reviews desktop, laptop and full disk encryption and outlines a cost-effective approach for managing security. Also discover three questions you must answer before embarking on any encryption project. 
(EGUIDE) READ ABSTRACT |

Forrester Study: Total Economic Impact of WebSphere Application Server by IBM

May 2010 - (Free Research)
Forrester Research recently conducted a study to determine the total economic impact (TEI) on one organization that replaced its existing open source application server with a market-leading application development platform alternative. Read this report to discover the benefits this company achieved. 
(WHITE PAPER) READ ABSTRACT |

How to Overcome Security Skills Deficiencies by IBM

May 2013 - (Free Research)
This Forrester Research report explores how security leaders are confronting the challenges in recruiting and retaining technical security architects, specialists and staff, paying special attention to how managed security services providers (MSSPs) are critical to staying one step ahead of the security curve. View now to learn more! 
(WHITE PAPER) READ ABSTRACT |

The iPad Invasion: Leveraging SharePoint for Mobile Enterprise Security by Colligo Networks Inc.

June 2012 - (Free Research)
In order to leverage SharePoint and provide data access across a variety of technologies and locations, businesses everywhere are looking to integrate tablets into the enterprise, particularly the iPad. Check out this webcast to hear more on how iPads are changing the IT landscape and common challenges for iPads in the enterprise. 
(WEBCAST) READ ABSTRACT |

The iPad Invasion: Leveraging SharePoint for Mobile Enterprise Security by Colligo Networks Inc.

June 2012 - (Free Research)
In order to leverage SharePoint and provide data access across a variety of technologies and locations, businesses everywhere are looking to integrate tablets into the enterprise, particularly the iPad. Check out this webcast to hear more on how iPads are changing the IT landscape and common challenges for iPads in the enterprise. 
(WEBCAST) READ ABSTRACT |

The Forrester Wave™: Enterprise Service Bus, Q2 2011 by Red Hat

April 2011 - (Free Research)
Over the course of 2010 and 2011, Forrester Research spoke to hundreds of customers about their enterprise service bus (ESB) activities, and conducted briefings and demonstration reviews as well as over twenty customer interviews to evaluate five commercial and four open source ESB product vendors. Access this paper to examine Forrester's findings. 
(ANALYST REPORT) READ ABSTRACT |

Killing Data by Voltage Security, Inc.

February 2012 - (Free Research)
Traditional perimeter-based security controls are no longer effective as today’s threat landscape continues to evolve and cybercriminals become more skillful and advanced. This Forrester Research resource examines how encrypting data – both in motion and at rest – is a more effective way to keep up with determined cybercriminals. 
(WHITE PAPER) READ ABSTRACT |

Why Database Archiving Should Be Part of Your Enterprise DBMS Strategy by Clearpace Software

August 2008 - (Free Research)
Enterprises that archive their database often find more than one benefit to doing so, whether it’s business, infrastructure, or cost-related. In addition, the value of archiving grows considerably as it becomes easier to access 
(WHITE PAPER) READ ABSTRACT |

E-Guide: How Risk Management Standards Can Work For Enterprise IT by ArcSight, an HP Company

December 2010 - (Free Research)
Every organisation should be able to articulate how IT threats can harm a business. In this e-guide, Forrester Research Analyst Chris McClean explains how a five-step risk management strategy can add value to the rest of the organisation. 
(EGUIDE) READ ABSTRACT |

The Forrester Wave™: Platform-As-A-Service For App Dev And Delivery Professionals, Q2 2011 by Salesforce.com

July 2011 - (Free Research)
Forrester Research, Inc. evaluated top platform-as-a-service (PaaS) vendors for Q2, 2011 and found that salesforce.com leads in PaaS for business experts, offering a strong strategy and comprehensive features for application development. Learn more about why Forrester names Force.com a platform leader. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Application Development-- Improving Productivity Among Evolving Application Platforms by ASG Software Solutions

July 2010 - (Free Research)
Join special guest Jeffrey S. Hammond, Principal Analyst at Forrester Research, Inc., and Ian Rowlands from ASG, as they discuss some of the options shops have at their disposal for improving consistency and cross platform governance of your application development efforts. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

1 - 25 of 478 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts