Frameworks Verisign UserWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Frameworks Verisign User returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Network Security
 •   Endpoint Security
 •   Security Monitoring
 •   Security Policies
 •   Identity Management/ User Provisioning
 •   Authentication / Password Management
 •   Application Security
 •   Enterprise Data Protection and Privacy
 •   Virtualization

Related Searches
 •   Computing Frameworks
 •   Filing Frameworks Verisign
 •   Frameworks Make
 •   Frameworks Sheets
 •   Frameworks Verisign User Arizona
 •   Frameworks Verisign User Consults
 •   Frameworks Verisign User Costing
 •   Frameworks Verisign User Global
 •   Frameworks Verisign User Manufacturing
 •   Frameworks Verisign User Techniques
Advertisement

ALL RESULTS
1 - 25 of 476 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

VeriSign® Identity Protection Fraud Detection Service by VeriSign EMEA

November 2008 - (Free Research)
This white paper explores how the VeriSign® Identity Protection (VIP) Fraud Detection Service helps organizations mitigate issues related to identity theft and insider threats. 
(WHITE PAPER) READ ABSTRACT |

VeriSign Mobile Enterprise Services: Enabling Next-Generation Mobile Messaging for Enterprises by VeriSign, Inc

December 2008 - (Free Research)
This Solution Paper provides an overview of the rapidly growing mobile messaging and alerts market, and introduces a solution that addresses that market: VeriSign Mobile Messaging, an offering of VeriSign Mobile Enterprise Services (VMES). 
(WHITE PAPER) READ ABSTRACT |

Managed Public Key Infrastructure: Securing Your Business Applications by VeriSign EMEA

December 2005 - (Free Research)
The VeriSign® Managed PKI service is an outsourced offering that enables enterprises of any size to rapidly and confidently deploy PKI services. It alleviates the burden of planning, building, and maintaining a PKI, while allowing enterprises to maintain internal control over digital-certificate issuance, suspension, and revocation. 
(WHITE PAPER) READ ABSTRACT |

Securing Microsoft Exchange 2010 with VeriSign Authentication Services by VeriSign EMEA

October 2011 - (Free Research)
This guide from VeriSign Authentication Services will help take the guesswork out of implementing SSL for Exchange 2010, making it easier than ever to get the SSL certificate you need for a successful and secure Exchange implementation, and to take advantage of powerful capabilities such as Subject Alternative Names (SANs). 
(WHITE PAPER) READ ABSTRACT |

jQuery on Rails (The Real Ones) by The Ajax Experience

January 2009 - (Free Research)
The talk examines how to develop and enterprise solution for leveraging a diverse server-side framework portfolio and deliver a consistent experience to end users. 
(PODCAST) READ ABSTRACT |

State of DNS Availability Report by Verisign, Inc.

November 2011 - (Free Research)
This domain name system (DNS) availability report illustrates the risks and impact that site downtime can have on revenue generation, business continuity, customer loyalty and more. 
(WHITE PAPER) READ ABSTRACT |

Implementing Metadata-Driven ETL Using Semantic Types by Expressor Software

October 2011 - (Free Research)
Read this white paper to learn how you can overcome many data integration challenges. 
(WHITE PAPER) READ ABSTRACT |

How to use Collaboration Oriented Architectures by ComputerWeekly.com

November 2010 - (Free Research)
Collaboration Oriented Architectures (COA) describes information architectures that comply with the COA framework, which in turn is described in the associated COA Framework paper1. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly - 14 February 2012: Does government IT deliver value for money? by ComputerWeekly.com

February 2012 - (Free Research)
This week’s Computer Weekly, investigates the costs of government IT, asking whether taxpayers are getting value for money from the 8,000 IT staff employed by Whitehall. We also examine how IT leaders are preparing for the growth of bring-your-own-device policies and the mobile security implications. 
(EZINE) READ ABSTRACT |

ITIL: What It Is and Why You Should Care by Global Knowledge Network, Inc.

September 2005 - (Free Research)
ITIL is becoming the next big thing in Information Technology. This paper outlines the origin of ITIL, who controls its contents, who are the biggest users, and why you should care. 
(WHITE PAPER) READ ABSTRACT |

eBook: The Shortcut Guide to User Workspace Management - Chapter 1: What Is User Workspace Management? by RES Software

October 2010 - (Free Research)
What is User Workspace management? Simply managing and transferring a user's personality data when migrating operating systems can be surprisingly time-consuming for IT pros. This first chapter will attempt to outline the framework that is User Workspace Management. 
(EBOOK) READ ABSTRACT |

Web Platform Installer 2.0 by Microsoft

October 2009 - (Free Research)
In one neat package, the Web Platform Installer gives you the frameworks, web server, database, tools and applications you need to quickly build and run Web applications and solutions on Windows. 
(TRIAL SOFTWARE)

Protecting User from Firesheep and Sidejacking Attacks with SSL by VeriSign EMEA

July 2011 - (Free Research)
This paper addresses the problems of unsecured Wi-Fi including recent security concerns such as the Firesheep and sidejacking and how to protect against these attacks. Learn how public websites can provide security with TLS/SSL by not only harden against many attacks, but also assure users of that security.   
(WHITE PAPER) READ ABSTRACT |

Performance Management Across the Application Lifecycle by Hewlett-Packard Company

February 2014 - (Free Research)
IDC claims that "poor performance is simply not an option" for customer-facing applications in today's competitive landscape. View this resource to discover a better framework for application performance, integrating the application lifecycle and the operations lifecycle to improve performance management from every angle. 
(WHITE PAPER) READ ABSTRACT |

DDoS Attacks Reach Critical Levels: How to Proactively Combat Network Threats by Verisign, Inc.

December 2012 - (Free Research)
This paper draws on Verisign's DDoS mitigation expertise to examine the threat of DDoS in the context of IT availability and enterprise risk management. 
(WHITE PAPER) READ ABSTRACT |

Composite Application Management: Bridging the IT Visibility Gap in Complex Composite Applications by Oracle Corporation

November 2008 - (Free Research)
As more and more IT shops deploy multitier middleware platforms and frameworks for the delivery of business-critical application services, they are expecting to garner the benefits of the service-oriented architecture (SOA) or composite application development approach: agility, flexibility, productivity, and extensibility. 
(WHITE PAPER) READ ABSTRACT |

DDoS Mitigation: Best Practices for a Rapidly Changing Threat Landscape by Verisign, Inc.

December 2012 - (Free Research)
This guide explores one company's set of best practices that enables organizations to keep pace with DDoS attacks while minimizing impact on business operations. 
(WHITE PAPER) READ ABSTRACT |

Consider the User Experience and Operational Efficiency by Cisco Systems, Inc.

November 2010 - (Free Research)
Cisco Services presents a series of four white papers to provide a framework for discovering compelling business cases and identifying the necessary services needed to deliver the desired experience. The second white paper in the series covers critical knowledge areas in the successful planning and design of a medianet or media-optimized network. 
(WHITE PAPER)

Adobe Flash Builder 4 by Adobe Systems, Inc.

January 2011 - (Free Research)
Enterprises are challenged to create easy to use rich Internet applications that enable users and customers to access and interact with data and content in more intuitive and visual ways. Download this trial software to learn more. 
(DOWNLOAD)

User Directed Storage Management: How To Make Users Accountable For Responsible Storage Usage by Northern Parklife

February 2009 - (Free Research)
The accelerated pace of doing business in today's world puts organizations under tremendous pressure. They need to be fleet and flexible, able to rapidly respond to opportunities, make decisions, and deploy resources. Critical to this is the way information is managed and stored. 
(WHITE PAPER) READ ABSTRACT |

Self-Management of Passwords (SMOP) Version 1.1 by turbo-IT Corporation

May 2011 - (Free Research)
Active Directory users often have their accounts locked out or forget their passwords.  This download empowers users to perform self service password resets and unlock their accounts eliminating helpdesk calls resulting in increased productivity and reduced costs. 
(DEMO) READ ABSTRACT |

Manage Oracle Database Users and Roles Centrally in Active Directory or Sun Directory by Oracle Corporation

August 2008 - (Free Research)
This paper illustrates how you can now centrally administer database users and role memberships leveraging your existing LDAP directories. 
(WHITE PAPER) READ ABSTRACT |

Managing the Dynamic Desktop with System Center Solutions by Microsoft

September 2009 - (Free Research)
System Center desktop solutions help IT to reconcile competing demands of security with resource availability by streamlining the connection of any authorized user to any application, regardless of their location or connectivity, through a unified system that provides both secure access and the consistent, optimized performance your users expect. 
(DATA SHEET) READ ABSTRACT |

Secure internet routing by ComputerWeekly.com

April 2014 - (Free Research)
This article in our Royal Holloway Information Security series assesses whether Resource Public Key Infrastructure can provide a framework for effective security. 
(ESSENTIAL GUIDE) READ ABSTRACT |

FAQ: Hadoop for BI and Analytics by SAP America, Inc.

December 2012 - (Free Research)
Despite its idiosyncrasies and lack of user-friendliness, the Apache Hadoop framework offers real advantages for organizations tackling big data challenges and real-time analytics. Access this e-guide for answers to FAQs for BI professionals seeking to leverage the benefits of this niche technology as part of their big data analytics initiatives. 
(EGUIDE) READ ABSTRACT |

1 - 25 of 476 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts