Function AssessmentWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Function Assessment returned the following results.
RSS What is RSS?
Related Categories

 •   Network Security
 •   Data Security
 •   Vulnerability Assessment
 •   Application Security
 •   Security Policies
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)
 •   Security Monitoring
 •   Application Management and Maintenance
 •   Business Process Management (BPM)
 •   Network Management

Related Searches
 •   Consulting Function Assessment
 •   Consults Function Assessment
 •   Downloads Function Assessment
 •   Export Function
 •   Function Assessment Claims
 •   Function Assessment New Hampshire
 •   Function Assessment Professional
 •   Function Assessment Retail
 •   Function Strategies
 •   Proposal Function
Advertisement

ALL RESULTS
1 - 25 of 465 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Understanding and Selecting a Database Assessment Solution by Application Security, Inc.

February 22, 2010 - (Free Research)
In this analyst report, Securosis’ Adrian Lane explores the inner workings of assessment tools and the business value they provide, and will make specific recommendations on evaluating, purchasing, and deploying Database Assessment. 
(ANALYST REPORT) READ ABSTRACT |

Multiplying MES Value with PLM Integration by Apriso Corporation

August 2008 - (Free Research)
MES platforms have, and continue to provide, significant opportunities to integrate manufacturing functions while reducing wasted time, energy, and material on the factory floor. 
(WHITE PAPER) READ ABSTRACT |

Taking a Strategic Approach to Risk Management by TraceSecurity

December 2012 - (Free Research)
This e-guide will provide readers with the understanding they need to address potential security threats and risk mitigation while efficiently utilizing available resources. Topics covered include operational risk, risk management and compliance policies, the risk assessment process, and more. 
(EGUIDE) READ ABSTRACT |

Creating an Effective Security Operations Function by RSA, The Security Division of EMC

October 2008 - (Free Research)
Read this white paper to understand all the activities and roles in a security operations function - your first step in making those operations more effective and efficient. 
(WHITE PAPER) READ ABSTRACT |

IT Risk Management: Guide to Software Risk Assessments and Audits by Veracode, Inc.

June 2010 - (Free Research)
Risk is a function of the likelihood that a potential vulnerability will be exploited, and the resulting impact of that exploitation. In IT systems, risk can be introduced from the internet, servers, networks, malicious insiders, and even lapses in physical security. This whitepaper provides IT risk management best practices. 
(WHITE PAPER) READ ABSTRACT |

The Ties That Bind by SearchCIO.com

February 2014 - (Free Research)
Enterprise compliance and security departments should work together to achieve business goals. Find out how this tandem can battle the regulatory and IT threat landscape. 
(EGUIDE) READ ABSTRACT |

Cisco Tidal Assessment Service for SAP Performance by Cisco Systems, Inc.

December 2010 - (Free Research)
Read this paper to discover how to improve overall application functioning by identifying and remediating performance issues and hidden pain points throughout your SAP environment. 
(WHITE PAPER) READ ABSTRACT |

Getting Started on a Unix-To-Linux Migration by Red Hat

May 2014 - (Free Research)
In this expert e-guide, learn how to make the migration less complex and more fun. From starting your migration with a thorough assessment to examining the code and determining the system administration functions. 
(EGUIDE) READ ABSTRACT |

Mobile NAC: Protecting Network Security by Protecting Mobile Endpoints by Fiberlink Communications

June 2008 - (Free Research)
This white paper discusses a new approach to Network Access Control that overcomes both of these shortcomings of conventional NAC products. 
(WHITE PAPER) READ ABSTRACT |

Business Skill Courseware by SkillSoft Corporation

SkillSoft’s Business Skills Library focuses on behavioral skills that are designed for business professionals and key to performance regardless of job responsibility, as well as the skills and knowledge that are relevant to the various areas of functional responsibility in today’s business organizations. 
(ASP & SOFTWARE PRODUCT)

The SonicWALL Approach to Consolidating Network Security Infrastructure and Cutting Costs by SonicWALL

July 2009 - (Free Research)
This brochure identifies the substantial benefits available to organizations that elect to replace their network security point products with UTM devices. It explains the combination of innovative features/functions and robust, platform-level capabilities that enable customers of SonicWALL UTM products to maximize their gains due to consolidation. 
(BROCHURE) READ ABSTRACT |

Unraveling Web Malware by FireEye

September 2008 - (Free Research)
There has been a rapid rise in the use of web blended threats. Defending corporate networks from these threats requires modern protection that functions on many levels. Find out how cyber criminals infiltrate your network and how FireEye's blended defense against Web malware prevents data loss and intellectual property theft. 
(WHITE PAPER) READ ABSTRACT |

eBook: Software as a Service: What You Should Consider When Moving to SaaS by SearchSecurity.com

November 2008 - (Free Research)
Check out this expert eBook and learn about the current trends in the SaaS market and find out how these services can help your company thrive in today's difficult economy. 
(EBOOK) READ ABSTRACT |

Presentation Transcript: Understanding Risk: An Opportunity for IT Managers by IBM

December 2010 - (Free Research)
This presentation transcript of the webcast “Understanding Risk: An Opportunity for IT Managers” outlines the results of an IBM Global Risk Study that was commissioned to understand how IT managers are working to understand and mitigate risk. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Identity Finder Enterprise Suite 4.5 by Identity Finder, LLC

July 2010 - (Free Research)
Identity Finder accurately finds and allows remediation of sensitive data across desktops, laptops, servers, databases, and websites. This can be performed agent or agentlessly with full dynamic policy and reporting capability. 
(TRIAL SOFTWARE) READ ABSTRACT |

Email as Part of a Business Continuity Strategy: Why always-on-business requires always-on-email by Mimecast

November 2010 - (Free Research)
The paper looks at the general approaches available to ensure email continuity from a high level and the implications of deploying each strategy on infrastructure, budget, people and resilience. 
(WHITE PAPER) READ ABSTRACT |

Best Practices in Creating a Strategic Finance Function by SAP America, Inc.

January 2009 - (Free Research)
the following article will share the results of SAP research as well as APQC's Open Standards Benchmarking Collaborative (OSBC) research. The OSBC research is the first global set of common standards for business processes and data, giving organizations an independent, authoritative resource for evaluating and improving business practices. 
(WHITE PAPER) READ ABSTRACT |

The Education Edge: School Administration Software by Blackbaud

This complete solution was developed exclusively for school administrators to help effectively manage every aspect of school administration and student information. 
(SOFTWARE PRODUCT)

Dell's Application Migration and Management Services by Dell, Inc. and Microsoft

December 2009 - (Free Research)
Dell's application migration services include application compatibility assessment, remediation, and expert packaging using Dell's unique, global, scalable, and cost effective factory approach. 
(DATA SHEET) READ ABSTRACT |

Securing the Foundation of Information Technology (IT) Systems by Trusted Computer Solutions

January 2010 - (Free Research)
This paper explains how there is no one process to make any organization 100% secure, but establishing a company-wide security policy based on industry-standard best practices is a good place to start. Many of these best practices can be implemented as part of the operating system assessment and lock down process. 
(WHITE PAPER) READ ABSTRACT |

Vulnerability Assessment by Symantec Corporation

October 2013 - (Free Research)
Access this white paper for the truth behind today's vulnerability assessment approaches, and why a clearer vision of the problem is needed for more successful security systems. Click now to unveil an opportunity to bridge the gap between vulnerability assessment and security management, and use actionable intelligence as effective defense. 
(WHITE PAPER) READ ABSTRACT |

Mobile Configuration Management Functions for Successful MDM by SearchSecurity.com

July 2013 - (Free Research)
Configuration management is one of the most essential (if not the most essential) function served by mobile device management. In this expert guide from SearchConsumerization.com, you'll get a detailed look at the considerations you need to take concerning configuration management. 
(EGUIDE) READ ABSTRACT |

Business Case for VoIP Readiness Assessment by Fluke Networks

August 2009 - (Free Research)
This white paper explains why it is essential to perform a readiness assessment both for initial VoIP deployment and also for expansion projects to avoid unplanned additional costs and deployment delays. 
(WHITE PAPER) READ ABSTRACT |

Configuration Assessment: Choosing the Right Solution by Tripwire, Inc.

July 2008 - (Free Research)
Check out this white paper to discover how automated configuration assessment solutions like Tripwire Enterprise help ease the burden on IT of achieving and maintaining compliance, securing the IT infrastructure, and generating evidence for mandatory audits. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Assessment Success: PCI DSS Standards and Secure Data Storage by IBM

March 2011 - (Free Research)
In this e-guide, our expert will share some tactical advice to help organizations simplify the assessment process by streamlining their data storage practices and reducing PCI DSS assessment scope. Continue reading this e-guide to learn more about how to simplify the assessment process of PCI DSS standards and secure data storage. 
(EGUIDE) READ ABSTRACT |

1 - 25 of 465 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts