Functions Security ProfileWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Functions Security Profile returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Application Security
 •   Virtualization
 •   Business Intelligence Solutions
 •   Enterprise Information Integration/ Metadata Management
 •   Identity Management/ User Provisioning
 •   Data Quality
 •   Network Security
 •   Application Management and Maintenance
 •   Security Policies

Related Searches
 •   Chart Functions
 •   Collection Functions
 •   Functions Faq
 •   Functions Schedule
 •   Functions Security Benefit
 •   Functions Security Licenses
 •   Functions Starting
 •   Industries Functions Security
 •   Research Functions Security Profile
 •   Standard Functions
Advertisement

ALL RESULTS
1 - 25 of 478 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..
Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

When Good Applications Go Bad: Adding Application Control to your Toolbox by Fortinet, Inc. / Alternative Technology Group of Arrow ECS

October 05, 2009 - (Free Research)
Check out this podcast transcript for the latest information about application security threats and how Fortinet can provide multi-function security system solutions as well as an award-wining Partner Program. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Presentation Transcript: Configuring and Using IBM i's Auditing Functions by PowerTech

April 06, 2010 - (Free Research)
Did you know that IBM i includes powerful auditing features? In fact, our own class-leading audit reporting solution leverages the information captured by this facility. Read this presentation transcipt - based on content presented at the 2009 COMMON conference - to learn about activating and configuring IBM i's built-in auditing capabilities. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Configuring and Using IBM i's Auditing Functions by PowerTech

March 03, 2010 - (Free Research)
Did you know that IBM i includes powerful auditing features? In fact, our own class-leading audit reporting solution leverages the information captured by this facility. Join this webinar-based on content presented at the 2009 COMMON conference-to learn about activating and configuring IBM i's built-in auditing capabilities. 
(WEBCAST) READ ABSTRACT |

iTest Team - Rapid Test Automation for Equipment and Devices by Fanfare

iTest Team is an integrated test environment for developers, testers, and automation teams. It offers a unified approach for rapidly developing, automating, and maintaining test cases. iTest Team tests complex equipment and systems that are accessed through various protocols, such as command line interfaces, Web interfaces, SNMP, or command shells. 
(SOFTWARE PRODUCT)

IT Risk Management: Guide to Software Risk Assessments and Audits by Veracode, Inc.

June 07, 2010 - (Free Research)
Risk is a function of the likelihood that a potential vulnerability will be exploited, and the resulting impact of that exploitation. In IT systems, risk can be introduced from the internet, servers, networks, malicious insiders, and even lapses in physical security. This whitepaper provides IT risk management best practices. 
(WHITE PAPER) READ ABSTRACT |

Simple-to-Use Endpoint Security: Proactive Solutions for Networkwide Platforms by ESET

February 06, 2009 - (Free Research)
This white paper examines the looming threat horizon that is forcing companies to reexamine their endpoint security functions and discusses ESET’s solution for integrated security management that is built around its advanced heuristic technology. 
(WHITE PAPER) READ ABSTRACT |

The Cyber Savvy CEO: Getting to grips with today’s growing cyber-threats by ComputerWeekly.com

September 05, 2011 - (Free Research)
The recent surge in cyber attacks has forced organisations to align cyber security efforts across all of their operations, rather than focusing on IT, but CEOs now need to take the lead in protecting their organisations, this report from PwC argues. 
(IT BRIEFING) READ ABSTRACT |

Oracle Data Mining 11g Release 2 Competing on In-Database Analytics by Oracle Corporation

June 24, 2012 - (Free Research)
This paper offers an overview of Oracle Data Mining, detailing how you can build predictive models to better target customers, develop detailed customer profiles and detect and prevent fraud. Read on and learn how this data mining tool eliminates data extraction and movement, delivers the lowest TCO compared to traditional vendors and more. 
(WHITE PAPER) READ ABSTRACT |

Trust in Cyberspace by (ISC)2 UK Ltd

February 26, 2014 - (Free Research)
In this white paper, unveil a list of characteristics that define trusted software, which is critical to ensuring its quality and reliability as a secure product. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Storage and the WAN by Riverbed Technology, Inc.

April 01, 2009 - (Free Research)
Looking to connect your remote office devices to primary central files? Looking for a way to increase bandwidth without increasing costs? Download this WAN Special Report to learn more. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Symantec Workspace Profiles by Symantec

October 29, 2009 - (Free Research)
SWP is a new software product from Symantec's Endpoint Virtualization group. SWP separates (virtualizes) the user's profile (user data, settings and personality) from the underlying operating system allowing users to easily roam from device to device, work on two sessions simultaneously, or access their profile in the context... 
(SCREENCAST) READ ABSTRACT |

Strategies for Cisco VPN Client Large-Scale Deployments by Global Knowledge Network, Inc.

March 2006 - (Free Research)
This paper explores the tools Cisco provides to simplify mass deployments of the VPN Client. The two methods are discussed: the creation of an installation CD-ROM and network-based installations. I will explain how to reduce calls to the Help Desk by locking users out of advanced configuration functions in the user interface. 
(WHITE PAPER) READ ABSTRACT |

Resin Application Server Java EE 6 Web Profile by Caucho Technology

March 2010 - (Free Research)
Caucho Technology aims to certify the Resin 4 application server on the newly finalized Java EE 6 Web Profile. This white paper discusses the Java EE 6 Web Profile and how it fits with the development philosophy of Resin as well as the details of our implementation including Resin extensions to the Java EE 6 Web Profile. 
(WHITE PAPER) READ ABSTRACT |

Placing Advanced Analytic Integration In The Palm Of Your Hand by Pitney Bowes Business Insight

November 2010 - (Free Research)
Businesses are always searching for new resources that give them a better understanding of their customers, prospects, competition and current operations. This insight can be achieved by integrating analytical tools into their business processes. Read this presentation transcript to learn more. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

De-risking IT Lifecycle Management by ComputerWeekly.com

November 2012 - (Free Research)
Analysts Clive Longbottom and Rob Bamforth offer advice on managing IT assets more effectively. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Get Personal: Capitalize On Your Subscriber Data With a Unified User Profile by Hewlett-Packard Company

September 2008 - (Free Research)
This white paper discusses the role of user profile management. HP’s solution for this business issue is discussed as a means of addressing the subscriber experience infrastructure. 
(WHITE PAPER) READ ABSTRACT |

Get Personal: Capitalize On Your Subscriber Data With a Unified User Profile by Hewlett-Packard Company

September 2008 - (Free Research)
This white paper discusses the role of user profile management. HP’s solution for this business issue is discussed as a means of addressing the subscriber experience infrastructure. 
(WHITE PAPER) READ ABSTRACT |

Thinking through Uncertainty: CFOs Scrutinize Non-Financial Risk by IBM Line of Business

June 2008 - (Free Research)
Risks can impact the top and bottom line and eventually every risk is expressed in the company's share price. 
(WHITE PAPER)

What to Look for When Selecting a Master Data Management Solution by Talend

April 2013 - (Free Research)
In this guide, discover what you should look for when selecting a master data management (MDM) platform and learn how the right choice can help drive strategic business initiatives such as the cloud and big data. Continue reading to learn more. 
(WHITE PAPER) READ ABSTRACT |

White Paper: The Dynamic Warehousing Infrastructure - Establishing a Foundation to Meet New Information Requirements by IBM

January 2009 - (Free Research)
Learn how to create a roadmap for a truly dynamic warehousing infrastructure, and move ahead of your competition with your business intelligence system. 
(WHITE PAPER) READ ABSTRACT |

Data Quality - The Foundation of Operational Effectiveness by Pitney Bowes Group 1 Software

April 2008 - (Free Research)
Operational and analytical business processes rely on a solid, high-quality data foundation, but companies often neglect data quality until a major problem occurs that could've been avoided. Learn about the benefits and importance of da... 
(WHITE PAPER) READ ABSTRACT |

Get Personal: Capitalize on Your Subscriber Data with a Unified User Profile by Hewlett-Packard Company

November 2008 - (Free Research)
This IDC white paper discusses the role of user profile management in the telecom industry. Service providers' (SPs) efforts to manage, capitalize on, and provision user information across multiple databases are critical to fuel applications-led services. 
(WHITE PAPER) READ ABSTRACT |

Global profiles of the fraudster by ComputerWeekly.com

November 2013 - (Free Research)
Computers, rather than conmen, are set to be the future face of fraud, as criminals turn to robotics in an effort to avoid detection, this report from KPMG reveals. 
(ESSENTIAL GUIDE) READ ABSTRACT |

HOWTO Secure and Audit Oracle 10g & 11g: Account Security (Complimentary Chapter Download) by IBM

December 2010 - (Free Research)
Read this chapter from "HOWTO Secure and Audit Oracle 10g and 11g" (CRC Press, 2009) and learn how to secure Oracle by checking for weak passwords, configuring failed login policies, preventing DoS attacks with resource limits, and auditing user profiles. 
(EBOOK) READ ABSTRACT |

AppSense The Low down: What does user virtualization boil down to? by AppSense

June 2011 - (Free Research)
Traditional roaming profiles can no longer provide one, consistent and stable platform for your users. Access this exclusive resource to uncover the 10 reasons for adopting user virtualisation. 
(PRODUCT OVERVIEW) READ ABSTRACT |

1 - 25 of 478 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts