Gartner It Security MassachusettsWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Gartner It Security Massachusetts returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Virtualization
 •   Data Center Management
 •   Enterprise Data Protection and Privacy
 •   Network Security
 •   Storage Security
 •   Customer Relationship Management (CRM)
 •   Security Policies
 •   Business Intelligence Solutions
 •   Storage Management

Related Searches
 •   Content Gartner It Security
 •   Diagram Gartner It Security
 •   Documents Gartner It
 •   Gartner Contract
 •   Gartner It Backup
 •   Gartner It Format
 •   Gartner It Security Office
 •   Gartner Layout
 •   Using Gartner It Security
 •   Version Gartner
Advertisement

ALL RESULTS
1 - 25 of 443 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Are you securing the right things? How to effectively secure your data by ComputerWeekly.com

October 13, 2010 - (Free Research)
The idea of putting walls around the network is being replaced by a drive to understand what really needs to be secured and how to secure it. This paper examines the relative merits of the different approaches. 
(WHITE PAPER) READ ABSTRACT |

The Massachusetts Data Protection Law by SearchSecurity.com & SearchCompliance.com

June 18, 2009 - (Free Research)
Massachusetts businesses facing down MA 201 CMR 17.00 can meet the challenge with preparation and execution. Read this e-book to learn more about important topics such as identity theft, data breach prevention, mandatory encryption, and getting ahead of the game where Massachusetts data protection law is concerned. 
(EBOOK) READ ABSTRACT |

The business impact of data security regulations: Featuring Massachusetts by Sophos, Inc.

June 11, 2009 - (Free Research)
This article discusses some aspects of a new regulation -- 201 CMR 17:00 -- and offers suggestions on how data security best practices can help with compliance. Companies should discuss the regulation in detail with their legal consul to examine how it affects their unique circumstances and the best course of action to be taken. 
(WHITE PAPER) READ ABSTRACT |

The Business Impact of Data Security Regulations: Featuring Massachusetts by Sophos, Inc.

November 19, 2009 - (Free Research)
Massachusetts has taken the lead in passing a new regulation - 201 CMR 17:00 -that requires companies to implement a comprehensive data security plan that includes encryption. This article discusses some aspects of this regulation and offers suggestions on how data security best practices can help with compliance. 
(WHITE PAPER) READ ABSTRACT |

VDI Done Differently: A Case Study - Town of Lincoln, Massachusetts by Virtual Computer, Inc.

May 16, 2011 - (Free Research)
How did one man manage the entire desktop infrastructure of Lincoln, Massachusetts? A near-constant demand for physical desktop support meant high inefficiency for critical public works. This case study reveals how one IT director moved his town forward to a hardware refresh and Windows 7 migration by leveraging desktop virtualization. 
(CASE STUDY) READ ABSTRACT |

Manchester Essex Regional School District: Virtualization helps a Massachusetts school district deliver better education while reducing costs, IT staff burdens and environmental impact by VMware, Inc.

July 12, 2011 - (Free Research)
The Manchester Essex Regional School District was looking to build a new school for its 8500 student body, tasking the IT department with finding the most effective way to help build and manage an energy-efficient IT infrastructure. This white paper highlights how VMware data center virtualization and other software helped them achieve their goals. 
(WHITE PAPER) READ ABSTRACT |

Gartner: Attachmate's acquisition of Novell – what does it mean for Novell customers? by ComputerWeekly.com

February 08, 2011 - (Free Research)
On 22 November 2010, Attachmate, a privately held software company based in Houston, announced that it had signed a definitive agreement to acquire the Waltham, Massachusetts-based technology provider Novell. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly - 19 June 2012: How to succeed at desktop virtualisation by ComputerWeekly.com

June 19, 2012 - (Free Research)
In this week’s Computer Weekly, our latest Buyer's Guide examines best practice in desktop virtualisation. We ask if a six-year-old technology could be a key to tackling IT security threats. And we look at how universities are dealing with their IT challenges as they await the first intake of students at new higher tuition fees. Read the issue now. 
(EZINE) READ ABSTRACT |

E-Guide: Information Security Essential Guide to Compliance by Information Security Magazine

July 06, 2010 - (Free Research)
Compliance with government regulations and industry standards shapes the formation of most information security programs. There’s no way around it; your organization must comply. This essential guide will help you sort out and prioritize your compliance responsibilities. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Information Security Magazine - February 2010: Under Control by Information Security Magazine

February 03, 2010 - (Free Research)
Feature articles this month cover bringing data loss prevention coverage to mobile endpoints, readers’ security priorities and top investments for 2010, and new compliance mandates in Massachusetts and Nevada that signal a new generation of data protection laws. Read on for these great articles and more. 
(EZINE)

Case Study: Physician Organization Secures VMware Virtualized Environment with Trend Micro Deep Security  by Trend Micro

October 26, 2009 - (Free Research)
This case study illustrates how a physicians' organization providing medical management services to 1,500 members was able to introduce Trend Micro's Deep Security solution and achieve increased security, increased flexibility, reduced costs, streamlined administration, and easy scalability. 
(CASE STUDY) READ ABSTRACT |

ROI Case Study: Imprivata OneSign South Shore Hospital by Imprivata

March 31, 2014 - (Free Research)
Read this case study to see how one hospital is benefitting after choosing a leading VDI and SSO solution that greatly improved their security and productivity rates across the facility. 
(WHITE PAPER) READ ABSTRACT |

Gartner: Time to rethink backup procedures by ComputerWeekly.com

February 04, 2014 - (Free Research)
IT leaders and storage managers can realise cost savings and improve their use of backup infrastructure by rethinking their back-up procedures, says Gartner analyst Dave Russell. 
(ANALYST BRIEF) READ ABSTRACT |

The reality behind the hype: Government cloud computing by ComputerWeekly.com

November 23, 2011 - (Free Research)
This article from Gartner offers advice to public sector organisations thinking of deploying cloud computing and assess the progress made by governments in their use of the cloud. 
(ANALYST BRIEF) READ ABSTRACT |

Top Ten Essentials for Privileged Account Management by FoxT

February 01, 2010 - (Free Research)
In this white paper, discover how you can effectively and efficiently control privileged accounts using the latest in adaptive access controls management. You will also learn about how to leverage the latest in Role-Based Access Controls. 
(WHITE PAPER) READ ABSTRACT |

Gartner: Five trends that will affect your cloud strategy by ComputerWeekly.com

April 23, 2012 - (Free Research)
Businesses need to keep a close eye on the evolution of cloud based services to avoid wasting money and missing out on business opportunities. 
(ANALYST BRIEF) READ ABSTRACT |

Computer Weekly - 3 April 2012: Data security best practice by ComputerWeekly.com

April 03, 2012 - (Free Research)
This week’s Computer Weekly kicks off our Buyer's Guide to data security by looking at the changing role of the IT security chief. We also examine why flexible working is proving so slow to roll out and we talk to the UK's air traffic control operator about its ambitious desktop virtualisation project. 
(EZINE)

Enterprise Content Management for Transforming Government by EMC Corporation

December 10, 2010 - (Free Research)
Read this issue brief by Center for Digital Government to learn how the Commonwealth of Massachusetts and the County of San Diego are improving service delivery by managing information electronically.  What benefits could ECM bring to your agency? 
(WHITE PAPER) READ ABSTRACT |

Desktop Virtualization in K-12 Schools: Reducing costs, saving time and delivering anytime, anywhere access for students and staff by VMware, Inc.

August 24, 2011 - (Free Research)
This paper will show how desktop virtualization can positively position educational institutions for the future, enabling them to reduce expenses through hard dollar savings and time efficiencies while delivering the experience that students, faculty and staff need and desire. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly - 29 November 2011: Read this week’s issue of the UK’s leading technology publication, featuring the latest news, analysis and opinion about UK IT by ComputerWeekly.com

November 28, 2011 - (Free Research)
In this week's Computer Weekly, we go behind the scenes at the datacentre that knows everything about you, at credit checking firm Experian. We analyse the government's new plans to change the way it works with IT suppliers; and kick-off our Buyer's Guide to outsourcing with a look at the latest trends. Download the new issue now. 
(EZINE)

E-Guide: Gartner Magic Quadrant: Oracle and SAP prepare for data quality battle by SAP America, Inc.

December 09, 2011 - (Free Research)
In this brief yet insightful e-guide, you will get a side-by-side comparison of SAP and Oracle's data quality portfolios along with expert advice. 
(EGUIDE) READ ABSTRACT |

Gartner 2013 Magic Quadrant for Security Information and Event Management Report by Hewlett-Packard Limited

December 31, 2013 - (Free Research)
This analysis report measures the adoption of SIEM technology pertaining to specific vendors. 
(ANALYST REPORT) READ ABSTRACT |

Gartner: Best practices for I&O for cloud-readiness by ComputerWeekly.com

January 14, 2013 - (Free Research)
Gartner analysts explain how Infrastructure and Operations (I&O) teams can best prepare for the cloud. 
(ANALYST BRIEF) READ ABSTRACT |

Gartner: HTML5 and the journey to the modern web by ComputerWeekly.com

July 31, 2012 - (Free Research)
Gartner analysts explain what steps IT departments need to take to take advantage of HTML5 and why they need to act sooner rather than later. 
(ANALYST BRIEF) READ ABSTRACT |

Gartner: Decide now if you will become a money-making CIO by ComputerWeekly.com

January 24, 2011 - (Free Research)
This report from Gartner describes six distinctly different styles of "money-making CIO" that are likely to evolve between 2011 and 2020. 
(ANALYST BRIEF) READ ABSTRACT |

1 - 25 of 443 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts