Group Physical SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Group Physical Security returned the following results.
RSS What is RSS?
Related Categories

 •   Virtualization
 •   Data Center Management
 •   Data Security
 •   Storage Management
 •   Enterprise Data Protection and Privacy
 •   Backup Systems and Services
 •   Security Policies
 •   Network Security
 •   Application Security
 •   Identity Management/ User Provisioning

Related Searches
 •   Device Group
 •   Devices Group Physical
 •   Expense Group Physical
 •   Group Asp
 •   Group Physical Security Businesses
 •   Group Physical Security Net
 •   Group Physical Security Rfq
 •   Improving Group
 •   Metrics Group Physical Security
 •   Problems Group Physical
Advertisement

ALL RESULTS
1 - 25 of 468 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Total Economic Impact™ Of Panduit’s Unified Physical Infrastructure℠ (UPI) by Panduit

August 06, 2010 - (Free Research)
This study illustrates the financial impact of moving from disparate and aging wiring systems to an integrated, building-wide IT connectivity infrastructure. 
(WHITE PAPER) READ ABSTRACT |

IT Risk Management: Guide to Software Risk Assessments and Audits by Veracode, Inc.

June 07, 2010 - (Free Research)
Risk is a function of the likelihood that a potential vulnerability will be exploited, and the resulting impact of that exploitation. In IT systems, risk can be introduced from the internet, servers, networks, malicious insiders, and even lapses in physical security. This whitepaper provides IT risk management best practices. 
(WHITE PAPER) READ ABSTRACT |

Integrated Infrastructure and Performance Management for Virtualized Environments by CA Technologies.

April 01, 2009 - (Free Research)
Enterprises, government agencies and service providers are increasingly employing virtualized environments to decrease costs, consolidate data center space and reduce environmental impacts. This paper describes a comprehensive set of CA tools for managing virtual environments. 
(WHITE PAPER) READ ABSTRACT |

E-Book: Technical Guide on PCI by SearchSecurity.com

October 10, 2011 - (Free Research)
TechTarget’s Security Media Group presents a global look at PCI, and how it is impacted by today’s evolving business needs. Our technical editors from the U.S., Europe, India and Asia provide their respective regions’ perspective on PCI compliance. 
(EBOOK)

Integrated Infrastructure and Performance Management for Virtualized Environments by CA Technologies.

April 01, 2009 - (Free Research)
This paper will look at what new tools are available from CA to enhance and manage enterprise IT infrastructure. These tools are designed for multivendor, multiplatform environments and are used to simplify infrastructure management. 
(WHITE PAPER) READ ABSTRACT |

P2V Benefits: Moving Servers From the Physical to the Virtual World Cuts Costs, Saves Space and Parallels Green Initiatives by CDW Corporation

September 08, 2009 - (Free Research)
Virtualization basically means inserting a software layer between your hardware and your operating system. This decouples the operating system from the hardware and allows you to run many operating systems at the same time on top of that same physical piece of hardware. Read this short paper to learn about the benefits of using virtual servers. 
(WHITE PAPER) READ ABSTRACT |

The Tod Point Group: IBM Storwize V7000 for VMWare Environments by IBM

May 31, 2012 - (Free Research)
The IBM Storwize V7000 Unified storage system, combined with powerful management software from IBM Tivoli, provides an ideal complement to VMware vSphere deployments by providing a highly virtualized storage infrastructure designed to meet the specific needs of virtual server environments. Read now to learn more. 
(WHITE PAPER) READ ABSTRACT |

Protecting a Paperless Office by Dell, Inc.

December 02, 2008 - (Free Research)
By working with Dell, the Peterson Sullivan IT group achieved its goals of creating a consolidated and scalable IT environment with strong backup and disaster recovery strategies. 
(CASE STUDY) READ ABSTRACT |

Averting Catastrophe: How Real-Time Location Intelligence Can Mitigate Exposure and Better Manage Risk by Pitney Bowes Group 1 Software

April 2008 - (Free Research)
What is location intelligence? From an actuary perspective, it's the accessment of risk based on the physical location of real estate. This paper examines how location intelligence links data to precise physical coordinates. 
(WHITE PAPER) READ ABSTRACT |

Best Practices for Network Availability with Oracle VM Server for SPARC by Oracle Corporation UK Ltd

December 2010 - (Free Research)
This technical white paper is the second in a series that is designed to help map I/O best practices from the physical world into the virtual world supported by logical domains. 
(WHITE PAPER) READ ABSTRACT |

Protecting a Paperless office by Dell | EqualLogic

December 2008 - (Free Research)
By working with Dell, the Peterson Sullivan IT group achieved its goals of creating a consolidated and scalable IT environment with strong backup and disaster recovery strategies. 
(CASE STUDY) READ ABSTRACT |

An Introduction to Quantum Lifecycle Management by ComputerWeekly.com

November 2012 - (Free Research)
This report from The Open Group introduces QLM, explains why it is necessary and how its development and acceptance will be assured. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Gartner: Context-aware computing by ComputerWeekly.com

June 2012 - (Free Research)
Gartner analysts, William Clark, David W Cearley and Avivah Litan, explain how business can exploit context-aware computing and social media. 
(ANALYST BRIEF) READ ABSTRACT |

Designing Secure Multi-Tenancy into Virtualized Data Centers by Continental Resources

April 2010 - (Free Research)
Today’s traditional IT model suffers from resources located in different, unrelated silos—leading to low utilization and gross inefficiency. Enterprise servers reside in one area of the data center and network switches and storage arrays in another. This document describes the design of - and the rationale behind - the Secure Cloud Architecture. 
(WHITE PAPER) READ ABSTRACT |

Infrastructure Performance Management for Virtualized Systems by CA Technologies.

June 2010 - (Free Research)
The management tools selected to support virtualization are essential to the ability of IT to grow the virtual environment without proportionately increasing the staff required to manage all of the new physical host servers and their guest VMs. Continue reading this white paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

Service-Oriented Cloud Computing Infrastructure (SOCCI) Framework by ComputerWeekly.com

January 2012 - (Free Research)
Download the Service-Oriented Cloud Computing Infrastructure (SOCCI) Framework from the Open Group. 
(ESSENTIAL GUIDE) READ ABSTRACT |

IT Without Limits: Evaluator Group' Analysis of HP Peer Motion with Storage Federation

by HP and Intel

September 2011 - (Free Research)
This white paper sponsored by HP & Intel evaluates a solution that aims to enable the movement of data without physical limitations. Read now and see how this could enable agility and efficiency. 
(WHITE PAPER) READ ABSTRACT |

The Data Center Facilities IT Handbook: Reinforcing IT and Facilities Relations by APC by Schneider Electric

April 2009 - (Free Research)
Communication failures between IT staff and facilities managers have cost companies enormous amounts of money in lost revenue. This eBook discusses the importance of open communication between both groups, and also serves as a guide for IT pros looking for information on ensuring that their physical infrastructures support the data center. 
(EBOOK) READ ABSTRACT |

Virtual Data Center eZine - Volume 4 by Virtual Data Center eZine - Volume 4

August 2008 - (Free Research)
This e-zine issue explains the direct benefits of implementing a SAP virtualization plan. It compares virtualization platforms, highlights common problems, and offers tips to leverage hardware-assisted memory virtualization. 
(WHITE PAPER) READ ABSTRACT |

Re-architecting Your Virtual Environment: Solutions to virtual infrastructure challenges by LEGACY - DO NOT USE - Insight and Sun Microsystems, Inc

July 2008 - (Free Research)
In this final session, Wolf discusses application selection, focusing on using chargebacks to counter physical storage challenges. He gives network architecture examples, offers some CPU considerations, and tackles issues with heterogeneous VM management. 
(VIDEOCAST) READ ABSTRACT |

Extreme Networks Physical Security Solution by Extreme Networks (E-mail this company)

February 2014 - (Free Research)
This guide explores some significant benefits of networking for your physical security and how it can enhance your network performance. 
(WHITE PAPER) READ ABSTRACT |

How can I Overcome the Security Challenges of Today’s Virtualized Infrastructures? by CA Technologies.

September 2010 - (Free Research)
Read this solution brief to learn how to improve control over systems, applications and information to reduce risk in both physical and virtual server environments. 
(WHITE PAPER) READ ABSTRACT |

Unified network traffic monitoring for physical and VMware environments by NetFort Technologies Ltd

October 2010 - (Free Research)
This white paper outlines an approach, based on monitoring network traffic, that delivers a unified view of network activity across virtual and physical components of the network. 
(WHITE PAPER) READ ABSTRACT |

Securing the Physical, Virtual, Cloud Continuum by Juniper Networks, Inc and Plan B Technologies, Inc

July 2010 - (Free Research)
Information security best practices remain largely the same as 15 years ago, based on a strong perimeter defense. However, virtualization and cloud computing are radically changing data center operations. Security and compliance controls need to extend across the physical, virtual, cloud continuum in order to adapt to this new infrastructure. 
(WHITE PAPER) READ ABSTRACT |

Beyond Passwords & Outdated Physical Access Systems by Entrust, Inc.

August 2012 - (Free Research)
Learn why passwords and traditional physical access systems are simply inefficient in this day and age and discover how smart credentials are a vital component of your physical and logical access security strategy. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 468 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts