High Profile External Building SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: High Profile External Building Security returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Security Monitoring
 •   Network Security
 •   Application Security
 •   Virtualization
 •   Security Policies
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Access Control
 •   Endpoint Security
 •   Business Intelligence Solutions

Related Searches
 •   Backups High Profile External
 •   Functions High Profile External
 •   High Advantages
 •   High Customer
 •   High Group
 •   High Importing
 •   High Make
 •   High Profile External License
 •   High Profile Web
 •   India High Profile
Advertisement

ALL RESULTS
1 - 25 of 480 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

H.264 High Profile Calculator by Polycom, Inc.

August 10, 2010 - (Free Research)
With the first and only H.264 High Profile implementation for real-time video, customers can immediately begin saving on bandwidth costs—up to 50%! Use the Quick Savings Calculators below to see how High Profile can reduce your bandwidth requirements and lower costs on your telepresence network. 
(PRODUCT DEMO) READ ABSTRACT |

H.264 High Profile: The Next Big Thing in Visual Communications by Polycom, Inc.

August 10, 2010 - (Free Research)
With the first and only H.264 High Profile implementation for real-time video, customers can immediately begin saving on bandwidth costs—up to 50%! Read a technical overview of the H.264 High Profile standard, including the history of H.264 and the recent advancements to and benefits of the technology. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Driving Collaboration Efficiency - H.264 High Profile by Polycom, Inc.

September 27, 2010 - (Free Research)
Polycom continues bringing leading-edge, standards-based technologies to visual communication. This is an advantage that resonates across all applications and industries.  Read this transcript to learn how Less Delivers Much More! 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Driving Collaboration Efficiency - H.264 High Profile by Polycom, Inc.

September 15, 2010 - (Free Research)
Polycom continues bringing leading-edge, standards-based technologies to visual communication. This is an advantage that resonates across all applications and industries.  View this webcast to learn how Less Delivers Much More! 
(WEBCAST) READ ABSTRACT |

Achieving Compliance in a Virtualized Environment by Tripwire, Inc.

September 2008 - (Free Research)
The goal of this paper is to present the unique considerations that virtualization presents to regulatory and standards compliance, and then prescriptively describe how to mitigate risks. 
(WHITE PAPER) READ ABSTRACT |

CW+: Quocirca report: You sent what ? by ComputerWeekly.com

August 2010 - (Free Research)
Electronically stored information is a key asset for any organisation, but it is often insufficiently cared for—as the numerous high profile data breaches reported in recent years demonstrate. 
(WHITE PAPER) READ ABSTRACT |

eBook: Encryption 360 Degrees by TechTarget

May 2009 - (Free Research)
Data breaches and regulatory mandates are fueling the exploding interest in encryption. This exclusive eBook evaluates today's encryption technologies from all angles and projects trends throughout 2009 to give you a complete picture of today's encryption landscape! Access this resource today. 
(EBOOK) READ ABSTRACT |

FortiGate DoS Protection - Block Malicious Traffic Before It Affects Critical Applications and Systems by Fortinet, Inc.

July 2011 - (Free Research)
This white paper describes common DoS techniques, explains the technology integrated into every FortiGate consolidated security platform that helps in blocking DoS attacks, and offers suggestions on how to prevent an organization’s network from being used to attack another organization. 
(WHITE PAPER) READ ABSTRACT |

Linking Identity and Data Loss Prevention to Avoid Damage to Brand, Reputation and Competitiveness by CA Technologies.

May 2010 - (Free Research)
This report examines the issue of data governance through the publication of new primary research that examines how well European businesses understand the risks and what steps they have taken to address them. 
(WHITE PAPER) READ ABSTRACT |

Linking identity and data loss prevention to avoid damage to brand, reputation and competitiveness by CA Technologies.

June 2010 - (Free Research)
This report examines the issue of data governance through the publication of new primary research that examines how well European businesses understand the risks and what steps they have taken to address them. 
(WHITE PAPER) READ ABSTRACT |

Practical Guide to Database Security & Compliance by Sentrigo Inc.

August 2008 - (Free Research)
This white paper reviews the effect of various regulatory compliance requirements on database security, and provides you with 5 practical steps for achieving database security and compliance. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 5 March 2013: Planning for a 4G future by ComputerWeekly.com

March 2013 - (Free Research)
In this week's Computer Weekly, now the 4G spectrum auction is over, we look at what happens next for the future of mobile networking. Cloud computing promises to save costs – we examine how to ensure a return on investment. And we report from the RSA conference on how big data is helping tackle cyber security threats. Read the issue now. 
(EZINE) READ ABSTRACT |

Forum XWall - Web Services Security Firewalls - Prevent Unauthorized Access by Forum Systems

Forum XWall™ is the industy's first Web Services Firewall equipped with data authentication as well as XML intrusion prevention to actively protect against unauthorized access, XML viruses, data corruption and denial of Web service attacks. Forum Systems is the leader in Web Services Security. 
(SOFTWARE PRODUCT)

Resin Application Server Java EE 6 Web Profile by Caucho Technology

March 2010 - (Free Research)
Caucho Technology aims to certify the Resin 4 application server on the newly finalized Java EE 6 Web Profile. This white paper discusses the Java EE 6 Web Profile and how it fits with the development philosophy of Resin as well as the details of our implementation including Resin extensions to the Java EE 6 Web Profile. 
(WHITE PAPER) READ ABSTRACT |

Secure SOA Infrastructure - Better Control Mission Critial SOA Deployments by Forum Systems

September 2005 - (Free Research)
Industry wide SOA rollouts have seen enterprises deploy critical supporting infrastructure around Web services security and Web services management. Forum Systems and Oracle Corporation "Secure SOA Infrastructure" is a market-leading solution that integrates software and hardware for mission critical SOA deployments. Find out more. 
(WHITE PAPER) READ ABSTRACT |

HOWTO Secure and Audit Oracle 10g & 11g: Account Security (Complimentary Chapter Download) by IBM

December 2010 - (Free Research)
Read this chapter from "HOWTO Secure and Audit Oracle 10g and 11g" (CRC Press, 2009) and learn how to secure Oracle by checking for weak passwords, configuring failed login policies, preventing DoS attacks with resource limits, and auditing user profiles. 
(EBOOK) READ ABSTRACT |

Delivering Customer Value: Innovative Approaches to Maintain Competitive Success by SAP UK & Ireland

July 2007 - (Free Research)
Delivering customer value requires continuing attention and focus if a company is to prosper into the next generation. Learn three essential steps from IDC that companies need to take to sharpen the value proposition they offer to their customers. 
(ARTICLE) READ ABSTRACT |

Managed Public Key Infrastructure: Securing Your Business Applications by VeriSign EMEA

December 2005 - (Free Research)
The VeriSign® Managed PKI service is an outsourced offering that enables enterprises of any size to rapidly and confidently deploy PKI services. It alleviates the burden of planning, building, and maintaining a PKI, while allowing enterprises to maintain internal control over digital-certificate issuance, suspension, and revocation. 
(WHITE PAPER) READ ABSTRACT |

Simple-to-Use Endpoint Security: Proactive Solutions for Networkwide Platforms by ESET

February 2009 - (Free Research)
This white paper examines the looming threat horizon that is forcing companies to reexamine their endpoint security functions and discusses ESET’s solution for integrated security management that is built around its advanced heuristic technology. 
(WHITE PAPER) READ ABSTRACT |

Sunny Days with Cloud Computing by Stoneware, Inc.

July 2008 - (Free Research)
This whitepaper discusses "Cloud Computing" which is a new catch phrase or buzzword for an approach to simplifying an organization's IT environment through the use of virtualization and web technologies. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly 18 October 2011: Download the latest issue of the UK's leading technology publication, where we analyse the latest news in IT and what it means for IT managers by ComputerWeekly.com

October 2011 - (Free Research)
In this week's Computer Weekly, we talk to the CIO of the London 2012 Olympics about progress on the UK's highest-profile IT implementation. We ask customers about Oracle’s long-awaited Fusion Applications; review the latest version of Windows Server; and find out how the Blackberry outage affected corporate customers. Download the new issue now. 
(EZINE) READ ABSTRACT |

ROC Maestro for Open Systems by ROC Software

ROC Maestro for Open Systems, a key component of the ROC Enterprise Suite™, provides a very easy method for scheduling and managing workloads, processes, dependencies and events across complex, heterogeneous IT environments. 
(SOFTWARE PRODUCT)

The Foundation of High-Value Business Intelligence: A Description of the WebFOCUS 7.1 Architecture by Information Builders

June 2006 - (Free Research)
Good architecture for information systems is as important as good engineering is for automobiles and with good architecture, applications can be scaled up with less hardware. 
(WHITE PAPER) READ ABSTRACT |

Data Profiling: The Foundation for Data Management by DataFlux Corporation

March 2008 - (Free Research)
Data profiling is the beginning of an effective data management strategy. Although profiling techniques provide an essential first step, there is much more to a complete data management strategy. 
(ANALYST REPORT) READ ABSTRACT |

iTest Team - Rapid Test Automation for Equipment and Devices by Fanfare

iTest Team is an integrated test environment for developers, testers, and automation teams. It offers a unified approach for rapidly developing, automating, and maintaining test cases. iTest Team tests complex equipment and systems that are accessed through various protocols, such as command line interfaces, Web interfaces, SNMP, or command shells. 
(SOFTWARE PRODUCT)

1 - 25 of 480 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts