How RfiWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: How Rfi returned the following results.
RSS What is RSS?
Related Categories

 •   Storage Security
 •   Data Security
 •   Virtualization
 •   Enterprise Data Protection and Privacy
 •   Intrusion Prevention Solutions
 •   Anti-Virus Solutions
 •   Storage Management
 •   Security Monitoring
 •   Intrusion Detection/ Forensics
 •   Network Security

Related Searches
 •   Demos How Rfi
 •   Equipment How
 •   How Firms
 •   How Rfi Finds
 •   How Rfi Firm
 •   How Rfi Specialists
 •   How Rfi Templates
 •   Monitor How
 •   Research How Rfi
 •   Summary How
Advertisement

ALL RESULTS
1 - 25 of 442 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Preparing an RFI for Virtualization and the PCI Data Security Standard by HyTrust

March 22, 2011 - (Free Research)
This paper discusses how protecting cardholder data is a critical and mandatory requirement for all organizations that process, store or transmit information on credit or debit cards and the requirements and guidelines for securing cardholder data are specified in the Payment Card Industry (PCI) Data Security Standard (DSS). 
(WHITE PAPER) READ ABSTRACT |

Antimalware IT Checklist: RFP Technology Decisions Part 2 by SearchSecurity.com

April 11, 2012 - (Free Research)
Part 2 of SearchSecurity.com's 3-part guide on antimalware products offers expert insight into gathering pertinent information into the technical information necessary to move forward in the RFI process. Get an overview of technical requirements, questions to ask potential vendors, and a list of products that may meet your needs. 
(EGUIDE) READ ABSTRACT |

How to Handle Mobile Devices' Impact on the Network by SearchNetworking.com

April 14, 2014 - (Free Research)
The number and complexity of mobile devices on the enterprise network are expanding, gobbling up bandwidth from the WLAN infrastructure. This technical guide will help you prep your network for the higher capacity demands of next-stage BYOD. Learn what challenges you must overcome in the coming months. 
(EBOOK) READ ABSTRACT |

Big Data: Addressing Costs, Performance, Capacity, and Management Complexity with Virtualization by IBM

October 31, 2012 - (Free Research)
This case study reveals how multi-disciplinary engineering consultancy Dar Al-Handasah was able to rationalize and optimize its storage infrastructure in the age of big data with virtualization. Read on to learn how you can mirror Dar Al-Handasah's storage success. 
(CASE STUDY) READ ABSTRACT |

How CIOs drive innovation and create value across the enterprise by ComputerWeekly.com

April 14, 2014 - (Free Research)
Today's CIO is uniquely positioned to lead innovation and drive transformation across the modern enterprise, says Hunter Miller, in this extract from his book, Leading The Epic Revolution. 
(BOOK) READ ABSTRACT |

How-to Build High Performance Security for the Software-Defined Data Center by Trend Micro

April 09, 2014 - (Free Research)
This crucial webcast discusses how your organization can build a high-performance security strategy for the virtualized data center, outlining what kind of solutions to look for, what common challenges you might run into, and how to get the most from your virtualized environments. 
(WEBCAST) READ ABSTRACT |

EGuide: Best practices for a server consolidation project by SUSE

April 14, 2014 - (Free Research)
Consult the following expert e-guide to explore the 3 steps to server consolidation success. Uncover how to determine the consolidation ratio and how to migrate virtual servers. 
(EGUIDE) READ ABSTRACT |

Authentication Management: Ensuring Security for Remote Workers by RSA, The Security Division of EMC

December 31, 2013 - (Free Research)
This guide explores one company's authorization management tool and how it can enable secure access to employees working from home or other off-site locations. 
(WHITE PAPER) READ ABSTRACT |

True Stories of the Connected: Same Day Delivery by Cisco Systems, Inc.

April 14, 2014 - (Free Research)
This brief but informative webcast examines how bike messengers on the streets of San Francisco are benefiting from the increased connectivity that mobile technology provides. 
(CASE STUDY)

VSAN: Reimagining Storage in vSphere by CommVault Systems, Inc.

April 14, 2014 - (Free Research)
This whitepaper details a new solution from VMware that will help limit your spending on storage. 
(WHITE PAPER) READ ABSTRACT |

Maximum-Strength Threat Detection for Mid-Size Enterprises by EMC Corporation

December 31, 2012 - (Free Research)
This on-demand webcast explains how RSA Security Analytics provides visibility, threat intelligence, and analytics – and how you can start small. 
(WEBCAST) READ ABSTRACT |

NSS Labs 2013 Network IPS Comparative Analysis by IBM

December 31, 2013 - (Free Research)
This resource explores the necessary elements to focus on when deploying a successful intrusion prevention system (IPS). 
(WHITE PAPER) READ ABSTRACT |

Storage Efficiency Calculator by IBM

January 23, 2014 - (Free Research)
This simple-to-use storage efficiency calculator assesses your current storage infrastructure and ascertain how much you can save by implementing essential technologies like virtualization, compression and automatic tiering. 
(WHITE PAPER) READ ABSTRACT |

Virtualized Storage: Top Use Cases and Essential Attributes by IBM

October 24, 2013 - (Free Research)
View this short video to learn how a hospital in Stuttgart, Germany implemented a virtualized storage architecture into its existing infrastructure to increase capacity, performance and scalability without increasing costs. 
(WEBCAST) READ ABSTRACT |

IDC Paper - Enterprise Storage: Efficient, Virtualized, & Flash Optimized by IBM

May 31, 2013 - (Free Research)
In this IDC white paper, you will discover how IBMs Storwize family of storage offerings is changing the game by delivering a robust enterprise-grade virtualization platform that is efficient, cost effective, and optimized. Find out how IBMs family of solutions can help IT organizations be more efficient by doing more with fewer resources. 
(WHITE PAPER) READ ABSTRACT |

Managing Social Content to Maximize Value and Minimize Risk by IBM

August 17, 2011 - (Free Research)
Social content is now as much a part of businesses today as their employees. Managing it is essential to your success. How organizations go about this varies. This paper offers a clearer understanding of the benefits of social business systems. Discover how best to govern your social content to exploit it for the maximum long-term benefit. 
(WHITE PAPER) READ ABSTRACT |

A Total-Cost-of-Ownership Comparison for Unified Communications and Collaboration by Cisco (E-mail this company)

September 30, 2013 - (Free Research)
This guide compares the total-cost-of-ownership of various unified communications and collaboration platforms and explains how collaboration is critical to the success of the modern business. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 15 April 2014: Spies in the VPN by ComputerWeekly.com

April 15, 2014 - (Free Research)
In this week's Computer Weekly, the NSA/GCHQ snooping scandal has added to concerns about security of virtual private networks (VPNs) – we find out how IT chiefs should respond. Windows XP support has now ended – we look at what it means for the remaining users. And we examine the benefits of data visualisation tools. Read the issue now. 
(EZINE) READ ABSTRACT |

An Exploration into the Impact of Middle-Mile Optimization on Content Delivery Bottlenecks by Limelight Networks, Inc.

April 14, 2014 - (Free Research)
Consult the following informative white paper to uncover a tried and true content performance solution that focuses on middle-mile optimization. Explore the benefits of middle-mile technologies, how real companies are leveraging this kind of acceleration and more. 
(WHITE PAPER) READ ABSTRACT |

E-guide: How to Successfully Implement Cloud Strategies by Dell, Inc. and Intel®

February 19, 2014 - (Free Research)
This expert e-guide covers the importance of matching your cloud strategy with your business goals. It will also teach you how to boost server efficiency through virtualization. 
(EGUIDE) READ ABSTRACT |

Under Cloud Cover: How Leaders Are Accelerating Competitive Differentiation by IBM

February 14, 2013 - (Free Research)
This whitepaper covers the cutting edge uses of the cloud that some organizations are using to innovate and drive new value from the technology. 
(WHITE PAPER) READ ABSTRACT |

Mission-Critical Virtualization Security for Today's Workloads by IBM

September 30, 2013 - (Free Research)
Access this IDC report to learn how to protect your applications from various threat scenarios when virtualizing mission-critical environments. Discover how to reap the benefits of server virtualization without the risk, and how to overcome some of the most common challenges to securing demanding applications in a virtual environment. 
(WHITE PAPER) READ ABSTRACT |

9 Questions Decision Makers Will Ask About Infrastructure Performance Management by Virtual Instruments

October 31, 2013 - (Free Research)
This resource provides in-depth answers to 9 questions decision-makers will ask when evaluating infrastructure performance management. 
(WHITE PAPER) READ ABSTRACT |

A Focus on Front-End Acceleration to Speed Web Performance by Limelight Networks, Inc.

April 11, 2014 - (Free Research)
The following white paper explores what companies need to do to ensure the performance of web and mobile applications. Uncover how front end acceleration can help achieve the desired speed, which technologies make this goal a reality, and how to apply the front end acceleration to 3 key areas. 
(WHITE PAPER) READ ABSTRACT |

Proactive Monitoring and Management by Aspect

March 31, 2014 - (Free Research)
Investing in the right technology a critical component of ensuring top-notch customer experience in the contact center, but that's all for nothing if your tools aren't performing properly. Wouldn't it be great to eliminate IT concerns and know you'll always have maximum performance, so all you have to worry about is your customer? 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 442 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts