Industries Pro StandardsWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Industries Pro Standards returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Virtualization
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Storage Management
 •   Security Monitoring
 •   Network Security
 •   Enterprise Data Protection and Privacy
 •   Disk-based Backup & Storage/ RAID
 •   Security Policies
 •   Backup Systems and Services

Related Searches
 •   Computing Industries
 •   Industries Benefits
 •   Industries Databases
 •   Industries Pro Downloads
 •   Industries Pro Standards Scripts
 •   Industries Pro Technology
 •   Programming Industries Pro Standards
 •   Scripts Industries
 •   Web Cast Industries Pro
 •   Webcast Industries
Advertisement

ALL RESULTS
1 - 25 of 481 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Implementing Replication: Balancing Cost vs. Convenience by SearchStorage.com

January 22, 2013 - (Free Research)
Access this exclusive disaster recovery handbook about replication for insight from industry pros such as Brien Posey and Paul Kirvan, and learn about replication tools today, asynchronous vs. synchronous replication, and replication for virtual machines. Read on to arm yourself with the replication know-how needed to navigate this space in 2013. 
(EBOOK) READ ABSTRACT |

Presentation Transcript - Sun Solutions for Boosting Web hosting Efficiency and Optimization by Sun Microsystems, Inc. and Intel Corporation

June 16, 2009 - (Free Research)
Read this transcript featuring industry veteran Greg Schulz for part III of "Business Benefits of Boosting Web hosting" to gain more insight into the benefits and options of boosting web hosting. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Overcoming the Weaknesses of Server-Side Flash by QLogic Corporation

April 05, 2013 - (Free Research)
Watch George Crump demonstrate how you can move to a shared cache environment and eliminate infrastructure complexities. 
(WEBCAST) READ ABSTRACT |

Tape's New Niche: Long-Term Data Retention by Iron Mountain

March 13, 2013 - (Free Research)
This E-Guide includes expert insight from Rich Castagna and Jon Toigo regarding tape's still-relevant role in the data center and how tape can be key for disaster recovery. 
(EGUIDE) READ ABSTRACT |

Tape's New Niche: Long-Term Data Retention by Iron Mountain

March 13, 2013 - (Free Research)
This E-Guide includes expert insight from Rich Castagna and Jon Toigo regarding tape's still-relevant role in the data center and how tape can be key for disaster recovery. 
(EGUIDE) READ ABSTRACT |

Examining IBM Innovation at Both Ends of the Storage Spectrum- Part 1: Tape by The 451 Group (E-mail this company)

October 08, 2012 - (Free Research)
Find proof that tape isn't dead by checking out this research conducted by The 451 Group, a leading global analyst and data company. This October, 2012 white paper contains the findings of The 451 Group's recent visit to IBM's research facility in Zurich and presents 451 Research's opinion of IBM's innovations and activities in the tape space. 
(WHITE PAPER) READ ABSTRACT |

Passing a PCI Audit: A Global Perspective on Security Payment Card Data by IBM

November 11, 2011 - (Free Research)
SearchSecurity.com presents a comprehensive guide on how to pass a PCI audit. Our experts examine tactics that help companies achieve PCI compliance and offers advice on the steps you can take to make the audit process less burdensome. 
(EGUIDE) READ ABSTRACT |

E-Book: Encryption - What, Where and How by SearchHealthIT.com

October 26, 2010 - (Free Research)
This e-book, brought to you by SearchHealthIT.com, discusses key issues health care IT pros are facing now, including: HIPAA, the HITECH Act and the new frontier for encryption, network and server encryption, using thin clients to keep data secure, and much more! 
(EBOOK)

AirMagnet WiFi Analyzer by AirMagnet

August 15, 2011 - (Free Research)
AirMagnet WiFi Analyzer is the industry "de-facto" tool for mobile auditing and troubleshooting enterprise 802.11a/b/g/n networks. AirMagnet WiFi Analyzer solves end user WLAN issues while automatically detecting security threats and other wireless network vulnerabilities. 
(TRIAL SOFTWARE) READ ABSTRACT |

Presentation Transcript: Vulnerability Scanning and Compliance by Dell SecureWorks UK

August 22, 2011 - (Free Research)
In this presentation transcript, Lee Lawson, Head of Security Testing and Response at Dell SecureWorks, explores vulnerability scanning drivers, pros and cons for different vulnerability scanning solutions, best fit solutions for specific regulatory compliance standards, and more. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Software Manufacturers and Embedded BI: the Build Vs. Buy Question by LogiXML

October 08, 2009 - (Free Research)
This paper helps software manufacturers wanting to embed BI functionality into their solution whether it is best to "build" or "buy". 
(WHITE PAPER) READ ABSTRACT |

The Pros and Cons of SSL Decryption for Enterprise Network Monitoring by Symantec Corporation

October 17, 2013 - (Free Research)
SearchSecurity.com expert on network security, Brad Casey discusses the pros and cons of SSL decryption to determine its viability as an enterprise network monitoring aid. Read the e-guide and hear his opinion on how to use SSL decryption as an enterprise security tactic. 
(EGUIDE) READ ABSTRACT |

Presentation Transcript: Address Network Security and Dramatically Reduce PCI DSS Scope with Gateway Tokenization by Intel

May 19, 2011 - (Free Research)
Read this presentation transcript for an overview of planned changes to the PCI DSS Standard and pros and cons of available technology solutions. Find out how security gateways offer ideal solutions for handling internal tokenization when maintaining ownership and controlling PAN data are primary organizational concerns. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Liebert Monitoring by Liebert Corporation

The Albér Cellcorder CRT-300 cell resistance tester displays and records cell float voltage, internal cell resistance and intercell connection resistance. The portable unit includes a memory card, backlit graphical reflective LCD.... 
(HARDWARE PRODUCT)

Video Conferencing Best Practices: Making the Business Case and Key Tips for a Seamless Deployment by SearchSecurity.com

April 05, 2011 - (Free Research)
This e-guide discusses key deployment strategies to help unified communications (UC) pros get started. Uncover the physical components of video conferencing systems, interoperability and standards considerations and how organizations should address video management to ensure a solid quality of service (QoS). 
(EGUIDE) READ ABSTRACT |

Storage Magazine: November by SearchStorage.com

November 01, 2013 - (Free Research)
In the November 2013 issue of Storage magazine, we reveal the results of our 2013 salary survey, look at the aftermath of the Nirvanix fallout, explore the latest DR monitoring tools and much more! 
(EZINE) READ ABSTRACT |

University of Coimbra Boosts Standards of Scientific Excellence by Intel

May 30, 2013 - (Free Research)
This white paper presents a case study of a leading scientific university that met new demanding IT requirements by taking advantage of next-gen high-performance computing systems. 
(WHITE PAPER) READ ABSTRACT |

Information Security Magazine Online July/August Issue – Demystifying APT: Get the facts about this targeted threat activity by Information Security Magazine

July 21, 2010 - (Free Research)
The industry has preached the need for software security and secure coding for several years now. After all, if software is designed securely from the start, it means fewer problems down the road. Read this paper now to learn more. 
(WHITE PAPER) READ ABSTRACT |

Meeting the Payment Card Industry Data Security Standard by Prism Microsystems Inc.

June 2008 - (Free Research)
Unlike many of the other compliance standards in use today PCI/DSS is explicit in its requirements and this paper identifies the specific requirements affecting network administrators and presents the EventTracker solution for these issues. 
(WHITE PAPER) READ ABSTRACT |

PCI Compliance for IBM System i (AS/400) by PowerTech

November 2007 - (Free Research)
This whitepaper examines how the standard relates to the System i (AS/400). When applicable, specific operating systems commands and configuration settings are provided. 
(WHITE PAPER) READ ABSTRACT |

As data grows, so do the risks: How to improve data and app sec by IBM

September 2012 - (Free Research)
Access this resource for a cloud solution that uses a combination of hardware, software, and services with advanced technologies to ensure data and application security, while allowing you to focus on business priorities. 
(WHITE PAPER) READ ABSTRACT |

Storage Magazine September 2009: The Lowdown on Solid-State Storage by SearchStorage.com

September 2009 - (Free Research)
Storage Magazine Online September 2009 features a cover story updating the speedy evolution of Solid-State Storage – and what factors are transforming this technology from a niche to standard practice for storage shops. 
(EZINE)

Achieving PCI DSS Compliance with Red Hat Enterprise Virtualization for Desktops by Red Hat and JBoss

October 2009 - (Free Research)
The PCI DSS standard was created to prevent credit card fraud by requiring the implementation of certain controls and processes by all entities involved in the processing of credit cards. This paper will illustrate how Red Hat Enterprise Virtualization for Desktops can help organizations comply with specific PCI DSS mandates. 
(WHITE PAPER) READ ABSTRACT |

Storage Resource Management Software: Recent Trends and Business Benefits by APTARE

December 2012 - (Free Research)
This expert E-Guide from SearchStorage.com highlights the latest SRM advances and gives examples of where and when you'd utilize them. Read on for the scoop on agentless SRMs, find pro tips for integrating SRM with your virtual environment, and find a 3-question SRM Q&A with a Gartner research director for storage technologies and strategies. 
(EGUIDE) READ ABSTRACT |

Using XML and Databases: W3C Standards in Practice by EMC Corporation

August 2008 - (Free Research)
This paper describes the challenges faced in managing information in robust systems that enable reuse of XML-encoded data objects and support their efficient processing. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 481 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts