Information Technology And Security Operations CenterWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Information Technology And Security Operations Center returned the following results.
RSS What is RSS?
Related Categories

 •   Data Center Management
 •   Data Security
 •   Network Security
 •   Virtualization
 •   Storage Management
 •   Storage Security
 •   Enterprise Systems Management
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Application Security
 •   Security Monitoring

Related Searches
 •   Benefit Of Information
 •   Code Information Technology
 •   Downloads Information Technology And
 •   History Information
 •   Information Business
 •   Information Technology And Costing
 •   Information Technology And Financial
 •   Information Technology And Form
 •   Information Technology And Schemas
 •   Information Webinars
Advertisement

ALL RESULTS
1 - 25 of 473 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

10 Places SAP Customers Can Reduce Data Management Costs by Winshuttle, LLC

December 2008 - (Free Research)
This white paper highlights 10 key places SAP customers can reduce IT operational costs, with a focus on trimming support and data entry costs by automating data entry. 
(WHITE PAPER) READ ABSTRACT |

Log Management Tightens Data Security, Performance by SearchCompliance.com

April 2013 - (Free Research)
For many, collecting and maintaining logs is a compliance requirement. But IT leaders will soon discover that there are many other practical reasons for maintaining logs. Access today's resource to uncover ways in which log management can tighten data security and boost overall IT performance. 
(EBOOK) READ ABSTRACT |

E-Guide: Benefitting From a Flexible ITSM Platform by ServiceNow

April 2014 - (Free Research)
This expert e-guide will show you how IT service management can benefit CIOs and CTOs. 
(EGUIDE) READ ABSTRACT |

Operations Energy Management: From Data Center through Facilities by CA Technologies.

December 2008 - (Free Research)
Rising energy costs are driving IT and facilities managers alike in all types of organizations to come up with new and innovative ways to reduce the amount of energy used to power and cool the data center. 
(WHITE PAPER) READ ABSTRACT |

CIO Tips for Seeing the ITIL Light by FrontRange Solutions Inc.

July 2013 - (Free Research)
CIOs often struggle to understand how the IT Infrastructure Library (ITIL) framework can be beneficial to their organization. This expert e-guide will help make the business case for ITIL adoption, providing an overview of the monetary benefits of ITIL as well as tips for viewing ITIL technology in a friendlier light. 
(EGUIDE) READ ABSTRACT |

Creating an Effective Security Operations Function by RSA, The Security Division of EMC

October 2008 - (Free Research)
Read this white paper to understand all the activities and roles in a security operations function - your first step in making those operations more effective and efficient. 
(WHITE PAPER) READ ABSTRACT |

CIO Insights: Fortifying ITIL and Change Management Strategies for Business Benefit by FrontRange Solutions Inc.

July 2013 - (Free Research)
This expert e-guide provides tips and tactics to help you fortify your IT Infrastructure Library (ITIL) framework in order to achieve significant IT and business benefits. Also inside, count down four ways that you can improve your change management strategy. 
(EGUIDE) READ ABSTRACT |

Building a Successful Security Operations Center by ArcSight, an HP Company

December 2009 - (Free Research)
Designing, building, and managing an internal security operations center can dramatically improve an organization's ability to rapidly recognize and respond to malicious information security events. This paper outlines industry best practices for building and maturing a security operations center (SOC). 
(WHITE PAPER) READ ABSTRACT |

EMC Virtual Infrastructure Data Protection by EMC Corporation

EMC Virtual Infrastructure Data Protection solutions guard your virtual infrastructure applications and data from downtime and provide the availability you expect for critical workloads. It combins backup and recovery technologies with VMware server virtualization. 
(SOFTWARE PRODUCT)

IDC Technology Spotlight - Continuous Operations for Applications with Multiple Storage Array Access by EMC Corporation

December 2012 - (Free Research)
This informative paper explores a distributed storage approach within your data center. Read on to discover how this technology can help you, minimize downtime with continuous operations, reduce application complexity and achieve higher storage utilization with increased availability. 
(WHITE PAPER) READ ABSTRACT |

Eguide: Addressing Mobile, Laptop and "Big Data" Backup by CommVault Systems, Inc.

February 2012 - (Free Research)
Learn about a deduplication solution designed for remote laptop and desktop data management that can help you overcome today's mobile backup and security challenges. With the ability to search, access and recover content through any Windows, Apple or Android device, this technology can begin simplifying your remote management operations today. 
(EGUIDE) READ ABSTRACT |

Data Quality: The Foundation of Operational Effectiveness by Pitney Bowes Group 1 Software

September 2011 - (Free Research)
This white paper discusses the importance of data quality operations and how to successfully implement a data quality strategy into your organization. 
(WHITE PAPER) READ ABSTRACT |

Intel® Cloud Builders Guide: Parallels* Security Monitoring and Service Catalog for Public Cloud VPS Services by Intel

February 2012 - (Free Research)
A cloud environment can be hard to secure, but certain technology can mitigate your risks.This essential white paper focuses on establishing a robust foundation for the deployment of secure multi-tenancy operations. Learn about a set of hardware components that can help you build and maintain a chain of trust to protect your sensitive information. 
(WHITE PAPER)

eGuide: Ways to Adapt to Data Center Growth by Iron Mountain

February 2014 - (Free Research)
Download this expert e-guide now for a look at managing the new technologies of your data center and handling the new security threats. 
(EGUIDE) READ ABSTRACT |

22 November 2011: Read the latest issue of the UK’s leading technology publication, where we analyse the latest technology news and what it means for IT managers. by ComputerWeekly.com

December 2011 - (Free Research)
In this week’s Computer Weekly, we talk to the British Library about the enormous storage challenges of digitising its printed archive; we examine the state of the UK IT jobs market and the skills that are most in demand by employers; and we look at case studies of the best virtualisation projects. Download the new issue now. 
(EZINE) READ ABSTRACT |

A Guide to Ensuring Business Continuity Through the Power of Virtualization by Citrix

December 2010 - (Free Research)
Citrix provides a robust set of virtualization technologies to help improve the resilience and usefulness of an organization's information infrastructure, ensuring that not just critical resources remain available but that they are always accessible to all users in any location with any device. Continue reading to learn more. 
(WHITE PAPER) READ ABSTRACT |

Storage Through the Looking Glass by ComputerWeekly.com

April 2013 - (Free Research)
This analyst report aims to help you take a much needed step away from the technical detail of storage to create some strategic perspective. 
(ANALYST REPORT) READ ABSTRACT |

Creating Network-Aware Service Management by Microsoft

January 2008 - (Free Research)
The integration of EMC® Smarts® and Microsoft® System Center Operations Manager 2007 delivers the capabilities IT departments need to enable network-aware service management. 
(WHITE PAPER)

Geographic Factors for Data Center Site Selection by FORTRUST LLC

November 2008 - (Free Research)
This paper highlights the geographic advantages inherent in establishing data center operations in Colorado, addressing major events and probabilities of natural disasters. 
(WHITE PAPER) READ ABSTRACT |

Leveraging EMC Deduplication Solutions for Backup, Recovery, and Long-term Information Retention by EMC Computer Systems (UK) Ltd.

April 2011 - (Free Research)
This white paper from EMC takes a closer look at the advantages associated with a disk-based backup solution. Read on to learn more today! 
(WHITE PAPER) READ ABSTRACT |

The Essentials Series: Security Information Management by SecureWorks

October 2009 - (Free Research)
This collection of articles from Realtime Publishers presents a clear and concise overview of security information management (SIM). The articles present the business case for SIM, operational and organizational issues, and hints and tips for ensuring a successful SIM implementation. 
(WHITE PAPER) READ ABSTRACT |

SUN SPARC® ENTERPRISE T5440 SERVER ARCHITECTURE by Sun Microsystems, Inc.

October 2008 - (Free Research)
Employing UltraSPARC® T2 Plus processors - an evolution of the industry's first massively threaded systems on a Chip (SoC) - the Sun SPARC® Enterprise T5440 server offers breakthrough performance and energy efficiency to drive Web 2.0 infrastructure and address other demanding datacenter challenges. 
(WHITE PAPER) READ ABSTRACT |

Financial Services Report: Reshaping ICT, Reshaping Business by ComputerWeekly.com

November 2012 - (Free Research)
This report from Fujtsu assesses the IT trends and prioirties in the financial services industry. 
(IT BRIEFING) READ ABSTRACT |

Airports Use Network Virtualization to Consolidate and Scale Operations by Cisco Systems, Inc.

January 2009 - (Free Research)
The Cisco Catalyst 6500 Series Switch with Supervisor Engine 720-3BXL enabled Unique at Zurich Airport to successfully implement network virtualization using MPLS VPN technology. 
(CASE STUDY) READ ABSTRACT |

From Target to Aggressor: How Data Centers are Becoming Unwitting Accomplices in Advanced Cyber Attacks by FireEye

December 2013 - (Free Research)
This guide explores the widening gap between sophisticated cyber-attacks and the weak traditional defensive deployments in most data centers. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 473 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts