Information Technology Security GraphsWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Information Technology Security Graphs returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Business Intelligence Solutions
 •   Network Security
 •   Security Policies
 •   Business Process Management (BPM)
 •   Enterprise Resource Planning (ERP)
 •   Security Monitoring
 •   Endpoint Security
 •   Managed Security Services
 •   Compliance Management/ Sarbanes-Oxley Compliance

Related Searches
 •   Article About Information Technology
 •   Computers Information Technology
 •   Demand Information
 •   Diagrams Information Technology
 •   Information Technology Analysis
 •   Information Technology Architecture
 •   Information Technology Contracts
 •   Information Technology Security Reports
 •   Research Information Technology Security
Advertisement

ALL RESULTS
1 - 25 of 462 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..
Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Quest MessageStats™ by Dell Software

Quest MessageStats empowers executive management, Information Technology (IT) managers, and Exchange administrators to perform business-critical analysis and reporting on Exchange e-mail infrastructures. 
(ASP & SOFTWARE PRODUCT)

Delivering Next Generation User Interfaces for Business Intelligence Using AJAX by Information Builders

November 01, 2006 - (Free Research)
This paper explains why Information Builders chose to use a component-based AJAX architecture for its new report and graph authoring solution - WebFOCUS Power Painter. 
(WHITE PAPER) READ ABSTRACT |

Business Continuity Self-Assessment Tool by IBM Software Group

April 2007 - (Free Research)
The Business Continuity Self Assessment Tool is a step toward becoming a more resilient business. After completing the assessment, you will be able to view a personalized graph that identifies potential gaps within the business and event threat areas. 
(WHITE PAPER) READ ABSTRACT |

CW Special Report on IBM by ComputerWeekly.com

April 2012 - (Free Research)
This special nine-page report from Computer Weekly analyses the challenges facing IBM, its financial performance, the services it offers. 
(IT BRIEFING) READ ABSTRACT |

Security visualisation by ComputerWeekly.com

January 2013 - (Free Research)
This article in our Royal Holloway Information Security Thesis series shows how to generate a visual representation of a dataset and use visualisation in the evaluation of known security vulnerabilities. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Vendor Landscape: Security Information & Event Management by LogRhythm, Inc.

July 2012 - (Free Research)
This informative resource demonstrates how organizations can find a SIEM solution and achieve key goals. Other topics explained in this white paper include; understanding the capabilities of SIEM technologies and potential use cases. 
(WHITE PAPER) READ ABSTRACT |

Learning How To Learn Hadoop by Global Knowledge

February 2013 - (Free Research)
Like the problems it solves, Hadoop can be quite complex and challenging. Access this exclusive resource to join Global Knowledge instructor and Technology Consultant Rich Morrow as he leads you through some of the hurdles and pitfalls students encounter on the Hadoop learning path. 
(WHITE PAPER) READ ABSTRACT |

WebFOCUS Business Intelligence Application Development & Deployment by Information Builders Inc. (E-mail this company)

WebFOCUS development and deployment solutions provide easy-to-use Web-based applications for unlimited numbers of users, tailored to their skill level and preferences regardless of location, as well as flexible and intuitive development tools for building applications. 
(SOFTWARE PRODUCT)

Which chart or graph is right for you? by Tableau Software

January 2013 - (Free Research)
This paper answers questions about how to select the best charts for the type of data you're analyzing and the questions you want to answer. 
(WHITE PAPER) READ ABSTRACT |

Supercomputers: prestige objects or crucial tools for science and industry ? by ComputerWeekly.com

April 2012 - (Free Research)
Professor Hans Werner Meuer, co-founder of the Top500 supercomputer list, presents a critical assessment of high performance computing technology and applications. 
(PRESENTATION) READ ABSTRACT |

Intuit QuickBase: Increase Visibility with Web-based Project Management by Intuit QuickBase

Web-based QuickBase from Intuit offers a refreshingly powerful, flexible and affordable solution for busy teams to better manage projects, information and processes. With QuickBase, you can get and keep everyone -- team members, clients, vendors, freelancers -- on the same page with better visibility and accountability for everyone. 
(ASP)

CW Special report on Capgemini by ComputerWeekly.com

August 2012 - (Free Research)
This 8 page special report from Computer Weekly offers a critical assessment of Capgemini, its strategy, products and services and financial performance. Packed with graphs and charts it is essential reading for anyone thinking of working with Capgemini. 
(ESSENTIAL GUIDE) READ ABSTRACT |

The Impact of Social Graphing Analysis on the Bottom Line: How Zynga Performs Graph Analysis with the Vertica Analytics Platform by Vertica Systems

August 2011 - (Free Research)
It may be surprising to find that Zynga is performing some of the most advanced analytics anywhere. With a user base of over 250 million monthly active users, this white paper describes why Zynga uses the Vertica Analytics Platform to improve its business and game features. 
(WHITE PAPER) READ ABSTRACT |

Objects, Databases and the Myth of Serialization by Versant Corp.

August 2010 - (Free Research)
Authors quite commonly, and incorrectly, refer to the process of serialization as part of what is happening when an object database stores an object or object graph. This white paper debunks that misperception, and sets the record straight about the efficiency of object databases as brought about by the avoidance of serialization. 
(WHITE PAPER) READ ABSTRACT |

Moving to Sarbanes-Oxley Compliance in Three Days Using EventTracker by Prism Microsystems Inc.

June 2008 - (Free Research)
The purpose of this document is to explain how EventTracker can help your organization meet the audit reporting requirements of The Sarbanes-Oxley Act of 2002 (SOX). 
(WHITE PAPER) READ ABSTRACT |

2008 ERP REPORT, PART II: Comparing Leading Tier I and Tier II ERP Solutions by Panorama Consulting Group

September 2009 - (Free Research)
Find the ERP solution that is right for your organization by reviewing this detailed report, which discusses the differences between leading ERP solutions and shares the findings of current research. 
(ANALYST REPORT) READ ABSTRACT |

EMC Bridges the Data Protection Gap by EMC Computer Systems (UK) Ltd.

April 2011 - (Free Research)
This informative white paper from EMC, takes a look at the foundation of EMC Backup and Recovery. It looks at relevant analytical data to help illustrate the benefits of implementing a backup and recovery solution. Read this white and its corresponding graphs to learn more today! 
(WHITE PAPER) READ ABSTRACT |

Business Value Analysis Study: Citizens Business Bank by Symantec Corporation

March 2009 - (Free Research)
As a result of its relationship with Symantec, Citizens is achieving substantial business value. The Alchemy Solutions Group conducted a Total Operational and Economic Impact (TOEI) analysis of the different solutions deployed and quantified business value. Read this paper to see what they found. 
(WHITE PAPER) READ ABSTRACT |

Unlocking Information: Digital data is a hospital’s most valuable resource by Dell, Inc.

June 2012 - (Free Research)
Uncover the importance of digital data for today’s information-driven healthcare industry. Learn why this data is the key enabler of starting healthcare reform and revolutionizing how hospitals operate, collaborate, and deliver care. 
(WHITE PAPER)

CW Special report on Symantec by ComputerWeekly.com

May 2013 - (Free Research)
This in-depth profile from Computer Weekly, updated for 2013, gives you the key facts on Symantec's products, financial performance and strategy. 
(WHITE PAPER) READ ABSTRACT |

Granular application control, intelligence and real-time visualization by SonicWALL

March 2011 - (Free Research)
Application intelligence and control is available along with SonicWALL Gateway Anti-Virus, Anti-Spyware and Intrusion Prevention as a one, two or three year subscription, or is included in SonicWALL Comprehensive Gateway Security Suite subscriptions for the TZ 210, Network Security Appliance (NSA) and E-Class NSA Series firewalls. 
(WHITE PAPER) READ ABSTRACT |

Granular application control, intelligence and real-time visualization by SonicWALL

February 2011 - (Free Research)
It can be a real challenge for IT administrators to efficiently deliver critical corporate solutions while also contending with employee use of wasteful and often dangerous applications. Critical applications need bandwidth prioritization while social media and gaming applications need to be bandwidth throttled or completely blocked. 
(WHITE PAPER) READ ABSTRACT |

The Power of Faceted Analytical Displays: Three Blind Men and an Elephant by Tableau Software

August 2008 - (Free Research)
This paper explores the insights that emerge when software enables us to view a set of data from several perspectives at the same time. With Faceted Analytical displays, the multiple perspectives, lead to insights that would be difficult to see otherwise. 
(WHITE PAPER) READ ABSTRACT |

Securing the Foundation of Information Technology (IT) Systems by Trusted Computer Solutions

January 2010 - (Free Research)
This paper explains how there is no one process to make any organization 100% secure, but establishing a company-wide security policy based on industry-standard best practices is a good place to start. Many of these best practices can be implemented as part of the operating system assessment and lock down process. 
(WHITE PAPER) READ ABSTRACT |

The 2008 (ISC)2 Global Information Security Workforce Study by ISC2

May 2008 - (Free Research)
Information security professionals are facing a growing amount of pressure. This survey provides detailed insight into the important trends and opportunities emerging in the information security profession worldwide. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 462 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts