Information Technology Security GraphsWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Information Technology Security Graphs returned the following results.
RSS What is RSS?
Related Categories

 •   Network Security
 •   Data Security
 •   Security Policies
 •   Business Intelligence Solutions
 •   Security Monitoring
 •   Business Process Management (BPM)
 •   Managed Security Services
 •   Enterprise Resource Planning (ERP)
 •   Endpoint Security
 •   Application Management and Maintenance

Related Searches
 •   History Information
 •   Information Documentation
 •   Information Technology Parts
 •   Information Technology Portal
 •   Information Technology Secure
 •   Information Virginia
 •   Manufacturers Information
 •   Schemas Information Technology
Advertisement

ALL RESULTS
1 - 25 of 462 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Quest MessageStats™ by Dell Software

Quest MessageStats empowers executive management, Information Technology (IT) managers, and Exchange administrators to perform business-critical analysis and reporting on Exchange e-mail infrastructures. 
(ASP & SOFTWARE PRODUCT)

CW Special Report on IBM by ComputerWeekly.com

April 10, 2012 - (Free Research)
This special nine-page report from Computer Weekly analyses the challenges facing IBM, its financial performance, the services it offers. 
(IT BRIEFING) READ ABSTRACT |

Business Continuity Self-Assessment Tool by IBM Software Group

April 2007 - (Free Research)
The Business Continuity Self Assessment Tool is a step toward becoming a more resilient business. After completing the assessment, you will be able to view a personalized graph that identifies potential gaps within the business and event threat areas. 
(WHITE PAPER) READ ABSTRACT |

Delivering Next Generation User Interfaces for Business Intelligence Using AJAX by Information Builders

November 2006 - (Free Research)
This paper explains why Information Builders chose to use a component-based AJAX architecture for its new report and graph authoring solution - WebFOCUS Power Painter. 
(WHITE PAPER) READ ABSTRACT |

Security visualisation by ComputerWeekly.com

January 2013 - (Free Research)
This article in our Royal Holloway Information Security Thesis series shows how to generate a visual representation of a dataset and use visualisation in the evaluation of known security vulnerabilities. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Vendor Landscape: Security Information & Event Management by LogRhythm, Inc.

July 2012 - (Free Research)
This informative resource demonstrates how organizations can find a SIEM solution and achieve key goals. Other topics explained in this white paper include; understanding the capabilities of SIEM technologies and potential use cases. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: A Framework for Assuring IT Service Quality and Performance by CA Technologies.

July 2009 - (Free Research)
Service, according to ITIL, is based on the use of Information Technology and supports the Customer's Business Process. An IT Service is made up from a combination of people, processes and technology and should be defined in an Service Level Agreement. Learn about a framework for assuring IT service quality and performance. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Learning How To Learn Hadoop by Global Knowledge

February 2013 - (Free Research)
Like the problems it solves, Hadoop can be quite complex and challenging. Access this exclusive resource to join Global Knowledge instructor and Technology Consultant Rich Morrow as he leads you through some of the hurdles and pitfalls students encounter on the Hadoop learning path. 
(WHITE PAPER) READ ABSTRACT |

Intergrated Mobile Security for Small and Midsize Businesses by SearchSecurity.com

May 2013 - (Free Research)
This resource demonstrates how small and medium-sized business can combat the rapidly growing threats inherent in mobile computing. Read now to learn how cloud-based mobile protection can offer robust mobile protection while delivering noticeablecost efficiencies. 
(WHITE PAPER) READ ABSTRACT |

WebFOCUS Business Intelligence Application Development & Deployment by Information Builders Inc. (E-mail this company)

WebFOCUS development and deployment solutions provide easy-to-use Web-based applications for unlimited numbers of users, tailored to their skill level and preferences regardless of location, as well as flexible and intuitive development tools for building applications. 
(SOFTWARE PRODUCT)

Operations Energy Management: From Data Center through Facilities by CA Technologies.

December 2008 - (Free Research)
Rising energy costs are driving IT and facilities managers alike in all types of organizations to come up with new and innovative ways to reduce the amount of energy used to power and cool the data center. 
(WHITE PAPER) READ ABSTRACT |

Supercomputers: prestige objects or crucial tools for science and industry ? by ComputerWeekly.com

April 2012 - (Free Research)
Professor Hans Werner Meuer, co-founder of the Top500 supercomputer list, presents a critical assessment of high performance computing technology and applications. 
(PRESENTATION) READ ABSTRACT |

Reducing IT TCO with Effective Endpoint Security Management by Lumension

August 2009 - (Free Research)
This audiocast includes the findings from Aberdeen Group's latest report "Endpoint Security, Endpoint Management: The Cost Cutter's Case for Convergence", information about which endpoint security management technologies are used by "Best-in-Class" organizations, and recommendations to improve your security and ultimately reduce IT TCO. 
(PODCAST) READ ABSTRACT |

Connecting Through Content, Issue Two by KnowledgeStorm, Inc (E-mail this company)

May 2007 - (Free Research)
Connecting Through Content, Issue Two examines how technology buyers search for content and how marketers deliver content to them. Content distribution channels, user search techniques, content registration behavior and other aspects of content distribution and syndication are evaluated. 
(ANALYST REPORT) READ ABSTRACT |

Intuit QuickBase: Increase Visibility with Web-based Project Management by Intuit QuickBase

Web-based QuickBase from Intuit offers a refreshingly powerful, flexible and affordable solution for busy teams to better manage projects, information and processes. With QuickBase, you can get and keep everyone -- team members, clients, vendors, freelancers -- on the same page with better visibility and accountability for everyone. 
(ASP)

CW Special report on Capgemini by ComputerWeekly.com

August 2012 - (Free Research)
This 8 page special report from Computer Weekly offers a critical assessment of Capgemini, its strategy, products and services and financial performance. Packed with graphs and charts it is essential reading for anyone thinking of working with Capgemini. 
(ESSENTIAL GUIDE) READ ABSTRACT |

How to Start a Windows Vista Pilot Deployment by Microsoft

November 2008 - (Free Research)
Thinking about deploying Windows Vista? This guide gives an overview of how to successfully manage a pilot program that provides the best experience for pilot users and helps to provide positive project justification to business decision makers. 
(WHITE PAPER)

The Impact of Social Graphing Analysis on the Bottom Line: How Zynga Performs Graph Analysis with the Vertica Analytics Platform by Vertica Systems

August 2011 - (Free Research)
It may be surprising to find that Zynga is performing some of the most advanced analytics anywhere. With a user base of over 250 million monthly active users, this white paper describes why Zynga uses the Vertica Analytics Platform to improve its business and game features. 
(WHITE PAPER) READ ABSTRACT |

Objects, Databases and the Myth of Serialization by Versant Corp.

August 2010 - (Free Research)
Authors quite commonly, and incorrectly, refer to the process of serialization as part of what is happening when an object database stores an object or object graph. This white paper debunks that misperception, and sets the record straight about the efficiency of object databases as brought about by the avoidance of serialization. 
(WHITE PAPER) READ ABSTRACT |

Moving to Sarbanes-Oxley Compliance in Three Days Using EventTracker by Prism Microsystems Inc.

June 2008 - (Free Research)
The purpose of this document is to explain how EventTracker can help your organization meet the audit reporting requirements of The Sarbanes-Oxley Act of 2002 (SOX). 
(WHITE PAPER) READ ABSTRACT |

The CIO As Portfolio Strategist by CA Technologies.

July 2011 - (Free Research)
As organizations undergo the transformation from IT to business technology (BT), they will have to make many important decisions in the process of moving from the current “as-is state” to the “to-be state.” Read this paper to learn how the CIO as a “portfolio strategist” can shape the decision-making relevant to implementing BT. 
(ANALYST REPORT) READ ABSTRACT |

2008 ERP REPORT, PART II: Comparing Leading Tier I and Tier II ERP Solutions by Panorama Consulting Group

September 2009 - (Free Research)
Find the ERP solution that is right for your organization by reviewing this detailed report, which discusses the differences between leading ERP solutions and shares the findings of current research. 
(ANALYST REPORT) READ ABSTRACT |

EMC Bridges the Data Protection Gap by EMC Computer Systems (UK) Ltd.

April 2011 - (Free Research)
This informative white paper from EMC, takes a look at the foundation of EMC Backup and Recovery. It looks at relevant analytical data to help illustrate the benefits of implementing a backup and recovery solution. Read this white and its corresponding graphs to learn more today! 
(WHITE PAPER) READ ABSTRACT |

The Difference Between BI and CPM by Prophix Software

December 2012 - (Free Research)
Prophix Software develops Corporate Performance Management (CPM) software that is mainly used to manage processes in the Finance Department; this white paper is about Business Intelligence. This is Prophix's position on what BI consists. 
(WHITE PAPER) READ ABSTRACT |

Podcast - Emerging Media Series: Online Video, Social Networks and Wikis by KnowledgeStorm, Inc (E-mail this company)

November 2006 - (Free Research)
This podcast, the third in a series of studies examining the impact that emerging online media have on B2B technology marketing, shows how three mainstays of the Web 2.0 culture are evolving into B2B information delivery tools: Online video, Social networks and Wikis. 
(PODCAST) READ ABSTRACT |

1 - 25 of 462 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts