Infrastructure Improving ControlWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Infrastructure Improving Control returned the following results.
RSS What is RSS?
Related Categories

 •   Network Security
 •   Virtualization
 •   Data Security
 •   Change and Configuration Management
 •   Enterprise Systems Management
 •   Access Control
 •   Data Center Management
 •   Business Process Management (BPM)
 •   Security Policies
 •   Security Monitoring

Related Searches
 •   Budget Infrastructure Improving Control
 •   Definition Of Infrastructure Improving
 •   Info About Infrastructure
 •   Infrastructure Improving Control List
 •   Infrastructure Improving Control Repairs
 •   Infrastructure Improving Control Risks
 •   Infrastructure Improving Georgia
 •   Layer Infrastructure Improving
 •   Market Infrastructure Improving
Advertisement

ALL RESULTS
1 - 25 of 478 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Oracle Enterprise Manager 11g Configuration Management Pack by Oracle Corporation

April 30, 2010 - (Free Research)
This white paper takes a three-pronged approach to configuration management: simplifying the management of your IT infrastructure; improving the level of service you provide your end users; and enforcing compliance with real-time change detection for files, database objects, users, and processes. 
(WHITE PAPER) READ ABSTRACT |

Data Grids and Service-Oriented Architecture by Oracle Corporation UK Ltd

November 30, 2008 - (Free Research)
This white paper demonstrates that a data grid infrastructure, can help you avoid "weak link" vulnerabilities that can sabotage SOA strategies. 
(WHITE PAPER) READ ABSTRACT |

The Case for Infrastructure Convergence by HP & Intel®

October 27, 2011 - (Free Research)
Read this IDC Analyst Connection to see the questions that were posed by HP to Cindy Borovick Program Vice President for IDC's Enterprise Communications and Datacenter Networks program, on behalf of HP's enterprise customers. 
(WHITE PAPER) READ ABSTRACT |

The Total Economic Impact of Lumension Security's Sanctuary by Lumension

September 2007 - (Free Research)
Lumension&#39s Sanctuary Application and Device Control is an IT-driven solution that automatically enforces endpoint security policies. The financial impact of moving from a &#34voluntary&#34 compliance solution to an &#34automatic&#34 one is illustrated 
(WHITE PAPER) READ ABSTRACT |

Improving Server Performance and Security: An Impact Comparison of Application Control and Traditional Anti-Virus Solutions by Lumension

April 2013 - (Free Research)
This analyst report unveils the impact an application control solution – which promises to reduce server CPU resource consumption – had on servers and reveals the level of protection from malware that it can provide. 
(ANALYST REPORT) READ ABSTRACT |

Getting a Head Start in Software Asset Management: Managing Software for Improved Cost Control, Better Security and Reduced Risk by FrontRange Solutions Inc

July 2008 - (Free Research)
Software Asset Management (SAM) can deliver increased efficiency, better cost control, risk mitigation and patch management. This paper provides an overview of SAM benefits, and addresses the specific issues in getting SAM running in your company. 
(WHITE PAPER) READ ABSTRACT |

SharePoint E-zine Vol.5: Document version control gets a face-lift in SharePoint 2007 by SearchWinIT

December 2008 - (Free Research)
In this edition of the SharePoint E-zine, you will explore how SharePoint 2007 reduces the complexity associated with document version control. 
(EZINE) READ ABSTRACT |

ROC Maestro for Open Systems by ROC Software

ROC Maestro for Open Systems, a key component of the ROC Enterprise Suite™, provides a very easy method for scheduling and managing workloads, processes, dependencies and events across complex, heterogeneous IT environments. 
(SOFTWARE PRODUCT)

How can I Overcome the Security Challenges of Today’s Virtualized Infrastructures? by CA Technologies.

September 2010 - (Free Research)
Read this solution brief to learn how to improve control over systems, applications and information to reduce risk in both physical and virtual server environments. 
(WHITE PAPER) READ ABSTRACT |

Sony Life Safeguards Data on More than 4.4 Million Customers with CA Access Control by CA Technologies.

September 2009 - (Free Research)
Read this paper to learn how CA Access Control has allowed Sony Life to improve the level of security surrounding its servers. 
(WHITE PAPER) READ ABSTRACT |

Lumension Endpoint Protection - Whitelisting Technology Improves Security, Reliability, and Performance via Trusted Change by Lumension

September 2008 - (Free Research)
Learn how whitelisting guards your systems by allowing only approved processes and applications to run on the endpoint and preventing malware and viral programs. With whitelisting technology, you can improve total data security and overall system performance. 
(WHITE PAPER) READ ABSTRACT |

Is your user management process getting you down? Improving efficiency and security through automation by NetIQ Europe

May 2011 - (Free Research)
Access control is something that has hindered business for years. There can be a variety of different levels of access a user may posses at a company. Some users may need to access different programs than others, so they would require a different level of access. 
(WHITE PAPER) READ ABSTRACT |

Getting a Head Start in Software Asset Management: Managing Software for Improved Cost Control, Better Security and Reduced Risk by Centennial-Software

July 2008 - (Free Research)
This white paper provides a general overview of SAM benefits, and then addresses the specific issues involved in getting SAM up and running in your organization. 
(WHITE PAPER) READ ABSTRACT |

White Paper: Controlling Recreational Peer-to-Peer Traffic to Improve Application Performance by Exinda Networks

April 2008 - (Free Research)
This white paper provides a practical overview on the evolution of recreational P2P traffic, how it is impacting corporate networks and, offers specific recommendations for controlling these recreational applications. 
(WHITE PAPER) READ ABSTRACT |

Using Informatica to Improve Data Management, Increase User Productivity, and Reduce Costs: A Case Study of AT&T by Informatica

May 2010 - (Free Research)
Read this paper to learn how AT&T utilized Informatica Data Archive to bring its database growth under control and improve application performance by reducing the amount of total storage required as well as trimming the amount of time required to load and back up its application data sets. 
(CASE STUDY) READ ABSTRACT |

Why Compliance Pays: Reputations and Revenues at Risk Research Report by Symantec Corporation

March 2009 - (Free Research)
Based on what is working among organizations with the fewest data losses, this IT Policy Compliance Group report identifies several practices that can assist businesses with improving IT compliance results and reduce business downtime. 
(WHITE PAPER) READ ABSTRACT |

Identity and Access Management (IAM) Across Cloud and On-Premise Environments Best Practices for Maintaining Security and Control by CA Technologies.

July 2013 - (Free Research)
This informative white paper provides some best practices for maintaining security and control throughout hybrid cloud environments. 
(WHITE PAPER) READ ABSTRACT |

Role-Based Access Control in Avaya Aura by Global Knowledge

March 2013 - (Free Research)
Take an in-depth look at how to improve role-based access control and review the process for creating and assigning new user-roles on this advanced communications systems management tool. Learn more about how it can help enhance collaboration in your enterprise today. 
(WHITE PAPER) READ ABSTRACT |

User-ID Linked with Next-Generation Firewalls Improves Network Visibility and Controls by Palo Alto Networks

November 2012 - (Free Research)
This white paper highlights a security solution that integrates existing enterprise directory services with next-generation firewalls so application activity and policies are linked directly with users or groups. Read on to learn how user-based analysis, reporting, and forensics can improve visibility and protection. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Determining First Network Access Control (NAC) Deployments For Your Organization by Bradford Networks

January 2009 - (Free Research)
Learn how different priorities trigger the need for network access control and see examples of how to get NAC up and running in a phased approach. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Improving Performance and Control in SAP Environments [Cisco ACE XML Gateways] by Cisco Systems, Inc.

November 2011 - (Free Research)
Read this paper to find out how to meet the new challenges posed by the proliferation of XML-based services. Discover an appliance that can be combined with SAP Business Suite and NetWeaver to improve performance, security, availability, and monitoring and auditing (for compliance) for applications and Web services in SAP environments. 
(WHITE PAPER) READ ABSTRACT |

Controlling Datacenter Costs with Virtualization: Intel and VMware Help Companies Meet Dynamic Business Demands While Lowering Total Cost of Ownership by VMware and Intel

October 2010 - (Free Research)
Read this solution brief to learn how virtualizing your infrastucture with Intel® Xeon® processor 5500 series servers and VMware vSphere™ 4 can consolidate resources and improve your total cost of ownership by decreasing management costs and increasing asset utilization. 
(ANALYST BRIEF) READ ABSTRACT |

The ROI of Database Archiving by IBM

June 2008 - (Free Research)
This webcast explores how data archiving will enable you to improve the performance of mission critical applications and databases, control infrastructure costs and support sound data governance. 
(WEBCAST) READ ABSTRACT |

As data grows, so do the risks: How to improve data and app sec by IBM

September 2012 - (Free Research)
Access this resource for a cloud solution that uses a combination of hardware, software, and services with advanced technologies to ensure data and application security, while allowing you to focus on business priorities. 
(WHITE PAPER) READ ABSTRACT |

How Can I Virtualize My Mission-critical Servers While Maintaining or Improving Security? by CA Technologies.

May 2012 - (Free Research)
Organizations often struggle to fully realize the benefits of virtualization due to the complexity of controlling identities, access and information. In this resource, uncover how to successfully deploy virtualization projects, while providing the right security controls over privileged user access across virtual and physical environments. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 478 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts