Internet AgencyWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Internet Agency returned the following results.
RSS What is RSS?
Related Categories

 •   Security Monitoring
 •   Data Security
 •   Network Security
 •   Security Policies
 •   Data Center Management
 •   Enterprise Information Integration/ Metadata Management
 •   Business Process Management (BPM)
 •   Enterprise Data Protection and Privacy
 •   Storage Management
 •   Storage Security

Related Searches
 •   Development Internet
 •   Importing Internet Agency
 •   Internet Agency Address
 •   Internet Agency Metrics
 •   Internet Agency Operational
 •   Internet Employee
 •   Monitor Internet
 •   Printable Internet
 •   Scheduling Internet Agency
 •   Small Internet
Advertisement

ALL RESULTS
1 - 25 of 477 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Achieving Federal Desktop Core Configuration Compliance with Lumension Solutions by Lumension

May 28, 2009 - (Free Research)
The Federal Desktop Core Configuration (FDCC) is an OMB mandated security configuration set applicable within United States Federal Government agencies. Learn how you can address each of the FDCC requirements with Lumension Vulnerability Management. 
(WHITE PAPER) READ ABSTRACT |

Taking the fear out of bringing Government Systems online by IBM

July 24, 2012 - (Free Research)
People are quickly navigating to a more mobile environment and many individuals are urging government agencies to develop online services. In the past, certain aspects of online sharing have caused government agencies to hesitate, but this white paper helps outline some of the benefits of online systems. 
(WHITE PAPER) READ ABSTRACT |

Social Security Administration Deploys DocAve to Protect Mission-Critical SharePoint Deployment by AvePoint, Inc.

February 04, 2010 - (Free Research)
In early 2008, the Social Security administration they deployed their pilot SharePoint deployment that was accessible to all agency staff. After evaluating several backup solutions, SSA administrators chose AvePoint Doc Ave Backup and Recovery for their SharePoint environment. Read this case study to learn why. 
(CASE STUDY) READ ABSTRACT |

Protect citizen data with IBM Rational software by IBM

July 24, 2012 - (Free Research)
Digital and connected government information improves processes and makes accessibility simple for public sector agencies. This white paper outlines how agencies can keep their information available without risking sensitive data. 
(WHITE PAPER) READ ABSTRACT |

Modern Cyber Threats and Government Agencies by M86 Security

November 18, 2011 - (Free Research)
View this paper to explore how and why targeted attacks work, modern cyber attacks in the real world, the rise in public sector attacks, Web and email security solutions and more. 
(WHITE PAPER) READ ABSTRACT |

Government Could Miss IPv6 Deadline; Enterprises Make IPv6 Transition by Hewlett-Packard Company

January 02, 2013 - (Free Research)
Uncover why many government agencies risk missing the IPv6 transition deadline and how your enterprise stands to benefit by making the IPv6 transition in a timely manner. 
(EGUIDE) READ ABSTRACT |

SRI Ecuador Implements Red Hat Solutions: A Scalable , Reliable Platform to Provide Online Services to Taxpayers by Red Hat and HP

April 10, 2013 - (Free Research)
Access this informative case study to learn how Ecuador's tax management agency utilized a Linux solution to enable and promote internet-based tax return filing, reducing processing times and avoiding increased infrastructure complexity. 
(WHITE PAPER) READ ABSTRACT |

Business Information E-Zine: NoSQL Makes its Mark by SearchBusinessAnalytics

April 04, 2014 - (Free Research)
In this issue, we drill down on the facts of NoSQL databases, tapping into the experiences of savvy startups and other companies whose needs led them to NoSQL technologies. But is NoSQL right for you? Companies with fast-growing vaults of Web, social media, demographic and machine data should pay attention. IT experts chime in with timely advice. 
(EZINE) READ ABSTRACT |

Ensuring a Smooth Transition to Internet Protocol Version 6 (IPv6) by Brocade

December 12, 2011 - (Free Research)
As the transition from IPv4 to IPv6 occurs, the challenge of accommodating both protocols becomes a big challenge. Learn about four transition technologies, along with their advantages and disadvantages. 
(WHITE PAPER) READ ABSTRACT |

FISMA Compliance: A Holistic Approach to FISMA and Information Security by IBM

January 10, 2011 - (Free Research)
IBM can help your federal agency implement a holistic strategy that improves overall security posture and readiness. Read this white paper to learn about the IBM Internet Security Systems (ISS) strategic approach to cybersecurity and gain a clearer understanding of the latest FISMA legislation and compliance mandates. 
(WHITE PAPER) READ ABSTRACT |

Securing Virtualization in Real-World Environments IBM Internet Security Systems by IBM

June 25, 2009 - (Free Research)
With shrinking budgets, organizations are trying to do more with less. But doing so may leave gaps in security, reliability and availability. Read this white paper to see how IBM security solutions can help you address challenges with virtualization, while safeguarding your agency. 
(WHITE PAPER) READ ABSTRACT |

Understanding Architectural Priorities Inside Government Clouds by AMD

January 25, 2011 - (Free Research)
Not since the advent of the Internet has a technological concept achieved more attention than cloud computing. AMD’s server platform technology is uniquely tuned to address critical government requirements for reducing costs, simplifying operations and raising energy efficiency in server price/performance.  
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 18 February 2014: Swapping notepads for iPads – creating a digital police force by ComputerWeekly.com

February 18, 2014 - (Free Research)
In this week's Computer Weekly, we examine the new digital strategy at the Metropolitan Police, as the London force puts technology at the heart of crime fighting. IBM is spending $1.2bn developing cloud datacentres – we assess the plans. And we ask how the NSA web surveillance revelations are affecting IT security strategies. Read the issue now. 
(EZINE) READ ABSTRACT |

Process Automation for the Twenty-Ten Decade: The Automation of Business Technology by Network Automation, Inc

October 27, 2010 - (Free Research)
This paper discusses the need for business process automation and how it can make your company vastly more efficient. Continue reading to learn how to stay ahead of the curve on process automation during the twenty-ten decade. 
(WHITE PAPER) READ ABSTRACT |

Designing a Strategy for End-to-End Web Protection by IBM

July 10, 2009 - (Free Research)
Web applications are extremely flexible and valuable assets to any organization. But they’re also vulnerable to threats like hijacking, splitting, forging and injection. Read this white paper to find out how IBM Rational® AppScan® solutions can help your agency overcome virtual threats to achieve mission objectives. 
(WHITE PAPER) READ ABSTRACT |

The Human Face of Big Data: Data Driven by ComputerWeekly.com

January 18, 2013 - (Free Research)
Software engineers are transforming the daily lives of hundreds of millions of people for good and for ill, writes Jonathan Harris. 
(BOOK) READ ABSTRACT |

How to Avoid Targeted Web and Email Attacks by M86 Security

July 19, 2011 - (Free Research)
This white paper uncovers the dangers of targeted attacks, how and why cybercriminals have been so successful at exploiting traditional security technologies, and what your company can do to avoid becoming the next victim of a targeted attack. 
(WHITE PAPER) READ ABSTRACT |

Choose a Branding Agency: 5 Social Media Questions You Need to Ask by Oracle Corporation

November 13, 2013 - (Free Research)
The following white paper details 5 key questions to ask when choosing a branding agency. Learn how to read the answers that they give you in order to make an accurate assessment on the agency at hand. 
(WHITE PAPER) READ ABSTRACT |

ExaGrid Helps U.S. Federal Government Agencies Reduce Backup Windows, Improve Data Protection by ExaGrid Systems, Inc.

February 07, 2012 - (Free Research)
Check out this study to learn how ExaGrid solutions enabled several U.S. government agencies to reduce backup windows and improve overall data protection practices. This resource provides an introduction to the specific solutions used as well as their benefits, and explores emerging deduplication and scalability concerns as well. 
(CASE STUDY) READ ABSTRACT |

Meeting the Requirements of DoD Directive 8570.1 by Global Knowledge Network, Inc.

March 2006 - (Free Research)
The Department of Defense's manual, DoD 8570.01-M Information Assurance Workforce Improvement Program, supports DoD Directive 8570.1, which requires all individuals possessing privileged access to a DoD Information System (IS) to be trained and certified in the secure operation of computer systems used throughout the DoD's Global Information Grid. 
(WHITE PAPER) READ ABSTRACT |

Maryland Government Agency Case Study: Growing Beyond the Limits by Dell, Inc.

October 2008 - (Free Research)
In this case study, you'll learn how a Maryland government agency responds to user needs faster thanks to a server and storage virtualization solution from Dell. 
(CASE STUDY) READ ABSTRACT |

Cloud Computing—the Path to Increased Efficiencies and Cost Savings for Government Agencies by NetApp

August 2013 - (Free Research)
Discover how NetApp is addressing the challenges of government agencies moving to private, public and hybrid cloud models with a shared storage infrastructure. Read this informative paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

Maximizing the Value of Economic Stimulus Funds by SAP America, Inc.

June 2009 - (Free Research)
The American Recovery and Reinvestment Act (ARRA) was a dramatic action designed to quickly stimulate an economic recovery in the United States. This SAP Executive Insight examines some of the major challenges agencies face with respect to this stimulus plan. It describes how governments can transform their organization to devote more resources.. 
(WHITE PAPER) READ ABSTRACT |

Webinar: IBM IIM for Fraud, Abuse and Waste in Government by IBM

April 2014 - (Free Research)
Tune into the following webinar to explore the challenges and opportunities within the current state of fraud reduction, waste, and abuse in government programs and agencies. Also gain access to technology recommendations and more. 
(WEBCAST) READ ABSTRACT |

Project Portfolio Management in the Public Sector: Benefits, Challenges, Best Practices and Gotchas by Oracle Corporation

November 2013 - (Free Research)
As federal government programs have dramatically increased in number and complexity, more agencies have turned to project portfolio management (PPM). This helpful white paper provides an overview of the key things federal agency officials need to know about PPM, as well as best practices to follow and pitfalls to avoid with PPM implementation. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 477 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts