Internetworking Oriented Security Solutions ArchitectureWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Internetworking Oriented Security Solutions Architecture returned the following results.
RSS What is RSS?
Related Categories

 •   Service Oriented Architecture (SOA)
 •   Data Security
 •   Storage Management
 •   Enterprise Data Protection and Privacy
 •   Storage Security
 •   Application Security
 •   Network Security
 •   Security Policies
 •   Backup Systems and Services
 •   Business Intelligence Solutions

Related Searches
 •   General Internetworking
 •   Internetworking Oriented Format
 •   Internetworking Oriented Georgia
 •   Internetworking Oriented Improvement
 •   Internetworking Oriented Mississippi
 •   Internetworking Oriented Requirement
 •   Internetworking Oriented Security Batch
Advertisement

ALL RESULTS
1 - 25 of 487 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

SAP Netweaver: Streamlining the Transition to Services-Based IT Security by SAP America, Inc.

June 2008 - (Free Research)
This paper describes how the SAP NetWeaver® platform and its components help IT organizations align with their enterprise business requirements in the area of security. 
(WHITE PAPER) READ ABSTRACT |

Developers and Identity Services - Tackling Identity Data with Identity Hub by Oracle Corporation

February 2009 - (Free Research)
This paper takes a closer look at the issues surrounding the patterns for accessing identity data and what an ideal Identity Hub should provide for developers. 
(WHITE PAPER) READ ABSTRACT |

Forum Sentry™ - Web Services Security Gateway - Drive Return on Investment by Forum Systems

Forum Sentry™ provides a security infrastructure that drives a return on investment by enabling secure XML and Web services communications for mission critical applications. Forum Systems is the leader in Web Services Security. 
(SOFTWARE PRODUCT)

Securing the enterprise application layer: Expert Guidelines by IBM

August 2011 - (Free Research)
If you're a security professional, the focus on application security in IT these days may leave you feeling out of the loop. Yet, in many cases, application security pros rely on the infrastructure team to provide a secure foundation.  Find out how securing a naming and directory service will help build a solid platform that application can trust. 
(EGUIDE) READ ABSTRACT |

FalconStor® RecoverTrac™: Automated Service-oriented Disaster Recovery by FalconStor Software

February 2013 - (Free Research)
This white paper explores a disaster recovery solution that gives you peace of mind by removing complexity from the equation. Read on to get a detailed account of FalconStor's RecoverTrac technology and how it can help you address a full range of disaster recovery challenges. 
(WHITE PAPER) READ ABSTRACT |

Forum XWall - Web Services Security Firewalls - Prevent Unauthorized Access by Forum Systems

Forum XWall™ is the industy's first Web Services Firewall equipped with data authentication as well as XML intrusion prevention to actively protect against unauthorized access, XML viruses, data corruption and denial of Web service attacks. Forum Systems is the leader in Web Services Security. 
(SOFTWARE PRODUCT)

The Forrester Wave™: File Sync And Share Platforms by EMC Corporation

July 2013 - (Free Research)
This report and accompanying spreadsheet detail the findings about how well each file sync and share vendor scores based on Forrester's criteria and where they stand in relation to each other. Read on to discover more! 
(WHITE PAPER) READ ABSTRACT |

Kazeon Data Privacy & Security Solution by Kazeon

November 2006 - (Free Research)
This white paper examines an Information Classification Management (ICM) solution that helps classify and secure your company's sensitive information and overcome the challenges of securing data while complying with federal guidelines. 
(WHITE PAPER)

The CISO's Guide to Virtualization Security by Rapid7

January 2012 - (Free Research)
Security incidents that occur in a virtual environment can cause significant, sometimes crippling damage to businesses. It's essential that security professionals outline their efforts and making securing virtual infrastructure a priority. 
(WHITE PAPER) READ ABSTRACT |

Best Practices to Protect the Cardholder Data Environment and Achieve PCI Compliance by Rapid7

July 2012 - (Free Research)
Cyber-attacks that target customer and financial information are becoming more popular and businesses need to protect their data. Prevent attackers from taking advantage of the gaps in your security plan by creating a comprehensive information security policy. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Automating Access Certification in Just 17 Days by Aveksa

August 2012 - (Free Research)
This presentation transcript describes the benefits one of your peers enjoyed after implementing a particular IAM solution which helped them automate their certification process. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Podcast: Automating Access Certification in Just 17 Days by Aveksa

August 2012 - (Free Research)
This podcast describes why one of your peers implemented a particular IAM solution to automate their certification process and also offers best practices that will help you as you start your own IAM program. 
(PODCAST) READ ABSTRACT |

Business-Driven Identity and Access Management: Why This New Approach Matters by Aveksa

August 2012 - (Free Research)
This informative white paper explains why today's IAM systems fail to properly reflect business context and why embracing business-driven identity and access management can help reduce costs while strengthening security. Learn more about a step-by-step process to deploy this practice in your business with this resource. 
(WHITE PAPER) READ ABSTRACT |

Inside IBM Intelligent Investigation Manager by IBM

November 2012 - (Free Research)
Sit back for five minutes to watch this video and catch an inside look at a technology designed to protect your organization from fraud, which is more malicious and easier than ever across today's expansive IT and business operations. 
(VIDEO) READ ABSTRACT |

The Top Six Risks of Employee Internet Use and How to Stop Them by St. Bernard Software

May 2010 - (Free Research)
Due to the serious nature of many threats, the Internet use of even one unmonitored employee on a single unmanaged system can ravage a company’s internal network, irrevocably delete critical data, and ultimately ruin the company’s ability to conduct business. Read this white paper to learn how to protect your organization. 
(WHITE PAPER) READ ABSTRACT |

File-interface Deduplication System (FDS) Technical Whitepaper: Using FalconStor FDS as a Backup Target for Veritas NetBackup by FalconStor Software

April 2011 - (Free Research)
This document describes the basic concepts and integration guidelines for FalconStor FDS in a Veritas NetBackup environment. 
(WHITE PAPER) READ ABSTRACT |

Whitepaper - Simplifying Disaster Recovery (DR): One-Button Failover/Failback for Combined Physical/Virtual Data Centers by FalconStor Software

February 2010 - (Free Research)
The FalconStor® Continuous Data Protector (CDP) solution can be deployed in conjunction with VMware vCenter Site Recovery Manager. This unique implementation dramatically speeds both processes and reduces costs while ensuring achievement of recovery time objectives (RTO). 
(WHITE PAPER) READ ABSTRACT |

FalconStor Continuous Data Protector by FalconStor Software

April 2009 - (Free Research)
Enter the HP Solutions Demo portal for an interactive flash demo and overview on FalconStor CDP with HP Solutions. 
(PRODUCT OVERVIEW) READ ABSTRACT |

Merging Backup and Disaster Recovery (DR) Processes by FalconStor Software

April 2011 - (Free Research)
This paper describes how continuous data protection (CDP) technology can bridge various DR methodologies to help organizations overcome the challenges of tape and achieve maximum benefits from their IT investments. 
(WHITE PAPER) READ ABSTRACT |

Technical Whitepaper - Using FalconStor CDP with Microsoft Exchange 2007 by FalconStor Software

October 2009 - (Free Research)
This paper illustrates how to use FalconStor CDP to protect a Microsoft® Exchange 2007 server and its email database(s). It also explains how continuous real-time data journaling and periodic snapshots provide simple, rapid, and granular recovery to any point in time. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Changing the Rules of Backup and Disaster Recovery by FalconStor Software

April 2009 - (Free Research)
Join Independent Backup Expert W. Curtis Preston and Falconstor's Product Marketing Manager Peter Eichers as they explore common data protection challenges and what technologies can be used to address them. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Securing Web Services and Service-Oriented Architectures with Oracle Web Services Manager 11g by Oracle Corporation

June 2012 - (Free Research)
While web services offer extraordinary value to a company, they are not free of challenges – especially when it comes to security and management. Read this white paper to learn how the Oracle Web Services Management (WSM) is equipped with the capabilities to help you tackle web-services-based SOA security and management issues. 
(WHITE PAPER) READ ABSTRACT |

Aligning Application Infrastructure with Business through SOA Delivery by F5 Networks

March 2007 - (Free Research)
A successful SOA implementation relies as much on the flexibility of your network as it does the services which will be delivered on it. This white paper explores the unique challenges when implementing a service oriented architecture. 
(WHITE PAPER) READ ABSTRACT |

Forum Presidio - Open PGS Security Gateway - Regulatory Compliance by Forum Systems

Forum Presidio™ is a comprehensive secure content exchange platform that allows enterprises to immediately comply with Government privacy regulations using a low cost and easy to manage centralized solution. Forum Presidio™ can be used as a legacy-to-XML security bridge for a smooth migration to XML Web services. 
(SOFTWARE PRODUCT)

Migration and Security in SOA by Torry Harris Business Solutions

March 2009 - (Free Research)
It is estimated that 90% of most external attacks take advantage of known vulnerabilities and misconfigured systems. This white paper provides comprehensive guidance on integrating security and access-control best practices into your SOA and WSOA initiatives. It includes such topics as access control and SOA security implementation models. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 487 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts