It Security Forrester ResearchWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: It Security Forrester Research returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Virtualization
 •   Application Security
 •   Mobile Device Management
 •   Network Security
 •   Endpoint Security
 •   Security Policies
 •   Enterprise Data Protection and Privacy
 •   Enterprise Systems Management
 •   Security Monitoring

Related Searches
 •   Define It Security Forrester
 •   It Security Forrester New Hampshire
 •   It Security Georgia
 •   It Security Types
 •   It Server
 •   It Skills
 •   Portals It Security
 •   Program It Security
 •   Warehouse It Security
 •   What Is It Security
Advertisement

ALL RESULTS
1 - 25 of 474 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Forrester Research: Improving Application Deployments - How an Application Delivery Architecture Can Help Businesses Overcome Deployment Challenges by F5 Networks

August 2007 - (Free Research)
Today's businesses must operate in a drastically changing environment. Forrester found most companies are not well equipped to reorient IT as a critical driver of top line success. This report showcases the results of an April 2007 Forrester survey. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Determining First Network Access Control (NAC) Deployments For Your Organization by Bradford Networks

January 2009 - (Free Research)
Learn how different priorities trigger the need for network access control and see examples of how to get NAC up and running in a phased approach. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Backup in times of virtualization and IT optimization by Hewlett-Packard Company

March 2009 - (Free Research)
Forrester Consulting recently conducted primary customer research to determine how the global economic downturn would affect IT priorities and technology deployments in 2009 and how these changes... 
(WEBCAST) READ ABSTRACT |

Delivering on high cloud expectations by ComputerWeekly.com

March 2012 - (Free Research)
Many firms are now planning to run mission critical workloads on public cloud, according to this research from Forrester and BMC. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Keep Your Enemies Closer - Get Proactive about Security by AT&T Corp

March 2011 - (Free Research)
Forrester Research Inc. guest speaker, Khalid Kark, VP-Research Director, along with Steve Hurst of AT&T, will highlight today's complex enterprise security environments, discuss the latest research on security infrastructure essentials and explain how managed security services can reduce your risk and simplify policy compliance. 
(WEBCAST)

The CIO As Portfolio Strategist by CA Technologies.

July 2011 - (Free Research)
As organizations undergo the transformation from IT to business technology (BT), they will have to make many important decisions in the process of moving from the current “as-is state” to the “to-be state.” Read this paper to learn how the CIO as a “portfolio strategist” can shape the decision-making relevant to implementing BT. 
(ANALYST REPORT) READ ABSTRACT |

Research findings: Benefit from a cloud-based recovery solution by IBM

March 2012 - (Free Research)
Forrester Consulting did some research into the field of disaster recovery and came up with some interesting statistics. Looking at solutions from multiple categories, Forrester examined how IT decision-makers are facilitating disaster recovery today and IT managers have the most to gain from considering cloud-based recovery solution. 
(DATA SHEET) READ ABSTRACT |

The iPad Invasion: Leveraging SharePoint for Mobile Enterprise Security by Colligo Networks Inc.

June 2012 - (Free Research)
In order to leverage SharePoint and provide data access across a variety of technologies and locations, businesses everywhere are looking to integrate tablets into the enterprise, particularly the iPad. Check out this webcast to hear more on how iPads are changing the IT landscape and common challenges for iPads in the enterprise. 
(WEBCAST) READ ABSTRACT |

The iPad Invasion: Leveraging SharePoint for Mobile Enterprise Security by Colligo Networks Inc.

June 2012 - (Free Research)
In order to leverage SharePoint and provide data access across a variety of technologies and locations, businesses everywhere are looking to integrate tablets into the enterprise, particularly the iPad. Check out this webcast to hear more on how iPads are changing the IT landscape and common challenges for iPads in the enterprise. 
(WEBCAST) READ ABSTRACT |

Build Your Identity And Access Management Strategy by Symplified

March 2012 - (Free Research)
This Forrester Research, Inc., paper explores the current and future states of identity and access management and describes steps your organization should take to create an IAM strategy and successfully put it into use. 
(WHITE PAPER) READ ABSTRACT |

The New Status Quo: Zero-Day and Targeted APT Attacks by FireEye

July 2011 - (Free Research)
During the webcast, Dr. Wang of Forrester Research and Ashar Aziz of FireEye will provide insight on data breach incidents and how to protect your company from cybercrime. 
(VIDEO) READ ABSTRACT |

Forrester Study: Total Economic Impact of WebSphere Application Server by IBM

May 2010 - (Free Research)
Forrester Research recently conducted a study to determine the total economic impact (TEI) on one organization that replaced its existing open source application server with a market-leading application development platform alternative. Read this report to discover the benefits this company achieved. 
(WHITE PAPER) READ ABSTRACT |

Killing Data by Voltage Security, Inc.

February 2012 - (Free Research)
Traditional perimeter-based security controls are no longer effective as today’s threat landscape continues to evolve and cybercriminals become more skillful and advanced. This Forrester Research resource examines how encrypting data – both in motion and at rest – is a more effective way to keep up with determined cybercriminals. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: How Risk Management Standards Can Work For Enterprise IT by ArcSight, an HP Company

December 2010 - (Free Research)
Every organisation should be able to articulate how IT threats can harm a business. In this e-guide, Forrester Research Analyst Chris McClean explains how a five-step risk management strategy can add value to the rest of the organisation. 
(EGUIDE) READ ABSTRACT |

Supporting the Zero Trust Model of Information Security: The Important Role of Today's Intrusion Prevention Systems by IBM

September 2013 - (Free Research)
This Forrester Research, Inc. report introduces a zero trust model to reduce risk of insider and outsider threats. Click through to learn how the intrusion prevention system (IPS) can be used to fulfill this model. 
(WHITE PAPER) READ ABSTRACT |

Total Economic Impact of Oracle Enterprise Manager Database Management Packs by Oracle Corporation

February 2008 - (Free Research)
This study highlights the benefits and costs of deploying the Oracle Enterprise Manager Diagnostic Pack and Tuning Pack across the enterprise of a sample organization. The study examines the estimated ROI for the sample organization and presents aggregate findings derived from the interview and analysis process and Forrester's independent research. 
(WHITE PAPER) READ ABSTRACT |

Balancing Risk with Agility: Best Practices for Securing Cloud Deployments by Trend Micro

May 2014 - (Free Research)
Join a webinar hosted by Lauren E. Nelson, Lead Cloud Analyst, Forrester Research and Mark Nunnikhoven, Principal Engineer, Trend Micro on May 28, 2014 at 12PM EST for best practices to better secure cloud applications and data while minimizing cost and complexity. 
(WEBCAST) READ ABSTRACT |

Why Database Archiving Should Be Part of Your Enterprise DBMS Strategy by Clearpace Software

August 2008 - (Free Research)
Enterprises that archive their database often find more than one benefit to doing so, whether it’s business, infrastructure, or cost-related. In addition, the value of archiving grows considerably as it becomes easier to access 
(WHITE PAPER) READ ABSTRACT |

CA Virtualization Management Solution Brief by CA Technologies.

November 2009 - (Free Research)
CA Virtualization Management solutions provide integrated end-to-end management, business-driven automation and security. As such, CA facilitates virtualization's promise of cost reduction and efficiency gains through consolidation, standardization and lower energy consumption, which drive better business outcomes. 
(ARTICLE) READ ABSTRACT |

A Deep Dive on DevOps and Application Deployments, Featuring a Guest Speaker from Forrester Research, Inc. by Electric Cloud

September 2012 - (Free Research)
Watch this webcast to hear Forrester Research, Inc. analyst Glenn O'Donnell discuss current challenges in application deployment and best practices for creating strong communication and understanding between your development and operations teams. 
(WEBCAST) READ ABSTRACT |

10 best practice suggestions for common smartphone threats by Dell SecureWorks UK

August 2011 - (Free Research)
Mobile devices have introduced a whole new set of risks into enterprise security, and IT teams need strategies to protect against them. Read this paper to uncover 10 of the most common threats associated with smartphones and mobile devices, along with best practices to help mitigate risks. 
(WHITE PAPER) READ ABSTRACT |

Expert Analyst Reviews the Ins and Outs of Database Encryption by Guardium, an IBM Company

February 2010 - (Free Research)
In this expert E-Guide, learn the ins and outs of database encryption. Jonathon Penn, principal analyst at Forrester Research Inc., reviews desktop, laptop and full disk encryption and outlines a cost-effective approach for managing security. Also discover three questions you must answer before embarking on any encryption project. 
(EGUIDE) READ ABSTRACT |

Unlock security success: Is security intelligence the key? by IBM

December 2012 - (Free Research)
This report from Forrester Research takes an inside look at the security intelligence (SI) market, explaining why SI needs to be an IT priority. Also inside, learn about the ongoing challenges that CISOs face, discover the growing interest in security-as-a-service, and more. 
(ANALYST REPORT) READ ABSTRACT |

Automating User Provisioning: A User’s Perspective by Oracle Corporation

April 2011 - (Free Research)
Catch this FREE webcast to find out how Educational Testing Service (ETS), a private nonprofit organization devoted to educational measurement and research, is leveraging Oracle Identity Manager to meet its user administration needs. 
(WEBCAST) READ ABSTRACT |

Lumension Endpoint Management and Security Suite by Lumension

September 2010 - (Free Research)
A new wave of vulnerabilities is threatening our endpoints and browsers at a much greater rate than operating systems and servers, which is why the SANS Institute has ranked “patching client-side software” as the number one security priority. 
(TRIAL SOFTWARE)

1 - 25 of 474 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts