It Who Is BehindWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: It Who Is Behind returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Application Security
 •   Application Lifecycle Management(ALM)
 •   Enterprise Data Protection and Privacy
 •   Application Integration
 •   Security Monitoring
 •   Treasury / Cash / Risk Management
 •   Network Security
 •   Endpoint Security
 •   Managed Security Services

Related Searches
 •   Designer It
 •   Faq It Who
 •   Introduction It
 •   It Who Buying
 •   It Who Is Resources
 •   It Who Maine
 •   It Who Measure
 •   It Who Monitor
 •   Reports It
 •   Script It Who
Advertisement

ALL RESULTS
1 - 25 of 462 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Understanding ITIL® Service Portfolio Management: An Approach For Implementing Effective Service Lifecycle Management by BMC Software, Inc.

June 15, 2009 - (Free Research)
IT executives and their teams need a comprehensive and accurate view of IT services. A service catalog includes all relevant details about your services, including which service level agreements (SLAs) are associated with it, who is able to request it, how much it costs, and how to fulfill it. This paper describes the IT Infrastructure... 
(WHITE PAPER) READ ABSTRACT |

ShareFile Enterprise Overview by Citrix Systems, Inc. (E-mail this company)

August 23, 2013 - (Free Research)
Workshifting and BYOD trends are adding new challenges for IT who already struggle with protecting intellectual property and observing compliance regulations. This white paper explains how to use enterprise-grade file sharing technology to regain control over sensitive corporate while meeting mobility and collaboration needs of end users. 
(WHITE PAPER) READ ABSTRACT |

Digital Bread Crumbs – Seven Clues To Identifying Who’s Behind Advanced Cyber Attacks by FireEye

December 31, 2013 - (Free Research)
When establishing your security strategy, the ability to recognize who your attackers are and how they work is essential. This guide uncovers various facets of malware attacks and what they reveal about the culprit. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Cloud Backup Solutions by Idera

February 06, 2014 - (Free Research)
This expert e-guide takes a look at the different cloud backup options for your customers. Read on to learn the adoption motivators and triggers behind your customer's need for cloud backup, and find out what solutions align perfectly with their organization. 
(EGUIDE) READ ABSTRACT |

Integrating Information Labeling and Microsoft Active Directory Rights Management Services (AD RMS) by TITUS

November 12, 2010 - (Free Research)
This white paper examines the challenges of content protection and user acceptance of content protection technology. It provides an overview of Microsoft's Active Directory Rights Management Services (AD RMS) and its integration with Titus' Document Classification and Message Classification product suites. 
(WHITE PAPER) READ ABSTRACT |

Enterprise Application Delivery: No User Left Behind by BlueCoat

January 2007 - (Free Research)
Blue Coat ProxyClient extends Blue Coat's visionary application delivery infrastructure to include all of these use cases - from any network, any device, and to any application - keeping users productive wherever the business takes them. 
(WHITE PAPER) READ ABSTRACT |

ZeuS: A Persistent Criminal Enterprise by Trend Micro

March 2010 - (Free Research)
This research paper, presented by Trend Micro, examines the ZeuS botnet; a cyber-criminal tool primarily used to steal money. Access this paper now to learn how ZeuS works, who is behind this crimeware, ZeuS variants now emerging and more. 
(WHITE PAPER) READ ABSTRACT |

Identity and Access Intelligence: Transforming Enterprise Security by IBM

March 2013 - (Free Research)
Consult this white paper to learn more about how the concepts of business IT are transforming. It describes the nature of identity and access intelligence and the factors that are behind this new and emerging aspect of security evolution. 
(WHITE PAPER) READ ABSTRACT |

Windows 8 Product Guide for Developers by Microsoft

December 2012 - (Free Research)
In this white paper, discover the essentials behind Windows 8 development. Read on for more information on the broad reach of the Windows Store, versatile input methods, cloud connection, and more. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Big Data Analytics- Profiling the Use of Analytic Platforms in User Organizations.pdf by BeyeNETWORK

December 2011 - (Free Research)
In this presentation transcript, business intelligence (BI) expert Wayne Eckerson deep dives into the world of big-data analytics. He touches on the movement itself, what is behind it and offers up best practices for performing it. Eckerson also discusses big-data analytics engines and describes the framework for implementing big-data analytics. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Advanced Threat Protection with Dell SecureWorks Security Services by Dell SecureWorks UK

December 2013 - (Free Research)
This guide explores the varying types of advanced threats, their motives, and how you can enhance your security strategy to better detect and resist them. 
(WHITE PAPER) READ ABSTRACT |

API Management is the SOA Renaissance by IBM

December 2013 - (Free Research)
Forward-thinking organizations are moving to more open ecosystems, relying on service-oriented architecture (SOA) and application programming interfaces (APIs). Access this insightful white paper to learn about combining SOA and API management to create more engaging applications through comprehensive integration. 
(WHITE PAPER) READ ABSTRACT |

IBM Security Services Cyber Security Intelligence Index by IBM

July 2013 - (Free Research)
This guide asks some key questions about the current threat landscape and analyzes cyber-attacks across the world. 
(WHITE PAPER) READ ABSTRACT |

IT as a driver of M&A success by ComputerWeekly.com

March 2012 - (Free Research)
IT considerations are not given adequate attention or rigour in the due diligence prior to mergers and acquisitions, this report from Ernst & Young reveals. 
(IT BRIEFING) READ ABSTRACT |

Mass Personalization: How relevance engines are revolutionizing mass communications by xMatters, Inc.

September 2010 - (Free Research)
Mass personalization eliminates the need to send the same message en masse at the same time. By reducing communication “noise,” mass personalization enables recipients to focus on what’s relevant to them at the moment that it matters. Read this paper to find out more. 
(WHITE PAPER) READ ABSTRACT |

Boston Medical Center cuts data center power bill by 50% and saves up to $3.2 million with virtualized storage, server and desktop solutions by Dell, Inc.

June 2010 - (Free Research)
Read this case study to gain more detail into Boston Medical center's quest to lower its operational costs, why it settled on data center virtualization and the benefits it reaped, including $3.2 million in savings in equipment avoidance costs, improved security with desktop virtualization and so much more. 
(CASE STUDY) READ ABSTRACT |

Security Virtual Jam Session: The Secured Enterprise by IBM

February 2008 - (Free Research)
Join IBM Security Executives for an informative session on the current security landscape, the requirements for a new approach to securing the enterprise, and a rare live Q&A session with IBM security leaders. 
(WEBCAST)

Sybase IQ: The Economics of Business Reporting by Sybase, an SAP company

August 2009 - (Free Research)
Reporting is recognized as a way for companies to improve service, ensure quality, control costs, and prevent losses by empowering decision-makers throughout the organization. This paper will explain why reporting is one form of business intelligence that has become business-critical. 
(WHITE PAPER) READ ABSTRACT |

Citrix Receiver for Enterprise Apps by Citrix

March 2010 - (Free Research)
This whitepaper explains how using Oracle applications, Citrix Receiver, and a smart phone, can mobilize any type of enterprise application affordably, overcoming security, usability, and platform incompatibility concerns. 
(WHITE PAPER) READ ABSTRACT |

Application Note: Structured Testing - The Path to Thorough Code Coverage by McCabe Software, Inc.

March 2011 - (Free Research)
Basis path testing, also known as Structured Testing, is the primary code-based testing strategy recommended by McCabe Software and supported by McCabe IQ. The main idea behind this testing is that decision outcomes within a software function should be tested independently. This article provides an overview of the benefits of basis path testing. 
(WHITE PAPER) READ ABSTRACT |

Moving HCM to the Cloud by Workday

January 2014 - (Free Research)
The days of on-premises human capital management (HCM) systems could be numbered. Access this e-guide today to take an expert look at the unstoppable trend of cloud HCM, including its benefits, risks, and costs. 
(EGUIDE) READ ABSTRACT |

Bridge the Gaps in Your E-Commerce Strategy with Electronic Signatures from DocuSign by DocuSign, Inc.

April 2008 - (Free Research)
This special brief discusses the role of electronic signature technology in closing lingering workflow automation gaps to enhance an organization's overall e-commerce strategy. 
(WHITE PAPER) READ ABSTRACT |

Web Exploits: There’s an App for That by M86 Security

May 2010 - (Free Research)
The main motivation driving the cybercrime industry is the possibility of monetary gain. Savvy, knowledgeable individuals with skills in developing Web applications and basic knowledge in hacking have filled a niche by creating exploit kits. Read this white paper to learn the basics about exploit kits, what they do, and why the bad guys use them. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 22 January 2013: Technology takes off at Heathrow Terminal 2 by ComputerWeekly.com

January 2013 - (Free Research)
In this week's Computer Weekly, we go behind the scenes at the building of Heathrow's high-tech Terminal 2 and hear from its CIO about the IT innovations. John Lewis saw 44% online sales growth over Christmas – we find out how the IT team delivered. And News International talks about moving its IT to Amazon's public cloud. Read the issue now. 
(EZINE) READ ABSTRACT |

Computer Weekly - 21 February 2012: Preparing for IPv6 by ComputerWeekly.com

February 2012 - (Free Research)
This week's digital magazine examines the challenges of migrating to IPv6 now the internet has run out of IPv4 addresses - a process every IT manager now faces. We also look into the IT issues facing smart meters and ask what will the beta launch of Gov.uk hold in store for public services? 
(EZINE) READ ABSTRACT |

1 - 25 of 462 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts