Knowledge Distribution SecureWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Knowledge Distribution Secure returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Enterprise Information Integration/ Metadata Management
 •   Document Management
 •   Enterprise Content Management (ECM)
 •   Network Security
 •   Information Lifecycle Management
 •   Records Management
 •   Security Monitoring
 •   Access Control
 •   Wireless Technologies and Mobile Computing

Related Searches
 •   Documents Knowledge Distribution
 •   Full Knowledge Distribution Secure
 •   Knowledge Distribution Improvement
 •   Knowledge Distribution Secure Schemas
 •   Knowledge General
 •   Knowledge Organization
 •   Measured Knowledge
 •   Regional Knowledge Distribution
 •   Webcasts Knowledge Distribution
Advertisement

ALL RESULTS
1 - 25 of 478 | Next Page

Featured Sponsors

Enterprise Engineer 3.5 by McLaren Software.
McLaren's Enterprise Engineer application suite assures the integrity of your asset documentation, providing a single point of control to manage the lifecycle of asset related more...
>> Discover more offerings from McLaren Software.
Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Desktop Virtualization: The Key for Securing Your Enterprise by Citrix

October 04, 2010 - (Free Research)
In this paper, Citrix® unveils how desktop virtualization provide IT organizations visibility and control over data to help achieve security and regulatory requirements, without compromising business performance, productivity, and the user experience. 
(WHITE PAPER)

Will Your Company Benefit from Fax Servers and Electronic Document Delivery? by OpenText

October 26, 2010 - (Free Research)
This paper discusses how efficient, secure and cost-effective distribution of this business information can have a significant impact on overall business performance by extending process efficiencies. That’s where fax server software can provide a business edge. Read on to learn if your company can benefit from automating document delivery. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Web Services Security: What's Required to Secure a Service-Oriented Architecture by Oracle Corporation

January 2008 - (Free Research)
This white paper details a holistic approach for Service Orientated Architecture (SOA) security using additional, application-level industry standards to secure web services and multi-step transactions in a SOA environment. 
(WHITE PAPER) READ ABSTRACT |

Implementing a "Smart IPS": IANS Working Knowledge Series™ by Sourcefire

June 2008 - (Free Research)
The LA Times faced challenges securing its internal network and complying with PCI to address both issues they decided to implement an IPS they develop selection criteria, investigated several solutions, and ultimately selected Sourcefire. 
(CASE STUDY) READ ABSTRACT |

An Introduction to Quantum Lifecycle Management by ComputerWeekly.com

November 2012 - (Free Research)
This report from The Open Group introduces QLM, explains why it is necessary and how its development and acceptance will be assured. 
(ESSENTIAL GUIDE) READ ABSTRACT |

UK IT priorities 2012 by ComputerWeekly.com

August 2012 - (Free Research)
This exclusive Computer Weekly research reveals how UK IT departments are prioritising their budgets in 2012, which technologies they are investing in, and the impact of cloud computing, mobile and other disruptive technology on their IT strategies. 
(IT BRIEFING) READ ABSTRACT |

Top 10 Security Checklist for SOHO Wireless LANs by Global Knowledge Network, Inc.

May 2005 - (Free Research)
Discover the ten simple steps SOHO users can take to secure their wireless networks. 
(WHITE PAPER) READ ABSTRACT |

Workgroup Connections Notes eDiscovery by Workgroup Connections, An IBM Partner

March 2009 - (Free Research)
This comprehensive offering provides an immediate and long-term solution that helps companies apply cost-saving best practices, reduce risk and improve the management of their eDiscovery efforts. 
(PRODUCT OVERVIEW) READ ABSTRACT |

Seven Questions to Determine if E-mail Archiving, Migration, or Both, Are Right for You by Dell Software

April 2011 - (Free Research)
This Quest Software white paper discusses seven important questions you should ask before migrating to Microsoft Exchange - and how these questions can help you determine which solution will help to make your migration project exceptional. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: A Guide to Securing Data in the Cloud and Meeting Cloud Compliance Regulations by CA Technologies.

July 2010 - (Free Research)
This e-guide evaluates the current loop holes within the public cloud landscape, and lists questions to ask before moving forward with the process. Learn how the importance of where your data resides plays a large role in compliance and data protection. 
(EGUIDE) READ ABSTRACT |

Computer Weekly - 14 February 2012: Does government IT deliver value for money? by ComputerWeekly.com

February 2012 - (Free Research)
This week’s Computer Weekly, investigates the costs of government IT, asking whether taxpayers are getting value for money from the 8,000 IT staff employed by Whitehall. We also examine how IT leaders are preparing for the growth of bring-your-own-device policies and the mobile security implications. 
(EZINE) READ ABSTRACT |

Cloud-based File Management System for BlackBerry PlayBook Tablet Customers by BlackBerry

July 2012 - (Free Research)
Discover details about a cloud-based content management solution that helps you achieve simple, secure content sharing from desktops, laptops, smartphones, or tablets in a flexible, dynamic manner. 
(WHITE PAPER) READ ABSTRACT |

Archive Attender™ for Exchange - Affordable Email Archiving by Sherpa Software

Archive Attender is a solution designed to move or copy messages from mailboxes, PST files and public folders. Administrators search indexed archives and view reports for storage and compliance. No SQL database or proprietary hardware required. Offers flexible archiving architecture. Free Trial available. 
(SOFTWARE PRODUCT)

E-Book: DLP for Health Care - Strategies for Securing Electronic Health Information in the Age of HITECH by SearchHealthIT.com

April 2010 - (Free Research)
Data loss prevention (DLP) in health care—which mostly entails preventing patients’ protected health information (PHI) from falling into the wrong hands—requires well-conceived, well-enforced policies and the technology to back them up. 
(EBOOK) READ ABSTRACT |

Ensuring Security on i by Bsafe Information Systems

August 2008 - (Free Research)
This security runbook guides you through all stages of securing your system. Discover the importance of a company-wide commitment to security. 
(WHITE PAPER) READ ABSTRACT |

Strategies for Cisco VPN Client Large-Scale Deployments by Global Knowledge Network, Inc.

March 2006 - (Free Research)
This paper explores the tools Cisco provides to simplify mass deployments of the VPN Client. The two methods are discussed: the creation of an installation CD-ROM and network-based installations. I will explain how to reduce calls to the Help Desk by locking users out of advanced configuration functions in the user interface. 
(WHITE PAPER) READ ABSTRACT |

SQL Server 2000 Security Best Practices by Global Knowledge Network, Inc.

November 2004 - (Free Research)
The security of SQL Server database servers has become a top priority for database administrators. This article examines best practices that can be employed to secure Microsoft SQL Server 2000 databases. It provides an overview of the security model in SQL Server 2000 and discusses best practices you can employ to secure yours. 
(WHITE PAPER) READ ABSTRACT |

Are Big Files Big Problems? by OpenText

October 2013 - (Free Research)
This paper discusses the challenges associated with file transfer solutions and how managed file transfer solutions solve these problems. 
(WHITE PAPER) READ ABSTRACT |

Informatica B2B Data Transformation and Data Exchange by Informatica

June 2010 - (Free Research)
View this webcast and garner further information on Informatica B2B Data Transformation and Informatica B2B Data Exchange 
(WEBCAST) READ ABSTRACT |

Webcast - Closing the Four Security Risk Gaps of Mainframe Console Access by I/O Concepts Inc.

December 2008 - (Free Research)
The information presented in this webcast can help you be sure your company's commitment to security includes all levels of mainframe access. 
(WEBCAST) READ ABSTRACT |

Beyond FTP: Securing and Managing File Transfers by Linoma Software

March 2010 - (Free Research)
Every day, millions of files are exchanged all over the world by corporations, government entities and other organizations. Most file transfers use the popular protocol known as FTP. This paper will examine how FTP has become the standard for business-to-business file transfers and the key pitfalls that face management using this open protocol. 
(WHITE PAPER) READ ABSTRACT |

Best Practices for Cloud Compliance, Secure Backup, and Successful Information Management by SearchSecurity.com

July 2013 - (Free Research)
This E-Guide explores the keys to maintaining control over increasingly large data sets from a compliance, backup and information management perspective. 
(EGUIDE) READ ABSTRACT |

How to Succeed at Service-Oriented Architecture by Global Knowledge

June 2013 - (Free Research)
In this helpful resource, discover everything you need to know about succeeding with a service-oriented-architecture (SOA) project. You'll get advice on how to design your service interfaces, your services, your data model, and your business processes, along with other tips and guidelines. 
(WHITE PAPER) READ ABSTRACT |

WebSphere Cloudburst Appliance and PowerVM by IBM

July 2011 - (Free Research)
Cloud computing is the pooling of computing resources to provide a single source of computing power to multiple users. Find out how a cloud manager provides a self-service portal that maintains permissions and information about cloud objects such as virtual images, patterns, and resources. 
(WHITE PAPER) READ ABSTRACT |

IBM Rational Asset Manager e-Kit by IBM

March 2009 - (Free Research)
Explore the benefits of Rational Asset Manager with this IBM e-Kit. The e-Kit includes demos, white papers and a webcast. Discover how to track and audit your assets to utilize them for reuse, especially within a service-oriented architecture. 
(PRODUCT DEMO) READ ABSTRACT |

1 - 25 of 478 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts