Layer MeasuresWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Layer Measures returned the following results.
RSS What is RSS?
Related Categories

 •   Network Security
 •   Application Security
 •   Data Security
 •   Security Monitoring
 •   Network Management
 •   Data Center Management
 •   Virtualization
 •   Networks
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)
 •   Endpoint Security

Related Searches
 •   Graphics Layer Measures
 •   Issues Layer Measures
 •   Layer Automation
 •   Layer Find
 •   Layer Framework
 •   Layer Managing
 •   Layer Measures Best
 •   Layer Measures Records
 •   Layer Measures Supplier
Advertisement

ALL RESULTS
1 - 25 of 472 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

SANS Institute: Oracle Database Security, What to Look for and Where to Secure by Oracle Corporation

June 08, 2010 - (Free Research)
To properly protect the information at the database layer there are a number of comprehensive measures that need to be taken. With this paper Tanya Baccum, SANS Institute analyst, examines these measures for holistically protecting Oracle database from inside out. 
(WHITE PAPER) READ ABSTRACT |

Database Middleware: Struggling with Performance? by Progress DataDirect

February 03, 2011 - (Free Research)
Drivers are an important component of database middleware, but they don’t work in isolation. They’re part of a multi-layered architecture that handles the communication between a database application and the database management software. Learn how these layers influence performance and how to optimize efficiency for data requests and responses. 
(WHITE PAPER) READ ABSTRACT |

Securely Implement and Configure SSL to Ward Off SSL Vulnerabilities by GeoTrust, Inc.

May 16, 2013 - (Free Research)
This e-guide from SearchSecurity.com explores the issues threatening SSL vulnerabilities and offers advice on how to defend against said risks. View now to learn more! 
(EGUIDE) READ ABSTRACT |

E-Book: How to Lose Customers in Five Easy Steps by SAS

August 24, 2009 - (Free Research)
This paper presents the five most common practices that result in losing the customer and how to avoid those pitfalls. You'll also learn how smarter customer interactions and more customer-centric measures can help you deepen and grow relationships with your most valuable customers. 
(EBOOK) READ ABSTRACT |

Splunk for Application Management by Splunk

April 03, 2012 - (Free Research)
This paper examines features and benefits of a unified application management structure that can give you real-time data access, custom dashboards, performance metrics and more. 
(WHITE PAPER) READ ABSTRACT |

McAfee Endpoint Protection Suite by McAfee, Inc.

May 31, 2013 - (Free Research)
This whitepaper will introduce you to a security solution that addresses advanced malware, data loss, and other issues from a single, manageable environment and can help limit your exposure to Internet threats. Read on and discover how this solution can offer you advanced e-mail virus and spam protection, comprehensive device control, and more. 
(WHITE PAPER) READ ABSTRACT |

Advanced Virtualization E-book - Chapter 5: Avoid Security Holes in the Virtual Data Center by SearchServerVirtualization

April 29, 2010 - (Free Research)
In Chapter 5 of the Advanced Virtualization e-book, security experts Danielle Ruest and Nelson Ruest explain how to identify, map out and prevent some of the most common resource pool threats. The authors also debunk five common security misconceptions of server virtualization. 
(EBOOK) READ ABSTRACT |

How to choose a Certificate Authority by VeriSign EMEA

January 12, 2012 - (Free Research)
This white paper looks at the role of Certificate Authorities (CAs) in web security, including what measures a CA can take to promote trust in its certificates and the criteria to consider when choosing the best CA for the job. 
(WHITE PAPER) READ ABSTRACT |

Five Best Practices to Protect Your Virtual Environment by Juniper Networks, Inc.

April 20, 2012 - (Free Research)
<p>Discover how you can realize the benefits of virtualization without sacrificing security in this whitepaper that outlines five best practices to utilize to protect your virtual environment. </p> 
(WHITE PAPER) READ ABSTRACT |

Fortune 200 Firm Achieves Global Email Protection by WatchGuard Technologies, Inc.

March 15, 2011 - (Free Research)
Eaton Corporation, a premier industrial manufacturer, is an industry leader in diversified power management and ranks in the Fortune 200. 
(CASE STUDY) READ ABSTRACT |

Cisco's Unified Computing System vs. IBM Flex System: How Do They Compare? by IBM

November 30, 2012 - (Free Research)
Check out this exclusive resource to find out how Cisco's Unified Computing System measures up against IBM's Flex System, both of which have blade environments. 
(WHITE PAPER) READ ABSTRACT |

Tackling Today’s Data Center Energy Efficiency Challenges – A Software-Oriented Approach by Schneider Electric

January 28, 2011 - (Free Research)
Energy consumption is a growing concern for data centers. This paper outlines a software-based approach to the data gathering, trending, and analysis that are necessary to apply successful energy efficiency measures in data center environments. 
(WHITE PAPER) READ ABSTRACT |

The OSI Model: Understanding the Seven Layers of Computer Networks by Global Knowledge

July 2006 - (Free Research)
This paper explains each of the seven layers of OSI model, including their functions and their relationships, also it provide with an overview of the network process, which can act as a framework for understanding the details of computer networking. 
(WHITE PAPER) READ ABSTRACT |

Address performance and capacity issues by deploying a virtual infrastructure for SAP by VMware, Inc.

March 2009 - (Free Research)
This white paper describes technical and business considerations for deploying a virtual infrastructure for SAP landscapes with EMC and VMware technologies. The white paper addresses a variety of key considerations for deploying such an infrastructure. 
(WHITE PAPER) READ ABSTRACT |

Layered Security: Protecting Your Data in Today's Threat Landscape by Tripwire, Inc.

November 2011 - (Free Research)
In this white paper, learn how threats have evolved over time, shortcomings of the perimeter-centric approach to security, steps to implementing a layered security approach to security, and much more. 
(WHITE PAPER) READ ABSTRACT |

Deliver Application-level Security at Data Center Performance Levels by Check Point Software Technologies Ltd.

September 2008 - (Free Research)
The shift from network-layer attacks to dynamically changing application-layer threats has dramatically increased security needs. This paper examines appliances that can quickly evolve to guarantee performance yet maintain a high level of security. 
(WHITE PAPER) READ ABSTRACT |

Business Ready Solutions for Virtual Infrastructure Availability Using Dell™ PowerEdge™ Servers, Dell Powervault™ Storage, and VMware vSphere™ by Dell, Inc. and Intel®

July 2009 - (Free Research)
This white paper presents an example configuration and best practices for deploying and configuring a highly available architecture using an example solution configuration and then discussing how the configuration helps in maximizing uptime. 
(WHITE PAPER) READ ABSTRACT |

Cloud Infrastructure Foundation - A Flexible, Responsive Cloud Is Built from the Ground Up by Egenera

November 2010 - (Free Research)
At its heart, cloud computing is a new operational and business model for IT application hosting, rather than a new technology. It promises to deliver highly reliable, highly elastic services that respond quickly and smoothly to changing user demand. 
(WHITE PAPER) READ ABSTRACT |

Layered Tech expands to new markets and improves ROI with CA 3Tera AppLogic by CA Technologies.

March 2011 - (Free Research)
This case study explains how Layered Tech’s implementation of CA 3Tera AppLogic helped it improve ROI and enabled Layered Tech to service a new market of premium customers without increasing costs. 
(CASE STUDY) READ ABSTRACT |

When Availability Matters: Change Control for SaaS Providers by Tenzing Managed IT Services

December 2010 - (Free Research)
This paper examines that to build an effective change management framework and achieve high availability numbers for an SaaS application requires maturing IT processes along established best practices and investing in quality change management tools. 
(WHITE PAPER) READ ABSTRACT |

In Control at Layer 2: A Tectonic Shift in Network Security by SafeNet, Inc.

November 2013 - (Free Research)
This crucial white paper discusses the shift of encryption within Layer 2, examining the drivers behind it and how you can best apply encryption to get the most protection for your critical data. 
(WHITE PAPER) READ ABSTRACT |

Simpler Database Migrations Have Arrived! IBM, ANTs Software, And EnterpriseDB Offer Innovative New Options by IBM

June 2011 - (Free Research)
Application developers and DBAs looking to migrate databases due to cost concerns, staffing problems, or technology issues should consider this new database compatability layer option to mitigate risk, lower migration cost, and speed the migration process. 
(WHITE PAPER) READ ABSTRACT |

The Foundation of High-Value Business Intelligence: A Description of the WebFOCUS 7.1 Architecture by Information Builders

June 2006 - (Free Research)
Good architecture for information systems is as important as good engineering is for automobiles and with good architecture, applications can be scaled up with less hardware. 
(WHITE PAPER) READ ABSTRACT |

Data Abstraction Best Practices by Composite Software

March 2011 - (Free Research)
Data abstraction overcomes data structure incompatibility by transforming data from its native structure and syntax into reusable views and data services. But some data abstraction approaches work better than others. Composite data virtualization is an optimal way to implement an abstraction layer at enterprise scale. 
(WHITE PAPER) READ ABSTRACT |

Layered Security: Why It Works December 2013 by Symantec Corporation

December 2013 - (Free Research)
This guide explores the importance of deep, layered security strategies and how network security can help ensure security for your system. 
(ANALYST REPORT) READ ABSTRACT |

1 - 25 of 472 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts