Learning About Multi SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Learning About Multi Security returned the following results.
RSS What is RSS?
Related Categories

 •   Virtualization
 •   Data Security
 •   Network Security
 •   Data Center Management
 •   Application Security
 •   Enterprise Systems Management
 •   Security Monitoring
 •   Application Management and Maintenance
 •   Application Servers
 •   Managed Security Services

Related Searches
 •   Computer Learning About
 •   Internet Learning About
 •   Layer Learning About
 •   Learning About Multi Improving
 •   Learning About Multi Networks
 •   Learning About Tool
 •   Linux Learning
 •   Monitor Learning
 •   Objectives Learning About
 •   Supply Learning About Multi
Advertisement

ALL RESULTS
1 - 25 of 458 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Managing Access Security in a Multi-Perimeter World by IBM

December 31, 2012 - (Free Research)
Uncover how an identity and access management strategy can help your organization overcome the risks associated with cloud computing, enterprise mobility, and collaboration in a multi-perimeter enterprise. 
(WEBCAST) READ ABSTRACT |

Tearing Down the Fortress to Better Protect the Enterprise by BlueCoat

October 2008 - (Free Research)
Check out this webcast and learn about the 5 key layers of malware defense that can provide multi-layered protection for your company. 
(WEBCAST) READ ABSTRACT |

Multi-Layer Security Platforms: The New Definition of Best of Breed by Fortinet, Inc.

June 2006 - (Free Research)
Significant changes in the threat, technology, and regulatory landscapes are forcing organizations to implement an array of security controls. This white paper explores the benefits of integrating multiple security layers into a single solution. 
(WHITE PAPER) READ ABSTRACT |

Intel® Cloud Builders Guide: Parallels* Security Monitoring and Service Catalog for Public Cloud VPS Services by Intel

February 2012 - (Free Research)
A cloud environment can be hard to secure, but certain technology can mitigate your risks.This essential white paper focuses on establishing a robust foundation for the deployment of secure multi-tenancy operations. Learn about a set of hardware components that can help you build and maintain a chain of trust to protect your sensitive information. 
(WHITE PAPER)

The Advantages of Multi-Core Architecture in Unified Threat Management (UTM) Solutions by SonicWALL

April 2008 - (Free Research)
Securing your company's network requires a comprehensive approach that includes intrusion prevention, data leak protection, and content filtering. This white paper examines how UTM solutions provide enhanced security that is efficient and cost-effective. 
(WHITE PAPER) READ ABSTRACT |

Case Study: A Large Multi–Program National Laboratory Stays Ahead of Next-Generation Malware By Deploying FireEye Web Malware Protection System by FireEye

May 2011 - (Free Research)
This case study will outline how one company trusted FireEye's Web Malware Protection System to guard their highly sensitive information and how well the system performed. You will also learn about the features the security solutions contains and how it could be perfect for your business.   
(CASE STUDY) READ ABSTRACT |

How to Cut Communications Costs By Replacing Leased Lines and VPNs with MPLS by Star

December 2010 - (Free Research)
Replacement of remaining legacy internet connections with more flexible and secure solutions such as Multi Protocol Label Switching (MPLS), which offer guaranteed security and quality of service, can save organisations substantial amounts of money. Read on to learn more about MPLS. 
(WHITE PAPER) READ ABSTRACT |

Mobile Device Management Systems Help Mitigate BYOD Risks by Citrix Systems, Inc. (E-mail this company)

March 2013 - (Free Research)
This whitepaper will help you learn how mobile device management (MDM) can be used to mitigate the risks associated with mobility and BYOD. Learn more about multi-platform MDM, lifecycle management, enforcing compliance, and other topics. 
(EGUIDE) READ ABSTRACT |

Interoperating with Cisco Systems: Hands-On Look at Configuring D-Link and Cisco for Seamless Savings by D-Link

July 2010 - (Free Research)
The best network design invariably is multi-vendor. That is even more true in an era of constrained budgets where sticking with your existing vendor brings with it not only a price premium, but also the continuation of proprietary approaches. Read this whitepaper to learn more about D-Link's interoperability benefits with Cisco systems. 
(WHITE PAPER) READ ABSTRACT |

HIPAA Violations Incur Multi-Million Dollar Penalties by Absolute Software

January 2013 - (Free Research)
In this resource, read about some recent HIPAA breaches that cost the violating parties significant penalties and learn about the measures that can be put in place to help maintain compliance. 
(WHITE PAPER) READ ABSTRACT |

A Secure Environment to Deploy Software Solutions for Cloud by IBM

May 2013 - (Free Research)
When it comes to deploying cloud applications, many businesses are concerned about infrastructure, platform choice, and security -- but you don't have to be. Watch this informative video to learn how you can leverage a secure, resilient, multi-tenant platform that allows you to quickly and easily deploy cloud applications. 
(VIDEO) READ ABSTRACT |

VMware vCloud Director: Build Secure Private Clouds to Deliver Infrastructure as a Service by VMware, Inc.

May 2011 - (Free Research)
By now, many organizations have taken advantage of the benefits cloud computing can provide. So how can you gain even more benefits from your cloud without sacrificing security or control? Learn about a private cloud platform that allows IT organizations to become cloud service providers for the business. 
(WHITE PAPER) READ ABSTRACT |

Eradicate Cross-Site Scripting by Veracode, Inc.

February 2011 - (Free Research)
The rise of e-commerce has generated a concurrent surge of Internet crime into a multi-billion-a-year industry, as criminals follow the money, the countless potential online victims and the vulnerability of web applications to easy exploitation. 
(WHITE PAPER) READ ABSTRACT |

For regulated industries: Learning within a multi-tenant SaaS architecture by SuccessFactors

December 2013 - (Free Research)
This resource describes the need for compliance with Good Practice requirements in regulated industries, explores key challenges of the validation process for learning environments, and evaluates whether multi-tenant SaaS architecture is a viable option. 
(WHITE PAPER) READ ABSTRACT |

Managing Risk in the Cloud by NetApp

October 2009 - (Free Research)
This white paper explores today's top security concerns in cloud environments, and aims to dispel the common (and growing) myth that a cloud-based infrastructure introduces new risks that cannot be quantified nor controlled. In this paper, you'll learn how a holistic approach to information security can help your company successfully combat risks. 
(WHITE PAPER) READ ABSTRACT |

Free yourself to do more, while securing your business simply and cost-effectively by Sophos, Inc.

June 2009 - (Free Research)
It's vital for businesses to secure their systems and data against a growing field of threats. However, implementing and maintaining full-spectrum protection can be a heavy drain on financial and human resources if not done right. Read this whitepaper to learn how a more efficient approach to security can free up much needed resources. 
(WHITE PAPER) READ ABSTRACT |

The New Face of Intrusion Prevention by Check Point Software Technologies Ltd.

June 2009 - (Free Research)
Check Point IPS Software Blade gives breakthrough performance and protection at a breakthrough price. For more details, check out this paper, which highlights the numerous benefits of Check Point intrusion prevention protection solutions. 
(WHITE PAPER) READ ABSTRACT |

Organized, Hybridized Network Monitoring by Dell Software

May 2012 - (Free Research)
This resource takes an in-depth look at a hybridized network monitoring solution that allows you to segment your own IT infrastructure while creating whatever boundaries you need to treat other business units as distinct entities. 
(WHITE PAPER) READ ABSTRACT |

New Platforms, New Technologies, Old Headaches by NetIQ

August 2011 - (Free Research)
View this webcast to learn more about the challenges of designing an effective disaster recovery plan for the modern multi-platform data centre. 
(WEBCAST) READ ABSTRACT |

The Essentials Series: Security Information Management by SecureWorks

October 2009 - (Free Research)
This collection of articles from Realtime Publishers presents a clear and concise overview of security information management (SIM). The articles present the business case for SIM, operational and organizational issues, and hints and tips for ensuring a successful SIM implementation. 
(WHITE PAPER) READ ABSTRACT |

The State of Database Management by IBM

June 2008 - (Free Research)
Data managers are concerned about managing the explosion of data, and are looking for ways to manage the process. In this survey from IDUG, learn about improving database performance and overall corporate performance. 
(WHITE PAPER) READ ABSTRACT |

A Business Guide to MPLS IP VPN Migration: Five Critical Factors by XO Communications

April 2012 - (Free Research)
Uncover five critical factors for a successful migration to an MPLS IP VPN service in this whitepaper. Learn the evolving needs of today’s enterprise networks and uncover how an MPLS-based IP VPN can help you fulfill these wants and needs. 
(WHITE PAPER) READ ABSTRACT |

7 Things You Should Know About Multi-channel Self-Service by Aspect

March 2014 - (Free Research)
Todays' customers expect service via a variety of channels: mobile, social media, and old-fashioned telephone, to name a few. To keep up with customer demands, your contact center must figure out how to deploy multi-channel self-service. View this resource for seven things you need to know about multi-channel self-service before you get started. 
(WHITE PAPER) READ ABSTRACT |

inStream Solutions launches with Confidence Thanks to Savvis Symphony VPDC by SAVVIS

June 2013 - (Free Research)
Follow this case study to hear about the cloud strategy one organization deployed to improve their test and development environment with an advanced virtual private data center platform. 
(CASE STUDY) READ ABSTRACT |

Unprecedented Reliability and Scalability in a Multi-Processor Server with the Intel® Xeon® Processor 7500 Series by Dell, Inc. and Intel®

June 2010 - (Free Research)
Whether you've got data-demanding applications, are deploying a private cloud, or are using virtualization to consolidate your data center or develop a robust data recovery plan, the Intel® Xeon® processor 7500 series, with Next-Generation Intel® Microarchitecture (Nehalem), expands server capabilities with world-record-breaking performance. 
(PRODUCT OVERVIEW) READ ABSTRACT |

1 - 25 of 458 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts