Management Identity-Based WebWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Management Identity-Based Web returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Identity Management/ User Provisioning
 •   Network Security
 •   E-Mail Management
 •   Application Security
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Access Control
 •   Encryption and Key Management
 •   Secure Instant Messaging
 •   Enterprise Data Protection and Privacy

Related Searches
 •   Creation Management
 •   Function Management
 •   Management Activities
 •   Management Computers
 •   Management Identity-Based Graph
 •   Management Identity-Based Web Company
 •   Management Paper
 •   Management Washington
 •   Payment Management
 •   Reservation Management
Advertisement

ALL RESULTS
1 - 25 of 465 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Secure By Design: Building Identity-based Security into Today’s Information Systems by IBM

March 11, 2013 - (Free Research)
Consult this white paper to learn how you can improve your IT strategy. As the number of IT security incidents increases, businesses must begin to invest in information security and IT risk management. Find out how you create a security technique that is built-in to your company's structure by reading this resource. 
(WHITE PAPER) READ ABSTRACT |

How to Protect Your Critical Resources with Identity-based Access Control by AEP Networks

April 2008 - (Free Research)
This paper addresses the concerns facing network security architects and introduces AEP IDpoint as an advanced IBAC solution that meets datacenter security needs and satisfies modern business security challenges. 
(WHITE PAPER) READ ABSTRACT |

Email Security- The IBE Architectural Advantage by Voltage Security, Inc.

April 2012 - (Free Research)
This resource examines the challenges of securing business communication and how to overcome it. View now to explore the shortcomings of existing encryption solutions, key requirements for ubiquitous secure business communication, how Identity-based encryption (IBE) meets these requirements, and more. 
(WHITE PAPER) READ ABSTRACT |

The True Costs of E-mail Encryption by Trend Micro

August 2010 - (Free Research)
Currently, e-mail encryption is a bit of a paradox. Large organizations understand and want privacy, but e-mail encryption technology is too in-depth for mass usage. Fortunately things are changing. Read this paper to learn so much more. 
(WHITE PAPER) READ ABSTRACT |

Internet Gambling Sites: Expose Fraud Rings and Stop Repeat Offenders with Device Reputation by iovation, Inc.

June 2009 - (Free Research)
This white paper will help you understand what new and innovative techniques can be used to combat online fraud and abuse, and how online casinos can realize a true return on investment by reducing losses from fraud exposure and increasing operational efficiency within the fraud detection process. 
(WHITE PAPER) READ ABSTRACT |

Tackling the Top Five Network Access Control Challenges by Juniper Networks, Inc.

March 2011 - (Free Research)
In this document we explore five common networking challenges that enterprises face—network protection, guest user access, network visibility and monitoring, application access control, and identity-based Quality of Service (QoS)—and discuss how UAC can be used to address each 
(WHITE PAPER) READ ABSTRACT |

Online Dating: Keeping Your Members Safe from Online Scams and Predators by iovation, Inc.

June 2009 - (Free Research)
This whitepaper will help you understand what new and innovative techniques can be used to protect the reputation of your business, keep your members in a safe and trusted environment, while keeping the fraudsters out. Device fingerprinting helps identify the bad guys so sites can eliminate their accounts from the network once and for all. 
(WHITE PAPER) READ ABSTRACT |

Interpol, Entrust Develop Advanced Multipurpose SmartCard by Entrust, Inc.

November 2011 - (Free Research)
See how in this real world case study the power of advanced enterprise security was harnessed to create the most advanced multipurpose credentials in the world for INTERPOL. 
(WHITE PAPER) READ ABSTRACT |

InterScan Messaging Hosted Security (IMHS) Trial by Trend Micro, Inc.

August 2009 - (Free Research)
Many traditional email security solutions take up too much time and are not as effective as they should be in stopping spam. Hosted email security by Trend Micro provides unlimited email scanning capacity with always-up-to-the-minute security that is continuously tuned and optimized 24x7. 
(DOWNLOAD) READ ABSTRACT |

InterScan Messaging Hosted Security (IMHS) Trial by Trend Micro, Inc.

August 2009 - (Free Research)
Many traditional email security solutions take up too much time and are not as effective as they should be in stopping spam. Hosted email security by Trend Micro provides unlimited email scanning capacity with always-up-to-the-minute security that is continuously tuned and optimized 24x7. 
(DOWNLOAD) READ ABSTRACT |

Cisco ASA 5500 Series by Cisco Systems, Inc.

The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, so you can feel confident your business is protected. 
(HARDWARE PRODUCT)

Web Security Gateway: Web 2.0 Secured and Simplified by Websense, Inc.

January 2011 - (Free Research)
The Websense Web Security Gateway is designed for customers that want to ensure their level of web security increases as the web evolves from a static resource, to a dynamic communication platform. 
(WHITE PAPER) READ ABSTRACT |

Building XQuery Based Web Service Aggregation and Reporting Applications by Progress DataDirect

January 2007 - (Free Research)
XQuery has emerged as an ideal way to aggregate data from Web services, relational databases, and other applications that employ XML. 
(WHITE PAPER) READ ABSTRACT |

Rich Internet Applications: Design, Measurement, and Management Challenges by Keynote Systems

January 2006 - (Free Research)
This white paper details the evolution of traditional Web pages and applications, discussing the defining attributes of the emerging class of Rich Internet Applications (RIAs). 
(WHITE PAPER) READ ABSTRACT |

WebPulse Collaborative Defense by BlueCoat

November 2011 - (Free Research)
Malware is constantly evolving, so you need a dynamic security defense that can keep up with the latest web-based threats. Learn how the Blue Coat WebPulse™ collaborative defense powers Blue Coat's web security portfolio, delivering fast and effective Web 2.0 threat protection for 75 million users worldwide. 
(WHITE PAPER) READ ABSTRACT |

Avocent Accelerates Critical Applications over WAN While Ensuring Distributed Web Security at Branch Offices by BlueCoat

September 2011 - (Free Research)
IT infrastructure management solutions provider, Avocent Corporation, needed to accomplish two critical tasks: Improve performance of key business applications and provide decentralized Web security and control for their branch offices. View this case study to learn how they were able to meet both needs with just one solution. 
(CASE STUDY) READ ABSTRACT |

Secure Web Gateway Deployment Methodologies by BlueCoat

September 2010 - (Free Research)
In this article, we’ll talk about the four most common types of Web gateway network deployments. Sometimes referred to as forward proxies, these devices are used to secure Web access for an organization’s internal end users. 
(WHITE PAPER) READ ABSTRACT |

How to Gain Visibility and Control of Encrypted SSL Web Sessions by BlueCoat

January 2006 - (Free Research)
Blue Coat's SSL proxy functionality enables organizations to extend the power of the intelligent and secure proxy appliances to all SSL traffic. Read about how a proxy gives visibility and control of SSL communications. 
(WHITE PAPER) READ ABSTRACT |

Evaluate: IBM Rational AppScan by IBM

June 2011 - (Free Research)
With Web applications exposing more sensitive information to anyone with an Internet connection, new security threats are emerging all of the time. IBM Rational AppScan is a leading application security testing suite designed to help manage vulnerability testing throughout the software development life cycle. 
(TRIAL SOFTWARE) READ ABSTRACT |

The Components of the Red Hat Application Stack by Red Hat and JBoss

November 2006 - (Free Research)
Learn how open source software standardizes Web application platforms and dramatically reduce the cost and complexity of an SOA deployment. 
(WHITE PAPER) READ ABSTRACT |

Leveraging Existing Application Monitoring Tools to Enhance the End-User Experience by Keynote Systems

February 2008 - (Free Research)
This white paper explores an end-to-end performance management platform that provides targeted diagnosis of Web application problems. 
(WHITE PAPER) READ ABSTRACT |

Think beyond Software Performance Monitoring: A Perspective on Your Service-Level Management Strategy by Keynote Systems

May 2005 - (Free Research)
This white paper discusses methods for monitoring Web site performance from an end-user perspective. Explore the benefits associated with neutral, third-party performance monitoring. 
(WHITE PAPER) READ ABSTRACT |

Measuring & Monitoring Flash-Based Web 2.0 Applications by Keynote Systems

February 2008 - (Free Research)
This video presentation covers the power of Flash, and what it takes to provide a superior Flash-based end-user experience, dealing with content-heavy pages and how to deliver the best web performance and availability. 
(DEMO) READ ABSTRACT |

Growing Market Share in a Highly Competitive Financial Services Industry by Keynote Systems

January 2004 - (Free Research)
Financial services organizations strive to retain existing customers and attract new ones, many are introducing new, enhanced services over the Web. Ensure you are providing the best possible experience by focusing your SLM processes on the end user. 
(WHITE PAPER) READ ABSTRACT |

Technical guide on Web Security Gateways by SearchSecurity.com

April 2011 - (Free Research)
Malicious code and the sites hosting it are constantly changing; making it difficult for filtering technologies and signature-based antivirus programs to keep pace with the proliferation of today's' evolving threats. 
(EBOOK) READ ABSTRACT |

1 - 25 of 465 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts