Manuals Security Brand GlobalWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Manuals Security Brand Global returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Application Security
 •   Security Policies
 •   Security Monitoring
 •   Network Security
 •   Business Intelligence Solutions
 •   Storage Security
 •   Business Process Management (BPM)
 •   Enterprise Data Protection and Privacy
 •   Marketing Management

Related Searches
 •   Manuals Definitions
 •   Manuals Security Backup
 •   Manuals Security Brand Directories
 •   Manuals Security Brand Summary
 •   Manuals Security Equipment
 •   Manuals Security History
 •   Manuals Security Professional
 •   Manuals Technical
 •   Policy Manuals Security Brand
 •   Script Manuals Security
Advertisement

ALL RESULTS
1 - 25 of 447 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Building a Global B2B Brand by Wipro Technologies

June 12, 2009 - (Free Research)
In this paper you'll read about the steps Wipro Technologies took in order to take its brand name to the next level in order to compete with the top global IT companies. 
(CASE STUDY) READ ABSTRACT |

Meeting the Requirements of DoD Directive 8570.1 by Global Knowledge Network, Inc.

March 2006 - (Free Research)
The Department of Defense's manual, DoD 8570.01-M Information Assurance Workforce Improvement Program, supports DoD Directive 8570.1, which requires all individuals possessing privileged access to a DoD Information System (IS) to be trained and certified in the secure operation of computer systems used throughout the DoD's Global Information Grid. 
(WHITE PAPER) READ ABSTRACT |

Salvation Army Protects the Integrity of Data and Global Brand by Lumension

October 2013 - (Free Research)
In this white paper, uncover device control software that enables authorized devices and applications to access organizations' networks to ensure security policies and requirements are met. 
(WHITE PAPER) READ ABSTRACT |

Salvation Army Protects the Integrity of Data and Global Brand by Lumension

October 2007 - (Free Research)
Protecting data integrity without hindering their care-givers and officers is paramount for The Salvation Army. This case study reveals how the organization implemented plug and play flexibility for their users with USB devices and mitigated potential data threats with endpoint security. 
(CASE STUDY) READ ABSTRACT |

Global Design Services by NetApp

November 2013 - (Free Research)
In this one page resource, you will discover how a brand-name global design services company deployed an innovative storage solution to replace inefficient backup and disaster recovery systems, which consumed 95 percent of system CPU and storage availability. 
(WHITE PAPER) READ ABSTRACT |

Distributed Data Capture: Reducing the Cost of Remote Business Processes by Kofax, Inc.

March 2011 - (Free Research)
In today’s global economy, information exchange is vital. Competitive advantage goes to the companies that can share information and collaborate quickly and accurately in the most cost-effective manner. Read this white paper now to learn how to effectively lower the costs of your business's document capture process. 
(WHITE PAPER) READ ABSTRACT |

Best Practices in Data Protection: Encryption, Key Management and Tokenization by nuBridges, Inc.

October 2010 - (Free Research)
Protecting sensitive and business-critical data is essential to a company’s reputation, profitability and business objectives. This white paper describes best practices in encryption, key management and tokenization and how an integrated, multi-level solution can effectively meet these best practices. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Data Deduplication for Backup by CommVault Systems, Inc.

October 2011 - (Free Research)
Data deduplication for backup isn’t a brand-new technology anymore - there are a number of new developments and capabilities, and a lot of decisions to make before deploying dedupe. This presentation transcript will keep you up-to-date on the latest developments in dedupe technology. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

The Google/TechTarget Research Project by TechTarget

November 2008 - (Free Research)
Google and TechTarget teamed up to research the usage and interactions between search and online media during the IT purchase process. This research offers insights on making the right choices of keywords and online content for your online marketing plan. 
(WEBCAST)

Profiting on Sustainability through Smart Demand-Supply Networks by E2open

March 2009 - (Free Research)
In this white paper, learn how manufacturers can gain visibility and control over their products' lifecycles, reduce the carbon and energy footprints of their trading partners, and attain brand and cost leadership in an increasingly environmentally-conscious business climate by employing a Smart Demand-Supply Network. 
(CASE STUDY) READ ABSTRACT |

Monitoring for SAP: High-Risk Financial Transactions in Real Time by Security Weaver

February 2009 - (Free Research)
For corporations using SAP, identifying and controlling risky financial transactions is a major undertaking. This paper examines the monitoring challenges faced by finance and reveals the many advantages of real-time transaction monitoring for SAP. 
(WHITE PAPER) READ ABSTRACT |

A Monthly Online Fraud Report from the RSA Anti-Fraud Command Center Phishing Repository by RSA, The Security Division of EMC

February 2009 - (Free Research)
Each month the RSA Anti-Fraud Command Center (AFCC) - a 24x7 war room that detects, monitors, tracks and shuts down phishing, pharming and Trojan attacks worldwide - issues an intelligence report that spotlights a new trend in online fraud and also provides the latest statistics and analyses of global phishing trends. 
(ANALYST REPORT) READ ABSTRACT |

Global aerospace manufacturer empowers staff with fast access to critical information by IBM

April 2014 - (Free Research)
Access the following case study to uncover how one of the biggest aerospace manufactures used a unified access solution to integrate structured and unstructured data sources, provide flexible search and navigation capabilities to ultimately empower their support staff with greater efficiencies and lowered costs. 
(CASE STUDY) READ ABSTRACT |

The Power of Automation: The EDS Story by Hewlett-Packard Company

September 2009 - (Free Research)
It is becoming increasingly difficult for data center pros to manage their IT environments. This webcast explores best practices for automation and details the benefits you can realize from implementing the technology. 
(WEBCAST) READ ABSTRACT |

The Social-Powered Enterprise by Salesforce.com

February 2012 - (Free Research)
This e-book is designed to help you embrace the rise of social media, to harness its power and put it to work throughout the company. It’s based on our experience helping thousands of companies put the power of social media to work. It also discusses the benefits of social-powered selling, including greater reach and better close rates. 
(EBOOK) READ ABSTRACT |

10 Tips for Creating Your Web Site by Global Knowledge Network, Inc.

March 2006 - (Free Research)
The most helpful information and best content will have little impact without simple protocols that make your Web site easier to use and more visually appealling. This paper focuses on 10 tips you can employ to ensure your web site is effective from the day it goes live. 
(WHITE PAPER) READ ABSTRACT |

Product Preview: Time Tracking by Workday

August 2013 - (Free Research)
In this fascinating video, learn about a time tracking solution that can reduce labor costs, minimize compliance risks, and increase worker productivity. 
(WEBCAST) READ ABSTRACT |

Global Trends in Sustainability Performance Management by SAP America, Inc.

June 2010 - (Free Research)
This paper will present an overview of the changing landscape as companies develop practices and processes to measure their performance as sustainable enterprises. It will examine the complex new drivers of sustainability reporting, as well as the rapidly changing legislative environment that will make reporting mandatory, not voluntary. 
(WHITE PAPER) READ ABSTRACT |

Automate to Thrive: Driving Business Agility with Effective Release Management by SERENA Software, Inc.

April 2012 - (Free Research)
This white paper gives an overview of the challenges release management presents, three tips for improving your software release strategies, and insight on how effective release management is poised to become a driver of competitive advantage. 
(WHITE PAPER) READ ABSTRACT |

Project Management Network Diagram: A Tool for Understanding the PM Life Cycle by Global Knowledge Network, Inc.

December 2005 - (Free Research)
This white paper will help you better understand the Project Management Life Cycle by introducing the Project Management Network Diagram (PM Network Diagram) from Global Knowledge. This diagram provides a visual illustration of the life cycle and can help you prepare for the PMP exam. 
(WHITE PAPER) READ ABSTRACT |

BIG-IP Application Security Manager™ by F5 Networks

The BIG-IP Application Security Manager delivers the industry’s foremost comprehensive application delivery security solution with the option to deliver both application delivery and security together. The ASM provides application layer protection from targeted and generalized application attacks to ensure that applications are always available. 
(HARDWARE PRODUCT)

Overcoming the challenges of fax orders to drive customer satisfaction by Esker Inc.

October 2009 - (Free Research)
This case study examines how a global healthcare products company turned to the Esker SaaS document processing automation solution to streamline to help eliminate the challenges associated with manual data entry and paper routing. 
(CASE STUDY) READ ABSTRACT |

IC Intracom Consolidates Global ERP with IBM and SAP by IBM

February 2009 - (Free Research)
In order for IC Intracom to gain an enterprise-wide view of business data, the organization needed to replace its aging ERP solutions. Working with IBM Global Business Services, IC Intracom implemented the IBM Express Wholesale Distribution Solution, a qualified SAP All-in-One partner solution, hosted by IBM Applications on Demand. 
(CASE STUDY) READ ABSTRACT |

Web Application Security: Automated Scanning versus Manual Penetration Testing by Logicalis

December 2008 - (Free Research)
This paper explains the two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis. 
(WHITE PAPER) READ ABSTRACT |

Mobile phone app opportunities for business by ComputerWeekly.com

December 2010 - (Free Research)
Over the past 12 months, the global market for applications – fuelled by the astonishing and unprecedented activity experienced on Apple’s App Store and iPhone – has continued its stellar levels of growth. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 447 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts