Microsoft SQLserver SecureWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Microsoft SQLserver Secure returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Application Security
 •   Endpoint Security
 •   Security Policies
 •   Enterprise Systems Management
 •   Network Security
 •   Storage Security
 •   Virtualization
 •   Storage Management
 •   Security Monitoring

Related Searches
 •   Microsoft Delivery
 •   Microsoft Layout
 •   Microsoft SQLserver Secure Montana
 •   Microsoft SQLserver Secure Performance
 •   Microsoft Tutorials
 •   Net Microsoft
 •   Seminars Microsoft SQLserver Secure
 •   Techniques Microsoft SQLserver Secure
 •   Tools Microsoft SQLserver Secure
 •   Tutorial Microsoft SQLserver Secure
Advertisement

ALL RESULTS
1 - 25 of 445 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

eGuide: Performance tuning SQL Server via queries, indexes and more by Microsoft

April 07, 2009 - (Free Research)
In this E-Guide, brought to you by SearchSQLServer.com and Microsoft, learn how to improve query performance, troubleshoot memory configurations, design optimal indexes, utilize database storage methods and solve common SQL errors. This collection of tips and expert guidance will have your SQL Server environment running at peak performance. 
(EGUIDE) READ ABSTRACT |

Securing your Microsoft Internet InformationServices (MS IIS) Web Server with a Thawte Digital Certificate by Thawte Inc.

July 03, 2012 - (Free Research)
This resource is designed to take the guesswork out of implementing SSL for Exchange 2010, making it easier than ever to get the SSL certificate you need for a successful and secure Exchange implementation. 
(WHITE PAPER) READ ABSTRACT |

Improving business intelligence performance in SQL Server environments by Dell, Inc.

June 30, 2011 - (Free Research)
In this SearchSQLServer.com e-guide, find out how to improve the performance of SQL Server-based BI applications in small and medium-sized organizations. Continue reading to learn more about technologies and best practices that can help improve performance, scalability and, ultimately, the overall success of your BI applications. 
(EBOOK) READ ABSTRACT |

Making Office 365 More Secure and Compliant by Dell Software

July 23, 2012 - (Free Research)
This essential resource explores the strengths and weaknesses of Microsoft Office 365, focusing on security and compliance needs. Find out how you can secure this platform and meet key compliance requirements by leveraging a third-party tool. 
(WHITE PAPER) READ ABSTRACT |

Top Four Considerations for Securing Microsoft SharePoint by Sophos, Inc.

March 18, 2011 - (Free Research)
Microsoft SharePoint is now the standard for internal and external collaboration and content management in much the same way Microsoft Exchange has become the enterprise standard for email. And like Exchange, SharePoint comes with a similar set of adoption challenges: The need to maximize ROI, protect against malware and data loss and establish... 
(WHITE PAPER) READ ABSTRACT |

Top four considerations for securing Microsoft SharePoint by Sophos, Inc.

March 08, 2011 - (Free Research)
This webcast discusses the key risks and best practices to securing Microsoft SharePoint and protecting your organization's digital assets. 
(WEBCAST) READ ABSTRACT |

How to Secure Your Microsoft SharePoint Products by Thawte Inc.

May 22, 2013 - (Free Research)
This e-guide from our experts at searchEnterpriseDesktop.com will help you understand what it takes to make sure SharePoint is secure. Read on to discover a quick checklist you can use to keep security priorities in order. 
(EGUIDE) READ ABSTRACT |

Secure Enterprise e-mail Solutions with Microsoft® Exchange by Agilysys-Sun Technology Solutions

July 1967 - (Free Research)
This white paper describes HP's set of add-on Microsoft Exchange solutions that protect against security, performance and availability risks and enable e-mail administrators to set and better enforce message handling policies. 
(WHITE PAPER) READ ABSTRACT |

Security Best Practices for Developing Windows Azure Applications by Microsoft

November 2010 - (Free Research)
Are you a software designer, architect, developer or tester interested in secure cloud computing solutions?  Download this breakthrough paper focusing on the security challenges and recommended approaches to design and develop more secure applications for Microsoft's Windows Azure platform.  
(WHITE PAPER) READ ABSTRACT |

Securing Microsoft Exchange 2010 with VeriSign Authentication Services by VeriSign EMEA

October 2011 - (Free Research)
This guide from VeriSign Authentication Services will help take the guesswork out of implementing SSL for Exchange 2010, making it easier than ever to get the SSL certificate you need for a successful and secure Exchange implementation, and to take advantage of powerful capabilities such as Subject Alternative Names (SANs). 
(WHITE PAPER) READ ABSTRACT |

Simplified Employee Contract Management via Microsoft Word by SAP America, Inc.

May 2014 - (Free Research)
In this brief video, learn how to automate contract lifecycle management for new and existing employees with an interoperability framework that provides secure integration for SAP and Microsoft. 
(VIDEO) READ ABSTRACT |

Securing microsoft exchange 2010 With Thawte SSL Certificates by Thawte Inc.

July 2011 - (Free Research)
Security continues to be a facet of Exchange technology that must be managed, and your secure sockets layer (SSL) certificates are the key to managing security for Exchange servers. Access this expert white paper now to get an overview of SSL certificates for Exchange 2010. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly 24 January 2012: Has Microsoft succeeded with Trustworthy Computing? by ComputerWeekly.com

January 2012 - (Free Research)
In this week’s Computer Weekly, we mark the 10th anniversary of Microsoft’s Bill Gates announcing the Trustworthy Computing initiative, and ask if it has made IT more secure. We look at what Oracle’s latest developments mean for its software users running rivals’ servers, and conclude our Buyer’s Guide to IT consumerisation. Download the issue now. 
(EZINE) READ ABSTRACT |

Benefits of Consolidating and Virtualizing Microsoft Exchange and SharePoint in a Private Cloud Environment by EMC

February 2013 - (Free Research)
This white paper reveals the benefits of virtual private cloud deployment and how one leading vendor's cloud virtualization technologies support the implementation of secure private cloud deployments of Microsoft Exchange Server and Microsoft SharePoint. 
(WHITE PAPER) READ ABSTRACT |

Capitalizing on Microsoft Windows 7 Mobility Features for Secure Remote Access by Dell, Inc. and Microsoft Windows 7

August 2010 - (Free Research)
As legions of mobile workers connect to their organizations' internal networks, IT leaders must find ways to enhance efficiency and simplify management of remote systems. Read this paper to learn about recent innovations in Dell™ client solutions and the Microsoft® Windows® 7 OS that enable faster, easier mobile access to networks than ever before. 
(WHITE PAPER) READ ABSTRACT |

Simplify SAP Financial Accounting via Microsoft Excel by SAP America, Inc.

May 2014 - (Free Research)
Watch this video to learn about a technology that leverages SAP Gateway's secure integration to get access to SAP financial data via Microsoft applications. Learn how simple it is to create, validate, park, and post financial documents, as well as use Microsoft Excel to get a more flexible view of financial data. 
(VIDEO) READ ABSTRACT |

EVault for Microsoft System Center Data Protection Manager by i365, makers of Evault

June 2010 - (Free Research)
Access this paper now to learn more about EVault® for DPM; the only cross-platform backup and recovery solution that incorporates Microsoft DPM 2010—factory installed, with EVault Software, on top-quality hardware. 
(ARTICLE) READ ABSTRACT |

Information Workplace Platforms: Oracle Vs. Microsoft by Oracle Corporation

October 2008 - (Free Research)
Read this white paper to learn about Oracle and Microsoft workplace platforms strengths and weaknesses. 
(WHITE PAPER) READ ABSTRACT |

Running Microsoft Apps on FlexPod for Vmware by NetApp

January 2012 - (Free Research)
This white paper outlines the benefits associated with virtualizing Microsoft applications, and discusses how a newly-introduced infrastructure solution can simplify the management and cost associated with this process. Read on to learn more about this emerging technology and its benefits. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 11 December 2012: Microsoft puts up prices again by ComputerWeekly.com

December 2012 - (Free Research)
In this week's Computer Weekly, we look at Microsoft's latest price increase for key business software products, and hear from experts on why the decision is flawed. We talk to an organisation that swapped 3,000 BlackBerrys for iPads and iPhones. And we examine the importance of service-level agreements when moving to the cloud. Read the issue now. 
(EZINE) READ ABSTRACT |

Four Best Practices for Secure Web Access by RSA, The Security Division of EMC

June 2009 - (Free Research)
Read this white paper to learn best practices organizations can use to improve their ability to secure sensitive data and in turn, protect revenue, prevent the erosion of customer confidence and brand value, and meet the demands of regulatory compliance. 
(WHITE PAPER) READ ABSTRACT |

SherWeb Launches New Microsoft Exchange 2010 Hosting Services and Offers 88 Percent Larger Mailboxes with Help from Dell by Dell, Inc.

October 2010 - (Free Research)
Learn how SherWeb was able to design and implement a new infrastructure that runs Microsoft Exchange 2010 in a virtualized environment using Dell PowerEdge servers and Dell/EMC storage. 
(CASE STUDY) READ ABSTRACT |

Windows Azure Platform Security Essentials: Module 1 - Security Architecture by Microsoft

December 2010 - (Free Research)
In this video module, Graham Calladine, Security Architect with Microsoft Services partners with the Security Talk Series to describe the security features of the Windows Azure platform, resources available to protect applications and data running on the Microsoft cloud and SQL Azure security and authentication options. 
(WEBCAST) READ ABSTRACT |

Windows Azure Platform Security Essentials for Technical Decision Makers by Microsoft

December 2010 - (Free Research)
In this video, Graham Calladine, Security Architect with Microsoft Services, answers the most common security concerns CxOs and other technical decision-makers have regarding the security of their data in Windows Azure cloud platform. 
(WEBCAST) READ ABSTRACT |

Microsoft Business Productivity Online Suite: Communicate Success by Microsoft

November 2009 - (Free Research)
So you want to supercharge your team's productivity? The key is to get them together. The tools you need are ready right now in the Microsoft Business Productivity Online Suite. Watch this informative video to learn about the myriad of features and benefits that this Microsoft solution has to offer. 
(VIDEO) READ ABSTRACT |

1 - 25 of 445 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts