Notes About SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Notes About Security returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Network Security
 •   Security Policies
 •   Storage Security
 •   Application Management and Maintenance
 •   Application Security
 •   Application Integration
 •   Security Monitoring
 •   Collaborative Tools
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)

Related Searches
 •   Issues On Notes About
 •   Methodology Notes
 •   Notes About Papers
 •   Notes About Security Strategy
 •   Notes About Security Support
 •   Notes Applications
 •   Notes Firms
 •   Notes Researching
 •   On-Line Notes
 •   Records Notes About
Advertisement

ALL RESULTS
1 - 25 of 475 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Presentation Transcript: Building a Comprehensive Notes/Domino Archiving Strategy by Sherpa Software

March 25, 2010 - (Free Research)
This presentation transcript explains why archiving Domino content (including email and applications) is necessary for most companies. Learn about current archiving tool trends and best practices for Domino. Discover how to enlist a strategy that will best fit your organization's archiving needs. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Security Best Practices for Developing Windows Azure Applications by Microsoft

November 17, 2010 - (Free Research)
Are you a software designer, architect, developer or tester interested in secure cloud computing solutions?  Download this breakthrough paper focusing on the security challenges and recommended approaches to design and develop more secure applications for Microsoft's Windows Azure platform.  
(WHITE PAPER) READ ABSTRACT |

Eliminating Notes ID File Password Management: A Ground-breaking Alternative by PistolStar, Inc.

June 2008 - (Free Research)
Read this white paper to learn how to eliminate the hassles of Lotus Notes ID file password management by enabling access via Notes by authenticating it against LDAP. 
(WHITE PAPER) READ ABSTRACT |

Windows Azure Platform Security Essentials for Business Decision Makers by Microsoft

November 2010 - (Free Research)
In this video, Graham Calladine, Security Architect with Microsoft Services, answers the most common security concerns CxOs and other business decision-makers have regarding the security of their data in Windows Azure cloud platform. Watch this video to learn more! 
(VIDEO) READ ABSTRACT |

Notes Migration Tools That Reduce Stress and Increase Success by Dell Software

March 2011 - (Free Research)
Migrating from Lotus Notes to Exchange and SharePoint can be complex and expensive, so proper planning and execution is key. You must ensure that you minimize downtime and data loss – while keeping productivity high - when transitioning mailboxes and applications. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Alloy Software by IBM and SAP by IBM

August 2010 - (Free Research)
Alloy software by IBM and SAP is a solution that presents information and data from SAP applications in the context of what millions of business users are familiar with–the IBM Lotus Notes collaboration software user interface. Access this white paper to learn about how it works, deployment options, customization options and much more. 
(WHITE PAPER) READ ABSTRACT |

Celina Insurance Group Streamlines Collaborative Processes with Agents to Stay ahead of the Competition by IBM

March 2009 - (Free Research)
Read this case study to see how Celina Insurance Group implemented a collaborative extranet based on IBM Lotus Notes and Lotus Domino to enhance their competitive edge. 
(CASE STUDY) READ ABSTRACT |

The Future of Authentication for Online Services by SafeNet, Inc.

November 2009 - (Free Research)
In this white paper, we take a look at how strong authentication can benefit eCommerce and online services. We will evaluate the risks that identity fraud, phishing and cybercrime pose for online service providers and discuss how strong user authentication can alleviate these risks. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 13 November 2012: Government commits to open standards by ComputerWeekly.com

November 2012 - (Free Research)
In this week's Computer Weekly, we look at the government's controversial new policy on open standards and what it means for public sector IT. After hurricane Sandy hit New York, we talk to one datacentre operator about how it kept services running. And our latest buyers' guide examines the market for infrastructure on demand. Read the issue now. 
(EZINE) READ ABSTRACT |

Terrorist use of the internet by ComputerWeekly.com

May 2014 - (Free Research)
Terrorists are using web technology to help them launch cyber-attacks. What are the current and future threats? 
(ESSENTIAL GUIDE) READ ABSTRACT |

Battling Modern Botnets in the Enterprise by FireEye

September 2008 - (Free Research)
The prevalence of botnets is growing at an alarming rate. The FBI ranked cybercrime as one of it's top priorities and noted that it cost businesses $67.2 billion in 2005 alone. Learn how to keep botnets out of your business. 
(WHITE PAPER) READ ABSTRACT |

Information Security Magazine - September 2009: Readers’ Choice Awards by Information Security Magazine

September 2009 - (Free Research)
This issue of Security Information Magazine features the 2009 Readers’ Choice Awards. For the fourth consecutive year, our readers voted to determine the best security products. A record 1,721 voters participated this year, rating products in 17 different categories. There’s also a great article on the facts and myths about encryption and more. 
(EZINE)

WebSense Security Lab: Zero-Day in Critical Vulnerability by Websense, Inc.

September 2009 - (Free Research)
The Websense Security Labs Team provides a review of recent threats in this presentation transcript. Learn more about techniques for defending your organization from Web threats. Techniques include the monitoring, classification, and identification of all Web content in real time. Read on to learn more. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

This Month in the Threat Webscape for July 2009 by Websense, Inc.

September 2009 - (Free Research)
In this video, learn more about the top techniques for defending your organization from Web threats. Techniques include the monitoring, classification, and identification of all Web content in real time. 
(VIDEO) READ ABSTRACT |

IDC White Paper – Identity and Access Management for Approaching Clouds by CA Technologies.

July 2010 - (Free Research)
Cloud computing is in the process of changing the enterprise IT landscape. Read this paper to learn about the security issues of the cloud and how to improve its security and visibility. 
(WHITE PAPER) READ ABSTRACT |

Using Microsoft Active Directory in the Domino World by PistolStar, Inc.

February 2009 - (Free Research)
Active Directory for Windows-based Lotus shops has left administrators with yet another account to manage. Learn about the password management challenges AD brings and the benefits of enabling users to use AD as a central authentication point. 
(WHITE PAPER) READ ABSTRACT |

Considerations for Mobilizing Your Lotus Notes Applications by Teamstudio, Inc.

August 2010 - (Free Research)
In this paper, we’ve reviewed several viable options for mobilizing your Lotus Notes applications, and only you and your team can decide what will work best for your organization. One thing, however, is clear. When you give it some thought, you’ll find that mobilizing carefully selected applications and functions makes good business sense. 
(WHITE PAPER) READ ABSTRACT |

IBM Lotus Notes and Domino by IBM

December 2011 - (Free Research)
IBM Lotus Notes and Domino Administrator clients form the backbone of a simplified, security-rich, and real-time work environment designed to foster an increase in knowledge sharing, business insight and productivity. Download the trial for an evaluation period of 90 days. 
(TRIAL SOFTWARE) READ ABSTRACT |

The Financial Edge™: Fund Accounting Software for Nonprofits by Blackbaud

The Financial Edge gives you all the information you need to make the best financial decisions for today and tomorrow. Think of it as insurance for your organization’s future. 
(ASP & SOFTWARE PRODUCT)

Evaluate: Lotus Notes and Domino Administrator clients by IBM

June 2011 - (Free Research)
IBM Lotus Notes and Domino Administrator clients nurture communication and real-time connections to form the backbone of a simplified, security-rich, and real-time work environment designed to foster an increase in knowledge sharing, business insight and productivity. 
(TRIAL SOFTWARE) READ ABSTRACT |

Interoperating with Cisco Systems: Hands-On Look at Configuring D-Link and Cisco for Seamless Savings by D-Link

July 2010 - (Free Research)
The best network design invariably is multi-vendor. That is even more true in an era of constrained budgets where sticking with your existing vendor brings with it not only a price premium, but also the continuation of proprietary approaches. Read this whitepaper to learn more about D-Link's interoperability benefits with Cisco systems. 
(WHITE PAPER) READ ABSTRACT |

Automatically Dictate Progress Notes Directly into the EHR by Nuance

December 2013 - (Free Research)
This white paper features a solution that allows clinicians to dictate their progress notes, which are later sent to the EHR, to eliminate incomprehensive and inaccuracies from handwritten notes. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Geek Out on the Best Practices of a Google Apps Migration by Google Apps

January 2011 - (Free Research)
Whether you're actively considering Google Apps as part of your next generation messaging strategy or just learning about cloud computing, this webcast will provide IT professionals with the knowledge you need to answer the boss's question about the technical details of moving to the cloud. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Presentation Transcript: Geek Out on the Best Practices of a Google Apps Migration by Google Apps

June 2010 - (Free Research)
Whether you're actively considering Google Apps as part of your next generation messaging strategy or just learning about cloud computing, this webcast will provide IT professionals with the knowledge you need to answer the boss's question about the technical details of moving to the cloud. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

CSC Germany Expands Digital Faxing via Open Text Fax Server Integrated with Lotus Notes and SAP by OpenText

October 2010 - (Free Research)
This case study discusses how CSC used Open Text Fax Server, Fax Server Connector for Lotus Notes, and Fax Server Connector for SAP to resolve their long standing fax problems.  Read on to learn all the benefits they experienced from Open Text and learn how you can experience the same benefits. 
(CASE STUDY) READ ABSTRACT |

1 - 25 of 475 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts