Operate Application SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Operate Application Security returned the following results.
RSS What is RSS?
Related Categories

 •   Endpoint Security
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Operating Systems and Subsystems
 •   Data Center Management
 •   Data Security
 •   Authentication / Password Management
 •   Virtualization
 •   Wireless Security
 •   Mobile Device Management
 •   Application Security

Related Searches
 •   Linux Operate
 •   Managers Operate Application Security
 •   Needs Operate Application
 •   Operate Application Samples
 •   Operate Application Security Case Study
 •   Operate Calls
 •   Operate Mapping
 •   Products Operate
 •   Terminal Operate Application
 •   Tool Operate Application
Advertisement

ALL RESULTS
1 - 25 of 454 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Virtualization Defined - Eight Different Ways by F5 Networks

September 2008 - (Free Research)
Virtualization is not a new concept. Today it appears that virtualization is everywhere, which because of its ambiguity can be applied to any and all parts of an IT infrastructure. This whitepaper focuses on virtualization in the data center. 
(WHITE PAPER) READ ABSTRACT |

Securing the Foundation of Information Technology (IT) Systems by Trusted Computer Solutions

January 2010 - (Free Research)
This paper explains how there is no one process to make any organization 100% secure, but establishing a company-wide security policy based on industry-standard best practices is a good place to start. Many of these best practices can be implemented as part of the operating system assessment and lock down process. 
(WHITE PAPER) READ ABSTRACT |

When Desktops Go Virtual: Addressing security challenges in your virtual desktop infrastructure by Trend Micro, Inc.

July 2010 - (Free Research)
Virtual desktop infrastructure carries the potential for significant savings. However, given the dynamic nature of desktop computing, virtualizing endpoints will raise significant challenges. The temptation will be to treat virtual desktops like datacenter servers when it comes to protection. Read this paper to find out more. 
(WHITE PAPER) READ ABSTRACT |

Choosing an Enterprise-Class Wireless Operating System: A Comparison of Android, BlackBerry, iPhone, and Windows Mobile by BlackBerry

November 2011 - (Free Research)
When selecting a mobile computing platform, organizations have to keep security and manageability at the forefront of their considerations. Access this comprehensive resource to explore the key criteria in selecting, deploying and managing a mobile operating system. 
(WHITE PAPER) READ ABSTRACT |

Bring Distributed Environments Under Control with Desktop Virtualization by Dell and Microsoft

November 2013 - (Free Research)
This resource highlights the fact that IT departments are no longer dealing with one set of PCs all using the same operating system. It also shows how desktop virtualization can be implemented to improve efficiency and security. 
(WHITE PAPER) READ ABSTRACT |

Migration Considerations for Windows Server 2012 by Dell and Microsoft

November 2012 - (Free Research)
Access this white paper to learn more about Dell's support for Microsoft Windows Server 2012 and other essential things to consider when upgrading your servers from a previous Microsoft operating system. Also discover the advanced networking, storage and security features offered. 
(WHITE PAPER) READ ABSTRACT |

A Closer Look at Windows Vista by National Instruments

February 2008 - (Free Research)
One of the stated goals of the Microsoft Windows Vista release is to greatly improve the overall security of the Windows operating system and curb the impact of malware. To this end, Microsoft redesigned both the least user and administrative... 
(WHITE PAPER) READ ABSTRACT |

Cloud Infrastructure Matters by Red Hat and HP

March 2011 - (Free Research)
New IT technologies and abstractions, such as cloud computing, layer on top of existing ones.This may make the foundational layers less visible, but they remain just as important (or even more so). This paper looks at some of the ways that volume processors have improved their error-handling ability by improving their cloud infrastructure. 
(WHITE PAPER) READ ABSTRACT |

Jumpstart Your Windows Vista Migration With Enteo Client Lifecycle Management From FrontRange Solutions by Centennial-Software

July 2008 - (Free Research)
This whitepaper serves as a guideline for Vista migration projects, highlights the key challenges and cautions and outlines an ideal approach to successfully migrate to Windows Vista. 
(WHITE PAPER) READ ABSTRACT |

Getting Ready for Microsoft Windows Server 2008 by Dell, Inc.

April 2008 - (Free Research)
Read this article to learn about the many capabilities and benefits of Microsoft Windows Server 2008 and how Dell products can help simplify the migration to this new operating system. 
(TECHNICAL ARTICLE) READ ABSTRACT |

Red Hat Enterprise Linux: Your Solaris Alternative by Red Hat and HP

August 2009 - (Free Research)
This whitepaper will review some key features and benefits of both Solaris and Red Hat Enterprise Linux. We will also explain why Red Hat Enterprise Linux is an ideal solution for enterprises that are facing Sun and SPARC's uncertain future, whether you are considering launching a new IT production environment or migrating a legacy environment... 
(WHITE PAPER) READ ABSTRACT |

How Your Operating System Choice Impacts Business and IT Investments by Oracle Corporation UK Ltd

October 2010 - (Free Research)
Choosing the right operating system and pairing it with the right hardware matters to your customers and business. Read this white paper to learn about the significant technical, administrative, and cost benefits of upgrading from Solaris 8 or 9 to Oracle Solaris 10. 
(WHITE PAPER) READ ABSTRACT |

Ericom Desktop Virtualization Solutions by Ericom Software

Ericom virtualization solutions enable you to administer virtual desktops from a centralized location, reducing the cost and complexity of virtual desktop deployment and upkeep. Supported virtualization servers include VMware, Microsoft and others. 
(SOFTWARE PRODUCT)

Virtual Desktop Infrastructure by VMware, Inc.

October 2008 - (Free Research)
Learn about the benefits of desktop virtualization: administrative and management tasks are reduced; applications can quickly be added, deleted, upgraded, and patched; security is centralized; and data is easier to safeguard and back up. 
(WHITE PAPER) READ ABSTRACT |

Managing the Dynamic Desktop with System Center Solutions by Microsoft

September 2009 - (Free Research)
System Center desktop solutions help IT to reconcile competing demands of security with resource availability by streamlining the connection of any authorized user to any application, regardless of their location or connectivity, through a unified system that provides both secure access and the consistent, optimized performance your users expect. 
(DATA SHEET) READ ABSTRACT |

3 Strategies to Protect Endpoints from Risky Applications by Lumension

September 2010 - (Free Research)
Though most organizations have invested considerable time and effort in improving their endpoint risk management processes, many of them are ill-equipped to handle the myriad of third-party applications that are increasingly introducing the most risk into today’s IT environment. Read this white paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

IT@Intel White Paper: Remediating Applications when Migrating from Microsoft Windows XP to Microsoft Windows 7 by Intel

May 2010 - (Free Research)
Read this paper to learn why Intel is migrating from Microsoft Windows XP to Microsoft Windows 7, and how the new system is expected to boost long-term performance, security, manageability, and productivity needs. 
(WHITE PAPER)

SUSE Linux Enterprise Point of Service Data Sheet by SUSE

June 2012 - (Free Research)
This white paper outlines an enterprise-class Linux operating system that increases the flexibility and reliability of your IT environment. Inside, discover the top benefits of this system that is tailored specifically to meet your needs. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly 8 November 2011: Read this week's issue of the UK's leading technology publication, with the news, analysis and opinion that matters to IT managers. by ComputerWeekly.com

November 2011 - (Free Research)
In this week's Computer Weekly, we report from the London Cyberspace Conference where world leaders gathered to discuss internet security. We examine the tools available to help migrate from Windows XP to Windows 7; and hear from Royal Bank of Scotland about how to build a business case for virtual desktops. Download the new issue now. 
(EZINE)

Managed Public Key Infrastructure: Securing Your Business Applications by VeriSign EMEA

December 2005 - (Free Research)
The VeriSign® Managed PKI service is an outsourced offering that enables enterprises of any size to rapidly and confidently deploy PKI services. It alleviates the burden of planning, building, and maintaining a PKI, while allowing enterprises to maintain internal control over digital-certificate issuance, suspension, and revocation. 
(WHITE PAPER) READ ABSTRACT |

The "Hard Truths" About Managing Administrative and Application Identities by Cyber-Ark Software

July 2008 - (Free Research)
This videocast will examine the "hard truths" around managing administrative and application identities and suggest a practical approach to include privileged identity management in your overall governance, risk management and compliance strategy. 
(VIDEOCAST) READ ABSTRACT |

Open Source in the Next Computing Wave by Red Hat and JBoss

January 2009 - (Free Research)
The current economic climate is forcing more systematic thinking about costs in general, including those associated with overall complexity and the security and resiliency of large distributed infrastructures. These trends intersect in powerful ways; a new wave of computing is gathering momentum as a result. And open source is playing a major role. 
(WHITE PAPER) READ ABSTRACT |

Cisco PIX 506E Security Appliance by Cisco Systems, Inc.

The Cisco® PIX® 506E Security Appliance delivers enterprise-class security for remote office, branch office, and small-to-medium business (SMB) networks, in a highperformance, easy-to-deploy purpose-built appliance. 
(HARDWARE PRODUCT)

How Does Virtualization Change Your Approach to Enterprise Security? by GlassHouse Technologies, Inc.

June 2010 - (Free Research)
As with any new technology, in order to achieve a secure implementation, it is necessary to augment existing policies and practices with an understanding of how virtualization works. Read this paper to find out more. 
(WHITE PAPER) READ ABSTRACT |

Optim™ Data Privacy Solution by IBM

The Optim™ Data Privacy Solution de-identifies application data so that it can be safely used in testing or training environments. By substituting fictionalized yet realistic data for confidential information, Optim enables sites to test effectively while supporting privacy compliance initiatives. 
(SOFTWARE PRODUCT)

1 - 25 of 454 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts