Own Data Center SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Own Data Center Security returned the following results.
RSS What is RSS?
Related Categories

 •   Data Center Management
 •   Virtualization
 •   Data Security
 •   Network Security
 •   Endpoint Security
 •   Mobile Device Management
 •   Application Security
 •   Storage Security
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)
 •   Wireless Technologies and Mobile Computing

Related Searches
 •   Change Own Data Center
 •   Conferences Own Data
 •   Cycles Own Data Center
 •   Implementations Of Own
 •   Manual Own Data
 •   Own Data Center Case Study
 •   Own Data Templates
 •   Own Technical
 •   Pricing Own Data Center
 •   Tutorials Own Data
Advertisement

ALL RESULTS
1 - 25 of 456 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

A Breakthrough Approach for Efficient IT Service Delivery by IBM

June 2008 - (Free Research)
Organizations in every industry are exploiting advanced technologies to gain a competitive advantage. In this whitepaper learn about IBM's vision for the new enterprise data center which offers an evolutionary new model for efficient IT delivery. 
(WHITE PAPER)

Impact of IT Upgrades on Energy Usage and Operational Cost by PTS Data Center Solutions

October 2010 - (Free Research)
Through this white paper, PTS Data Center Solutions (PTS) personnel validate these energy efficiency savings estimates using the upgrade of the IT system within its own data center facility and operations as a test bed. 
(WHITE PAPER) READ ABSTRACT |

E-Zine: Enterprise CIO Decisions: Data Centers - Owning vs. Outsourcing by SearchCIO.com

September 2010 - (Free Research)
Many factors are causing CIOs to wonder which is better: colocation, cloud computing or maintaining your own data center. Check out this month’s E-Zine from Enterprise CIO Decisions for expert opinions and advice on these important topics and learn best practices for managing your data center in this unpredictable economy. 
(EZINE)

E-Zine: Enterprise CIO Decisions: Data Centers - Owning vs. Outsourcing by HCL Technologies Ltd.

December 2010 - (Free Research)
Many factors are causing CIOs to wonder which is better: colocation, cloud computing or maintaining your own data center. Check out this month’s E-Zine from Enterprise CIO Decisions for expert opinions and advice on these important topics and learn best practices for managing your data center in this unpredictable economy. 
(EZINE)

The Transition to 10 Gigabit Ethernet Unified Networking: Cisco and Intel Lead the Way by Intel

July 2011 - (Free Research)
The foundations of cloud computing are built on ethernet and ethernet-based storage. This white paper explores the forces behind the transition to 10 Gigabit Ethernet unified networking, and reveals how you can acheive its benefits in your own data center. 
(WHITE PAPER) READ ABSTRACT |

Datacenter Automation: Accelerating Market Maturity through Investment in IT by Hewlett-Packard Company

February 2009 - (Free Research)
This study analyzes the idea of datacenter automation, and it looks across the impact that automation has on IT service delivery, cost reduction, and business impact. 
(WHITE PAPER) READ ABSTRACT |

Introduction to Virtualization E-book, Chapter 6: How Virtual Infrastructures Change Security by SearchServerVirtualization

October 2009 - (Free Research)
Protecting the virtual data center doesn't need to be any more difficult than protecting a physical network. The key is to remain vigilant. In this chapter, you'll learn how to mitigate potential security risks to your resource pool and virtual machines without over-allocating administration. 
(EBOOK) READ ABSTRACT |

The Economic Impact DCIM Can Have on Your Data Center by Emerson Network Power

January 2014 - (Free Research)
Explore this case study from Emerson Network Power to learn how a DCIM solution impacted one business' data center operation and how you can realize similar benefits within your own organization. 
(CASE STUDY) READ ABSTRACT |

Elavon Achieves Greater Business Agility with CA Data Center Automation by CA Technologies.

October 2008 - (Free Research)
Learn about a real-life example of how an automation architecture design that consolidates redundant, underperforming assets enabled one organization to meet the demands of an aggressive growth strategy while delivering high levels of service quality. 
(WHITE PAPER) READ ABSTRACT |

Deploying an agile infrastructure rapidly and efficiently by Dell, Inc. and Intel®

September 2012 - (Free Research)
Access this informative source to discover how a pre-engineered platform can streamline and optimize your data center. 
(WHITE PAPER) READ ABSTRACT |

Enhancing Security with Intel® Trusted Execution Technology by Dell, Inc. and Intel®

August 2013 - (Free Research)
This video explains – in less than five minutes – how to enhance security with Intel Trusted Execution Technology (TXT). View now to learn more about this hardware-based security solution that can help you boost platform security, support compliance, protect virtualized data centers' clouds, and more! 
(VIDEO) READ ABSTRACT |

Orange Business Services Becomes a Cloud Service Provider by NetApp

October 2013 - (Free Research)
This informative paper provides insight into how one organization easily and affordably implemented a virtual storage tiering solution to provide the cloud infrastructure their clients required. Read on to learn about the benefits they now enjoy and find out how you can do the same. Access this now to learn more. 
(CASE STUDY) READ ABSTRACT |

Optimizing Storage For VDI Deployments by FalconStor Software

October 2010 - (Free Research)
Virtual Desktop Infrastructure is poised to provide a new management and deployment model for end-user computing by centralizing the physical desktops to virtualized desktop farms in the data center. The resulting environment offers increased manageability, enhanced security and data protection. Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

CIO Decisions e-zine: Cloud a la carte by Dell and VMware

March 2013 - (Free Research)
Cloud services are constantly evolving and CIOs are tasked with wrangling these services to advise their organizations on what works for both current and future needs. This e-zine addresses which cloud offerings truly help and which are still just hype, from software to database management to storage. 
(EZINE) READ ABSTRACT |

Evolution of Hosted Server Computing: The emerging ‘cloud’ alternative by ComputerWeekly.com

January 2011 - (Free Research)
In this short paper, we look at the current state of play with regard to hosted infrastructure server offerings and activity, and consider where the market is going as we look forward. 
(WHITE PAPER) READ ABSTRACT |

Securing microsoft exchange 2010 With Thawte SSL Certificates by Thawte Inc.

July 2011 - (Free Research)
Security continues to be a facet of Exchange technology that must be managed, and your secure sockets layer (SSL) certificates are the key to managing security for Exchange servers. Access this expert white paper now to get an overview of SSL certificates for Exchange 2010. 
(WHITE PAPER) READ ABSTRACT |

Cloud Computing - What is its Potential Value for Your Company? by Google Apps

January 2011 - (Free Research)
Content provided by Google. This paper examines whether cloud computing makes good business sense for your company. Ultimately, you may find that moving your data to the cloud actually improves security, scalability, access, and disaster recovery. 
(WHITE PAPER) READ ABSTRACT |

School optimizes learning environment for students by Dell, Inc. and Intel®

October 2012 - (Free Research)
This white paper presents a case study of a school that was able to support students BYOD by designing a virtualized desktop infrastructure solution based on blade servers and storage arrays. 
(WHITE PAPER) READ ABSTRACT |

Energy Efficient Cooling Solutions for Data Centers: Introducing an Emerson Network Power Tool for Evaluating Cooling System Total Cost of Ownership by Liebert Corporation

February 2008 - (Free Research)
The purpose of this paper is to discuss the energy savings potential of these technologies and to how an interactive tool developed by Emerson Network Power can help you evaluate that potential in the real-world space of your own data center. 
(WHITE PAPER) READ ABSTRACT |

SIEM IT Decision Center- Checklist #1 by SearchSecurity.com

January 2013 - (Free Research)
If you are looking into deploying your own SIEM system, read this E-Guide to better understand features and functions, how to evaluate deployment and management costs, and the latest trends regarding SIEM platforms. 
(EGUIDE) READ ABSTRACT |

Computer Weekly - 10 January 2012: What’s in store for IT this year? by ComputerWeekly.com

January 2012 - (Free Research)
In this week’s issue of Computer Weekly, we look at the key trends and technologies that will be on IT leaders’ agenda in 2012. Our first Buyer’s Guide of the year examines how IT consumerisation will affect business technology; and Home Office IT director Denise McDonagh tells us why government IT isn’t working. Download the new issue now. 
(EZINE)

Computer Weekly - 10 January 2012: What’s in store for IT this year? by ComputerWeekly.com

January 2012 - (Free Research)
In this week’s issue of Computer Weekly, we look at the key trends and technologies that will be on IT leaders’ agenda in 2012. Our first Buyer’s Guide of the year examines how IT consumerisation will affect business technology; and Home Office IT director Denise McDonagh tells us why government IT isn’t working. Download the new issue now. 
(EZINE)

Computer Weekly - 19 June 2012: How to succeed at desktop virtualisation by ComputerWeekly.com

June 2012 - (Free Research)
In this week’s Computer Weekly, our latest Buyer's Guide examines best practice in desktop virtualisation. We ask if a six-year-old technology could be a key to tackling IT security threats. And we look at how universities are dealing with their IT challenges as they await the first intake of students at new higher tuition fees. Read the issue now. 
(EZINE) READ ABSTRACT |

Enabling a Safe and Secure "Bring Your Own Device" (BYOD) Environment by Dell, Inc.

November 2012 - (Free Research)
Uncover details of a holistic, effective approach that will help you enable BYOD in the enterprise without compromising user needs for security or control. 
(WHITE PAPER) READ ABSTRACT |

A Monthly Online Fraud Report from the RSA Anti-Fraud Command Center Phishing Repository by RSA, The Security Division of EMC

February 2009 - (Free Research)
Each month the RSA Anti-Fraud Command Center (AFCC) - a 24x7 war room that detects, monitors, tracks and shuts down phishing, pharming and Trojan attacks worldwide - issues an intelligence report that spotlights a new trend in online fraud and also provides the latest statistics and analyses of global phishing trends. 
(ANALYST REPORT) READ ABSTRACT |

1 - 25 of 456 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts