Papers For Peer To Peer Network SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Papers For Peer To Peer Network Security returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Network Security
 •   Virtualization
 •   Security Policies
 •   Mobile Device Management
 •   Peer to Peer
 •   Access Control
 •   Wireless Technologies and Mobile Computing
 •   Data Center Management
 •   Content Delivery Networks/ Web Application Acceleration

Related Searches
 •   Configuration Papers For
 •   Consulting Papers For
 •   Designers Papers For Peer
 •   Firm Papers
 •   Networks Papers For Peer
 •   Papers Definitions
 •   Papers For Peer Standard
 •   Papers For Peer Video
 •   Papers For Repair
 •   Papers Reporting
Advertisement

ALL RESULTS
1 - 25 of 470 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

The Top Six Risks of Employee Internet Use and How to Stop Them by St. Bernard Software

May 10, 2010 - (Free Research)
Due to the serious nature of many threats, the Internet use of even one unmonitored employee on a single unmanaged system can ravage a company’s internal network, irrevocably delete critical data, and ultimately ruin the company’s ability to conduct business. Read this white paper to learn how to protect your organization. 
(WHITE PAPER) READ ABSTRACT |

See What CDI Success Looks Like by Nuance

December 31, 2012 - (Free Research)
This informative white paper provides a documentation management solution that helps bridge the clinical and coding gap by offering peer-to-peer instruction for your physicians, nurses, coders, and administrators. 
(WHITE PAPER) READ ABSTRACT |

Confronting the Data Backup Challenge by FalconStor Software

April 17, 2013 - (Free Research)
This brief resource tackles the data backup challenge for IT managers – and provides the results taken by 215 of your IT peers in an IDG Research Services survey. 
(WHITE PAPER) READ ABSTRACT |

Expert Insight: Traditional vs. Cloud-based DR by Asigra

June 27, 2013 - (Free Research)
This E-Guide explores the concept behind cloud-enabled DR and discusses three key options to consider. Find out how traditional and cloud-based data protection approaches held up during Hurricane Sandy and which business continuity tactics proved most effective for your peers. 
(EGUIDE) READ ABSTRACT |

Virtual Data Center E-Zine Volume 37: Maximizing Virtual Data Center Consolidation by SearchServerVirtualization

February 20, 2012 - (Free Research)
Virtualization may be well underway, but it doesn't mean new challenges won't arise as you continue to navigate your initiative. This expert e-zine offers detailed guidance for achieving the right balance in your virtual data center and presents key findings concerning your peers' consolidation objectives for 2012. 
(EZINE)

Getting Physicians Up to Speed With ICD-10 by Nuance

October 31, 2013 - (Free Research)
This useful resource presents a solution that will help ease the stress of the big ICD-10 transition on October 1, 2014. Read on to discover an innovative ICD-10 educational program that will enable physicians to get up to speed quickly. 
(WHITE PAPER) READ ABSTRACT |

Unchain Your Network with Application Intelligence and Control by SonicWALL

February 24, 2011 - (Free Research)
This paper discusses the new risks facing organizations in light of the prevalence of Web-based applications and offers best practices for gaining control of applications, data and bandwidth. 
(WHITE PAPER) READ ABSTRACT |

Next Generation Enterprise WAN DMVPN by Cisco Systems, Inc.

July 11, 2012 - (Free Research)
Access this white paper that outlines steps for migrating from DMVPN to GET VPN, and learn about what benefits you stand to gain by doing so. 
(WHITE PAPER) READ ABSTRACT |

White Paper: Controlling Recreational Peer-to-Peer Traffic to Improve Application Performance by Exinda Networks

April 24, 2008 - (Free Research)
This white paper provides a practical overview on the evolution of recreational P2P traffic, how it is impacting corporate networks and, offers specific recommendations for controlling these recreational applications. 
(WHITE PAPER) READ ABSTRACT |

Unauthorized Applications: Taking Back Control by Sophos, Inc.

July 2008 - (Free Research)
This paper explains why it is important for businesses to control unauthorized applications such as instant Messaging, VoIP, games and peer-to-peer file-sharing and how malware protection is the simplest and most cost-effective solution. 
(WHITE PAPER) READ ABSTRACT |

A Peer Survey: Desktop Virtualization Separating the Hype from Reality by Dell Software

June 2011 - (Free Research)
Organizations are looking to desktop virtualization for improved productivity, security and easier management. Cut through the hype – and get to the facts – in this white paper from IT Business Edge and Quest Software. 
(WHITE PAPER) READ ABSTRACT |

Converged Video Network Security by Alcatel-Lucent

August 2008 - (Free Research)
Internet Protocol Television (IPTV) has created new opportunities for traditional voice and data carriers, the technology also comes with a high level of risk due to attacks by fraudsters and hackers. Read this paper and learn how to protect yourself. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Automating Access Certification in Just 17 Days by Aveksa

August 2012 - (Free Research)
This presentation transcript describes the benefits one of your peers enjoyed after implementing a particular IAM solution which helped them automate their certification process. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Podcast: Automating Access Certification in Just 17 Days by Aveksa

August 2012 - (Free Research)
This podcast describes why one of your peers implemented a particular IAM solution to automate their certification process and also offers best practices that will help you as you start your own IAM program. 
(PODCAST) READ ABSTRACT |

The SOA Competitive Landscape Redefined: Improving Productivity with Message-Driven SOA by Fiorano Software, Inc.

August 2008 - (Free Research)
Read this whitepaper to learn about how Message-Driven SOA now offers a proven third alternative that protects current investments and offers a migratory path to the next generation of solutions (low risk/high returns). 
(WHITE PAPER) READ ABSTRACT |

Cloud-based Integration and SOA Architecture: The Benefits of a Peer-to-Peer Approach by Fiorano Software, Inc.

July 2010 - (Free Research)
The move toward cloud computing affects all software application deployment in the future. This paper addresses the software infrastructure requirements for SOA-enabled systems to leverage Cloud Computing for the deployment of the next generation of business applications. 
(WHITE PAPER) READ ABSTRACT |

Building a Better Network Security Strategy by Hewlett-Packard Company

February 2014 - (Free Research)
This resource highlights results of a 4-question survey about network security, and what IT managers are looking for in a solution to address their top problems. 
(WHITE PAPER) READ ABSTRACT |

Application Discovery Tool by Sophos, Inc.

February 2008 - (Free Research)
With the Sophos Application Discovery Tool, you can quickly perform a scan and find the applications installed on your network, both legitimate and unwanted. The tool can be run without uninstalling or deactivating your current anti-virus software. 
(TRIAL SOFTWARE)

Scaling Enterprise SOA Deployments: Benefits of a Message-Driven Approach Powering Next-Generation SOA Deployments by Fiorano Software, Inc.

August 2008 - (Free Research)
This paper reviews modern enterprise service grids and how their brokered peer-to-peer architecture offer ease of use for a wide array of distributed computing projects including the SOA market. 
(WHITE PAPER) READ ABSTRACT |

Discover The Power To Do More by Dell, Inc. and Intel®

February 2012 - (Free Research)
This white paper explores the attributes of efficient IT and reveals five core elements that you should focus on to keep pace in the virtual era. Hear from your peers on how they are successfully leveraging virtualization, managing ever-growing data volumes, preparing for the cloud, and more. 
(WHITE PAPER) READ ABSTRACT |

2013 State of the Mobile Enterprise Study by Macquarie Telecom Pty Limited (E-mail this company)

September 2013 - (Free Research)
This exclusive white paper analyzes how organizations are generating revenue using mobile technology and policies. Read on for a helpful tool to benchmark your own uptake of mobile compared to your peers and help IT better understand the platforms and products they should support. 
(WHITE PAPER) READ ABSTRACT |

Testing Multiplay Networks by Ixia

June 2008 - (Free Research)
As the Internet evolves, a wider variety of multiplay services are carried from broadly distributed sources to a large and varied audience of consumers. 
(WHITE PAPER) READ ABSTRACT |

Blue Coat WebFilter by BlueCoat

December 2008 - (Free Research)
Review this brief data sheet to learn how WebFilter helps prevent Internet attacks from spyware, phishing, peer-to-peer (P2P) traffic, viral content and more. WebFilter also includes Dynamic Real-Time Rating (DRTR), a patented technology that can instantly categorize Web sites when a user attempts to access them. 
(DATA SHEET) READ ABSTRACT |

Deployment Strategies for 802.11n: Key Considerations for the Next Generation of Wireless Networking by Brocade

October 2010 - (Free Research)
While 802.11n wireless networks let enterprises create a seamless working environment by combining the mobility of wireless with the performance of wired networks, the best ways for deploying 802.11n—while minimizing acquisition and operational costs—may still be unclear. Read this white paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

Confronting Backup Challenges with Deduplication by FalconStor Software

April 2013 - (Free Research)
This resource outlines FalconStor's deduplication solution, which brings immediate cost savings to any organization that needs high-performance access to data. Also, discover the findings that made this infographic possible from your peers through the IDG Research Services survey. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 470 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts