Papers Security FormsWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Papers Security Forms returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Network Security
 •   Application Security
 •   Security Policies
 •   Storage Management
 •   Endpoint Security
 •   Virtualization
 •   Security Monitoring
 •   Storage Security
 •   Enterprise Data Protection and Privacy

Related Searches
 •   Distribution Papers
 •   Files Papers
 •   Issues On Papers Security
 •   Maintenance Papers Security Forms
 •   Papers Contract
 •   Papers Security B2B
 •   Papers Security Forms Strategy
 •   Papers Security Forms Support
 •   Process Papers
 •   Project Papers
Advertisement

ALL RESULTS
1 - 25 of 458 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

A More Secure Front Door: SSO and Strong Authentication by Imprivata

February 10, 2011 - (Free Research)
Times change. Sometimes they change even faster than we might expect, as recent developments in Strong Authentication have shown. Just a few years ago, the idea of requiring users to provide a second form of identity to gain access to IT resources was seen by many as only necessary for remote access security or top-secret jobs. 
(WHITE PAPER) READ ABSTRACT |

Migrate Oracle Forms to the Web: Making the Business Case by CipherSoft, Inc., A subsidiary of Unify Corp.

July 20, 2009 - (Free Research)
There are many reasons organizations are currently migrating their Oracle Forms applications to the Web. This white paper will discuss those issues and review the challenges that can occur during a conversion project. As well, it will discuss the options for migrating Oracle Forms, including moving to Forms 10g and migrating to Java. 
(WHITE PAPER) READ ABSTRACT |

A true story about using XML forms and DB2 to process millions of tax returns by IBM

June 07, 2011 - (Free Research)
This blog post discusses the toll that managing high volumes of paper documents can take on business budgets and efficiency. Learn about an electronic approach that one company implemented and the savings they achieved. 
(INFORMATION CENTER) READ ABSTRACT |

Desktop Virtualization with VMware Horizon View 5.2 on Dell EqualLogic PS-M4110XS Hybrid Blade Storage Arrays by Dell and VMware

August 01, 2013 - (Free Research)
This paper examines a unified compute, storage, and switching all-in-blade-form-factor platform for hosting and running VDI workloads. 
(WHITE PAPER) READ ABSTRACT |

A Candid Examination of Data Deduplication by Symantec Corporation

August 11, 2009 - (Free Research)
Read this white paper for an in-depth discussion of what data deduplication is, how it works, what problems it solves, and what options are available. 
(WHITE PAPER) READ ABSTRACT |

A Foundation for Next-Generation Data Center Security by Citrix

September 28, 2012 - (Free Research)
This white paper introduces an application delivery controller (ADC) that builds enterprise cloud networks using existing datacenter infrastructure. 
(WHITE PAPER) READ ABSTRACT |

Managing Risk in the Cloud by NetApp

October 01, 2009 - (Free Research)
This white paper explores today's top security concerns in cloud environments, and aims to dispel the common (and growing) myth that a cloud-based infrastructure introduces new risks that cannot be quantified nor controlled. In this paper, you'll learn how a holistic approach to information security can help your company successfully combat risks. 
(WHITE PAPER) READ ABSTRACT |

The Truth About MPLS Security by Certes Networks

June 07, 2011 - (Free Research)
If you are sending data over a “private” Wide Area Network (WAN) there is a dirty little secret your service provider doesn’t want you to know about. The truth is that these so-called private WANs offer no inherent security and they aren't really even private. 
(WHITE PAPER) READ ABSTRACT |

Addressing Mobile Threats: Effective Detection and Response by ArcSight, an HP Company

March 07, 2007 - (Free Research)
Mobile threats can take on many forms including malware, distributed denial of service attacks (DDoS), and fraud. While these attacks aren't new, their ability to leverage mobile devices is. This paper focuses on a few of the most problematic mobile threats and provides tips and hints for how to handle them. Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

Why Leaks Matter by Lumeta Corporation (E-mail this company)

February 13, 2014 - (Free Research)
This exclusive white paper takes an in-depth look at the dangers of network leaks and how your organization can form a strategy to mitigate these risks through comprehensive visibility of connectivity. 
(WHITE PAPER) READ ABSTRACT |

IT@Intel White Paper: Remediating Applications when Migrating from Microsoft Windows XP to Microsoft Windows 7 by Intel

May 10, 2010 - (Free Research)
Read this paper to learn why Intel is migrating from Microsoft Windows XP to Microsoft Windows 7, and how the new system is expected to boost long-term performance, security, manageability, and productivity needs. 
(WHITE PAPER)

The Children's Internet Protection Act by NETGEAR Inc.

December 17, 2010 - (Free Research)
Schools and libraries must certify they have complied with, or are in the process of complying with, the CIPA requirements by filing a form with the Federal government in order to receive discounts on the telecommunication charges for access or connection costs. Are you certified? Read this white paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

Sony Life Safeguards Data on More than 4.4 Million Customers with CA Access Control by CA Technologies.

September 09, 2009 - (Free Research)
Read this paper to learn how CA Access Control has allowed Sony Life to improve the level of security surrounding its servers. 
(WHITE PAPER) READ ABSTRACT |

McAfee 15 Minutes to a Secure Business: Daily Security Practices by McAfee, Inc.

November 23, 2009 - (Free Research)
This paper explains how McAfee has developed 15 Minutes to a Secure Business. This unique approach to security management gives IT professionals a roadmap for ensuring a safe and secure IT environment, even with limited time. 
(PRODUCT OVERVIEW) READ ABSTRACT |

Presentation Transcript: Application Whitelisting: The Must Have Technology for Security and Compliance Today by McAfee, Inc.

September 29, 2009 - (Free Research)
Read this paper, which is a transcription of a presentation where speakers Stuart McClure, VP of Operations & Strategy, Risk & Compliance Business Unit, at McAfee Incorporated and Evelyn de Souza, Senior Manager, Risk & Compliance, at McAfee discuss application whitelisting and its benefits. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

How Bad Are the Bad Guys? - The Changing Nature of Web Security Threats by Webroot

September 23, 2009 - (Free Research)
This whitepaper considers how Web-based security threats are evolving, within the context of IT trends including mobile, home computing, and other forms of remote access that could all potentially increase the attack surface of the organization. Read on to learn more about protecting your organization from emerging Web-based security threats. 
(WHITE PAPER) READ ABSTRACT |

Return on Investment (ROI) and Security Information and Event Management (SIEM): How RSA enVision Delivers an Industry Best ROI by RSA, The Security Division of EMC

June 01, 2009 - (Free Research)
This White Paper examines the Return on Investment (ROI) that a quality Security Information & Event Management (SIEM) solution can deliver to an organization. 
(WHITE PAPER) READ ABSTRACT |

Creating an Effective Security Operations Function by RSA, The Security Division of EMC

October 2008 - (Free Research)
Read this white paper to understand all the activities and roles in a security operations function - your first step in making those operations more effective and efficient. 
(WHITE PAPER) READ ABSTRACT |

Making Mobility Matter in Healthcare Data Security by Dell, Inc.

June 2012 - (Free Research)
This white paper highlights the need for health care organizations to have solid encryption and risk assessment procedures and policies in place. 
(WHITE PAPER)

Commerzbank: Managing Credit Risk and Increasing Operational Efficiency by EMC Corporation

June 2008 - (Free Research)
For Commerzbank streamlining the corporate credit lines to corporations and institutions, streamlining the corporate credit lending process to reduce paper and drive down costs had become a top priority. 
(WHITE PAPER) READ ABSTRACT |

Why choose Symantec for Mobile Device Management by Symantec Corporation

June 2012 - (Free Research)
In this white paper, learn some of the most important considerations for deploying a mobile device management solution. Additionally, discover key tips for building a successful framework for planning your mobile security strategy. 
(WHITE PAPER) READ ABSTRACT |

Streamlining Access Control for SAP® Systems: The Many Advantages of Automated User Provisioning by Security Weaver

September 2008 - (Free Research)
For organizations with high-volumes of employees leveraging SAP solutions, managing access is a complex undertaking. This paper examines the access control challenges and reveals the many advantages of automated user provisioning for SAP solutions. 
(WHITE PAPER) READ ABSTRACT |

Internal API Management by Intel Corporation

November 2013 - (Free Research)
This exclusive paper examines a flexible platform approach to managing the custom business models and data center deployment needs of today's APIs. 
(WHITE PAPER) READ ABSTRACT |

Tackling Today’s Networking Challenges by HP and Intel

September 2011 - (Free Research)
This paper introduces the new concept of a multi-vendor network, the challenges surrounding this breed of network, trends within the industry, how to improve efficiency, and how to improve productivity when it comes to managing and infrastructure. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

What is Tape Without Pain? by Spectra Logic Corporation

November 2010 - (Free Research)
Spectra has extensive expertise with all forms of backup, and therefore understands the continuing and increasingly important role of tape in protecting data. To that end, Spectra Logic has set itself a goal: Tape Without Pain. Read this white paper to learn more about easing the tape backup process. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 458 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts