Papers Security IndianWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Papers Security Indian returned the following results.
RSS What is RSS?
Related Categories

 •   Technology Outsourcing
 •   Business Process Outsourcing
 •   Social Networks and Community Management
 •   Industrial Mobile Computing/ Rugged Handhelds
 •   Virtualization
 •   Mobile Device Management
 •   Application Management and Maintenance
 •   Business Intelligence Solutions
 •   Data and Application Distribution
 •   Application Servers

Related Searches
 •   Contracts Papers Security
 •   Improvement Papers
 •   Knowledge Papers Security
 •   Papers New
 •   Papers Security Implementation
 •   Papers Security Indian Integrated
 •   Papers Security Indian Introduction
 •   Papers Security Indian Related
 •   Papers South Carolina
 •   Using Papers Security Indian
Advertisement

ALL RESULTS
1 - 25 of 470 | Next Page

Featured Sponsors

The Impact of Technology on Cost in Business Process Outsourcing (BPO) by SAP America, Inc..
Gain insight into the true cost of business process outsourcing (BPO) beyond what is typically reflected in the BPO provider's service price (total contract value). Learn more...
>> Discover more offerings from SAP America, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

CW+: Executive breifing - The Indian Sub-Continent Mobile Market by ComputerWeekly.com

January 07, 2011 - (Free Research)
Juniper  Research defines the Indian Sub  Continent as encompassing the following five countries: Bangladesh; India; Nepal; Pakistan; and Sri Lanka.Despite comprising just five countries, the region  – with more than 1.6 billion inhabitants  – includes nearly a quarter of the global population. 
(WHITE PAPER) READ ABSTRACT |

CW Special Report on Cognizant by ComputerWeekly.com

February 21, 2013 - (Free Research)
This 7 page special report from Computer Weekly gives you the facts on Cognizant, its strategy, products and services and financial performance. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Case Study: Indian Express Group Expands and Enhances It Digital Presence by Limelight Networks, Inc.

May 02, 2014 - (Free Research)
This guide explores one company's success at increasing their network performance and accelerating their web content delivery. 
(CASE STUDY) READ ABSTRACT |

Inside India: Indians View Their Automotive Future by IBM Line of Business

June 2008 - (Free Research)
A study of the Indian auto industry from University of Michigan Transportation Research Institute's Automotive Analysis Division and the IBM Institute for Business Value. 
(WHITE PAPER)

Virtual Desktop Solutions in the Federal Government by VMware, Inc.

February 2012 - (Free Research)
This webcast shows how the recently released VMware View 5 environment is being used to deploy virtual desktops to provide mission-critical solutions around Disaster Recover/COOP, telework and secure mobile applications to federal organizations. 
(WEBCAST) READ ABSTRACT |

CW Special report on Wipro by ComputerWeekly.com

November 2012 - (Free Research)
This 5 page special report from Computer Weekly gives you the facts on Wipro, its strategy, products and services and financial performance. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Examining Control System Security and Compliance by ArcSight, an HP Company

November 2010 - (Free Research)
This paper will provide an overview of cyber threats and regulations within critical infrastructure specific to control system environments. The paper will then present a general overview of control system architecture and identify common vulnerabilities within these environments. 
(WHITE PAPER) READ ABSTRACT |

Improving Regulatory Compliance with Encryption by Utimaco Safeware

February 2007 - (Free Research)
This white paper examines the role that encryption plays in minimizing your company's risk and helps IT directors, security officers, and executives meet confidentiality mandates and satisfy legal requirements within particular geographic regions. 
(WHITE PAPER) READ ABSTRACT |

Securely Enabling VoIP Remote Users by Sipera Systems

August 2008 - (Free Research)
This white paper details the requirements for securely enabling VoIP remote users and why traditional data security products, such as IPSec VPNs, are not able to properly handle them. 
(WHITE PAPER) READ ABSTRACT |

Authentication in the Enterprise: Current and Changing Requirements by PistolStar, Inc.

August 2009 - (Free Research)
This white paper discusses the current state of authentication and trends that Osterman Research sees as shaping the future of authentication. 
(WHITE PAPER) READ ABSTRACT |

Reducing the Costs of IT Security Management by CA Technologies.

January 2006 - (Free Research)
This paper highlights some important operational efficiencies that can be gained by deploying an integrated IAM strategy. Learn more about how IAM can help increase user productivity, reduce help desk costs, protect corporate assets and much more. 
(WHITE PAPER) READ ABSTRACT |

How traditional firewalls fail by Dell Software

December 2012 - (Free Research)
Your current firewall may be jeopardizing your security. This white paper explains exactly where traditional firewalls fall short, and how next-generation firewalls can help. 
(WHITE PAPER) READ ABSTRACT |

Security and Backup Built for Virtualization by Symantec Corporation

December 2011 - (Free Research)
This short white paper explores key questions you need to ask as you migrate to the virtualized environment to ensure your data remains safe and that you are able to fully reap the benefits that virtualization offers. Read now to learn more. 
(WHITE PAPER) READ ABSTRACT |

Identity and Access Management (IAM) Across Cloud and On-Premise Environments Best Practices for Maintaining Security and Control by CA Technologies.

July 2013 - (Free Research)
This informative white paper provides some best practices for maintaining security and control throughout hybrid cloud environments. 
(WHITE PAPER) READ ABSTRACT |

8 Ways to Better Monitor Network Security Threats in the Age of BYOD by Hewlett-Packard Company

January 2014 - (Free Research)
This white paper offers unique insight and analysis into how network security professionals can better identify, manage, and contain the leading network security risk factors that arise from a mobile, always-on workforce. 
(WHITE PAPER) READ ABSTRACT |

Top 7 Challenges of Backup Compliance and How to Overcome Them by APTARE

June 2013 - (Free Research)
This white paper explores seven of today's major compliance challenges and highlights how one data protection solution can help organizations address them. 
(WHITE PAPER) READ ABSTRACT |

A Foundation for Next-Generation Data Center Security by Citrix

September 2012 - (Free Research)
This white paper introduces an application delivery controller (ADC) that builds enterprise cloud networks using existing data center infrastructure. 
(WHITE PAPER) READ ABSTRACT |

Evolving Security Tech Presents New Opportunities for Businesses by Fortinet, Inc.

March 2014 - (Free Research)
This exclusive paper examines the technologies that are changing the enterprise and effects that they have on your security environment. Read on and also learn about emerging security trends and requirements that can help keep your organization safe as technologies evolve. 
(WHITE PAPER) READ ABSTRACT |

SANS WhatWorks in Detecting and Blocking Advanced Threats: A Real Case Study at a Large Research Organization by FireEye

March 2014 - (Free Research)
Cybercriminals are always looking for new ways to infiltrate your system, making it essential to have an effective intrusion prevention system (IPS). This white paper explores one company's IPS platform and how it can greatly enhance your system security. 
(WHITE PAPER) READ ABSTRACT |

Vendor Report Card: Security Information & Event Management by LogRhythm, Inc.

September 2013 - (Free Research)
This in-depth white paper expertly breaks down the current SIEM marketplace, and will help you differentiate between the many vendors in order to ultimately decide on a solution that aligns with your organization's needs. 
(ANALYST REPORT) READ ABSTRACT |

MDM and beyond: Rethinking mobile security in a BYOD world by Citrix

May 2014 - (Free Research)
This informative paper discusses how your organization can embrace BYOD with full security and control, providing a simple and streamlined user experience. 
(WHITE PAPER) READ ABSTRACT |

Lowering MSP TCO for Endpoint Security Solutions - Bottom-Line Benefits of Cloud-Based Antivirus Architecture by Webroot

January 2014 - (Free Research)
This guide shows how organizations can derive more value from their endpoint security by delivering bottom-line benefits of cloud-based antivirus protection from Webroot. This lowers MSP TCO. The paper also highlights the costs of archaic endpoint security when compared to newer security methods. 
(WHITE PAPER) READ ABSTRACT |

Keeping Distributed Endpoints Safe and Secure by IBM

June 2012 - (Free Research)
In this white paper, explore a single console management solution that helps IT maintain visibility and control over a disparate endpoint environment. Click now to unveil key features that help reduce risk and ensure compliance without adding complexity or costs. 
(WHITE PAPER) READ ABSTRACT |

The hidden costs of self-signed SSL certificates by Symantec Corporation

December 2012 - (Free Research)
This exclusive white paper explores the true TCO for self-signed SSL certificate, including a side-by-side comparison of a self-signed architecture verses working with a third party SSL vendor. 
(WHITE PAPER) READ ABSTRACT |

Transitioning from Log Management and SIEM to Comprehensive Security Intelligence by IBM

January 2013 - (Free Research)
This white paper discusses how security intelligence addresses these shortcomings and empowers organizations—from Fortune Five companies to midsize enterprises to government agencies— to maintain comprehensive and cost-effective information security. It will show how security intelligence addresses critical concerns in five key areas. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 470 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts