Papers Security IndianWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Papers Security Indian returned the following results.
RSS What is RSS?
Related Categories

 •   Technology Outsourcing
 •   Business Process Outsourcing
 •   Social Networks and Community Management
 •   Industrial Mobile Computing/ Rugged Handhelds
 •   Virtualization
 •   Mobile Device Management
 •   Application Management and Maintenance
 •   Business Intelligence Solutions
 •   Data and Application Distribution
 •   Application Servers

Related Searches
 •   Code Papers Security
 •   Industry Papers
 •   Matrix Papers
 •   Papers Security Benefit
 •   Papers Security Indian Uk
 •   Provider Papers Security
 •   Starting Papers Security Indian
 •   Support Papers Security
 •   Web Cast Papers Security
Advertisement

ALL RESULTS
1 - 25 of 468 | Next Page

Featured Sponsors

The Impact of Technology on Cost in Business Process Outsourcing (BPO) by SAP America, Inc..
Gain insight into the true cost of business process outsourcing (BPO) beyond what is typically reflected in the BPO provider's service price (total contract value). Learn more...
>> Discover more offerings from SAP America, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

CW+: Executive breifing - The Indian Sub-Continent Mobile Market by ComputerWeekly.com

January 07, 2011 - (Free Research)
Juniper  Research defines the Indian Sub  Continent as encompassing the following five countries: Bangladesh; India; Nepal; Pakistan; and Sri Lanka.Despite comprising just five countries, the region  – with more than 1.6 billion inhabitants  – includes nearly a quarter of the global population. 
(WHITE PAPER) READ ABSTRACT |

CW Special Report on Cognizant by ComputerWeekly.com

February 21, 2013 - (Free Research)
This 7 page special report from Computer Weekly gives you the facts on Cognizant, its strategy, products and services and financial performance. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Indian Express Group by Limelight Networks, Inc.

May 02, 2014 - (Free Research)
This guide explores one company's success at increasing their network performance and accelerating their web content delivery. 
(CASE STUDY) READ ABSTRACT |

Inside India: Indians View Their Automotive Future by IBM Line of Business

June 2008 - (Free Research)
A study of the Indian auto industry from University of Michigan Transportation Research Institute's Automotive Analysis Division and the IBM Institute for Business Value. 
(WHITE PAPER)

Virtual Desktop Solutions in the Federal Government by VMware, Inc.

February 2012 - (Free Research)
This webcast shows how the recently released VMware View 5 environment is being used to deploy virtual desktops to provide mission-critical solutions around Disaster Recover/COOP, telework and secure mobile applications to federal organizations. 
(WEBCAST) READ ABSTRACT |

CW Special report on Wipro by ComputerWeekly.com

November 2012 - (Free Research)
This 5 page special report from Computer Weekly gives you the facts on Wipro, its strategy, products and services and financial performance. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Examining Control System Security and Compliance by ArcSight, an HP Company

November 2010 - (Free Research)
This paper will provide an overview of cyber threats and regulations within critical infrastructure specific to control system environments. The paper will then present a general overview of control system architecture and identify common vulnerabilities within these environments. 
(WHITE PAPER) READ ABSTRACT |

Improving Regulatory Compliance with Encryption by Utimaco Safeware

February 2007 - (Free Research)
This white paper examines the role that encryption plays in minimizing your company's risk and helps IT directors, security officers, and executives meet confidentiality mandates and satisfy legal requirements within particular geographic regions. 
(WHITE PAPER) READ ABSTRACT |

Securely Enabling VoIP Remote Users by Sipera Systems

August 2008 - (Free Research)
This white paper details the requirements for securely enabling VoIP remote users and why traditional data security products, such as IPSec VPNs, are not able to properly handle them. 
(WHITE PAPER) READ ABSTRACT |

Authentication in the Enterprise: Current and Changing Requirements by PistolStar, Inc.

August 2009 - (Free Research)
This white paper discusses the current state of authentication and trends that Osterman Research sees as shaping the future of authentication. 
(WHITE PAPER) READ ABSTRACT |

Reducing the Costs of IT Security Management by CA Technologies.

January 2006 - (Free Research)
This paper highlights some important operational efficiencies that can be gained by deploying an integrated IAM strategy. Learn more about how IAM can help increase user productivity, reduce help desk costs, protect corporate assets and much more. 
(WHITE PAPER) READ ABSTRACT |

Stepping Up the Battle Against Advanced Threats by Trusteer

August 2013 - (Free Research)
Read this white paper which breaks down how application control is going to keep your endpoints secure in this changing IT threat landscape. 
(WHITE PAPER) READ ABSTRACT |

The Rising Threat of Corporate Cybercrime: Cybercriminal Motives and Methods by Trusteer

December 2012 - (Free Research)
In this white paper, uncover the major cybercriminal attack methods and motives, and learn what modern cybercrime means for endpoint security. Also inside, discover the growing need for effective antimalware – read on to learn more today. 
(WHITE PAPER) READ ABSTRACT |

A Foundation for Next-Generation Data Center Security by Citrix

September 2012 - (Free Research)
This white paper introduces an application delivery controller (ADC) that builds enterprise cloud networks using existing datacenter infrastructure. 
(WHITE PAPER) READ ABSTRACT |

The Intersection of SAM and Security by CDW Corporation

March 2014 - (Free Research)
This informative paper explains how effective management of software assets can not only prevent problems during an audit but also improve security posture. It also gives tips on ways to make sure a SAM solution doesn't become too complex. 
(WHITE PAPER) READ ABSTRACT |

The hidden costs of self-signed SSL certificates by Symantec Corporation

December 2012 - (Free Research)
This exclusive white paper explores the true TCO for self-signed SSL certificate, including a side-by-side comparison of a self-signed architecture verses working with a third party SSL vendor. 
(WHITE PAPER) READ ABSTRACT |

Securely Outsourcing to the Cloud: Five Key Questions to Ask by CA Technologies.

July 2012 - (Free Research)
This informative white paper outlines your security options when adopting cloud services. Discover how Identity and Access Management (IAM) can help you foster a secure cloud environment and learn how you can choose the right third-party outsourcer by clicking through to learn more. 
(WHITE PAPER) READ ABSTRACT |

Vulnerability Assessment by Symantec Corporation

October 2013 - (Free Research)
Access this white paper for the truth behind today's vulnerability assessment approaches, and why a clearer vision of the problem is needed for more successful security systems. Click now to unveil an opportunity to bridge the gap between vulnerability assessment and security management, and use actionable intelligence as effective defense. 
(WHITE PAPER) READ ABSTRACT |

Protecting Your Website With Always On SSL by Symantec Corporation

May 2012 - (Free Research)
This white paper discusses the imperative need for always on SSL, and the steps you can take to deliver end-to-end protection for your users. It also includes detailed accounts of four organizations that are leading the way with always on SSL in a cooperative effort to make the internet more secure. 
(WHITE PAPER) READ ABSTRACT |

Security Leadership Series: Security Strategies for Success by Citrix

May 2014 - (Free Research)
This white paper offers best practices for 3 key initiatives that can improve security given the increase in mobility and cloud trends. 
(WHITE PAPER) READ ABSTRACT |

Top 10 Reasons to Strengthen Information Security with Desktop Virtualization by Citrix

June 2013 - (Free Research)
Read this white paper to learn more about how deploying desktop virtualization can ensure your information is secure, allowing you to embrace workshifting and emerging technology. 
(WHITE PAPER) READ ABSTRACT |

The Ten Layers of Security in BIRT iHub by Actuate

June 2014 - (Free Research)
The following white paper explores the 10 layers of security in the BIRT iHub. Learn how to manage each layer successfully, how to enable central configuration, and more. 
(WHITE PAPER) READ ABSTRACT |

The Truth About MPLS Security by Certes Networks

June 2011 - (Free Research)
If you are sending data over a “private” Wide Area Network (WAN) there is a dirty little secret your service provider doesn’t want you to know about. The truth is that these so-called private WANs offer no inherent security and they aren't really even private. 
(WHITE PAPER) READ ABSTRACT |

Find the Needle in the Haystack – Audit and Compliance Reporting for AIX by Safestone Technologies

November 2011 - (Free Research)
This white paper discusses how organizations can address the challenge of meeting audit and compliance regulations, whilst driving down costs and reducing risk. It outlines how Safestone’s Compliance Center for AIX solution efficiently collects raw data and refines it into easy-to-understand, actionable information. 
(WHITE PAPER) READ ABSTRACT |

6 Ways to Enhance Security in AWS by SafeNet, Inc.

February 2014 - (Free Research)
In this white paper, learn why Amazon Web Services (AWS) is a leading cloud service, with a strong partnership with a security provider that provides 6 additional security enhancements to better protect data. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 468 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts