Peer To Peer Network Security Case StudyWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Peer To Peer Network Security Case Study returned the following results.
RSS What is RSS?
Related Categories

 •   Network Security
 •   Data Security
 •   Managed Security Services
 •   Application Security
 •   Endpoint Security
 •   Security Monitoring
 •   Virtualization
 •   Security Policies
 •   Anti-Virus Solutions
 •   Data Center Management

Related Searches
 •   Decision Peer To
 •   Example Of Peer
 •   Impact Of Peer To Peer
 •   Peer Buy
 •   Peer Documentation
 •   Peer Mapping
 •   Peer To Computing
 •   Peer To Knowledge
 •   Peer To Peer Resources
 •   Peer To Schema
Advertisement

ALL RESULTS
1 - 25 of 453 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

The Top Six Risks of Employee Internet Use and How to Stop Them by St. Bernard Software

May 10, 2010 - (Free Research)
Due to the serious nature of many threats, the Internet use of even one unmonitored employee on a single unmanaged system can ravage a company’s internal network, irrevocably delete critical data, and ultimately ruin the company’s ability to conduct business. Read this white paper to learn how to protect your organization. 
(WHITE PAPER) READ ABSTRACT |

Confronting the Data Backup Challenge by FalconStor Software

April 17, 2013 - (Free Research)
This brief resource tackles the data backup challenge for IT managers – and provides the results taken by 215 of your IT peers in an IDG Research Services survey. 
(WHITE PAPER) READ ABSTRACT |

IT in the UK SMB (Small and Medium sized Business) Sector by ComputerWeekly.com

January 04, 2012 - (Free Research)
This report from Knowledge Peers and Pierre Audoin Consultants (PAC), reveals what leaders of Small and Medium-Sized Businesses (SMBs) think of IT – its strategic value, its potential, and the changing way in which it is being used in their organisations. 
(IT BRIEFING) READ ABSTRACT |

IBM Security Services Client Reference Guide by IBM

November 30, 2013 - (Free Research)
This in-depth guide explores essential case studies that will help you understand the evolving threat landscape and learn from your peers' compliance challenges. 
(WHITE PAPER) READ ABSTRACT |

Best Kept Secrets of Peer Code Review: Modern Approach Practical Advice by SmartBear Software

August 22, 2012 - (Free Research)
This insightful e-book provides in-depth best practices and advice on how to catch code errors before they are able to cause bigger problems within your organization. Read more inside to uncover new tools designed to make the QA process faster and easier. 
(EBOOK) READ ABSTRACT |

CSC partners with VCE to jump-start cloud business with Vblock™ Infrastructure Systems by VCE (E-mail this company)

December 30, 2011 - (Free Research)
This case study explores the solution one of your peers implemented to meet the growing needs of their client base, ensure availability, performance, and security, and increase their competitive advantage in the cloud services market. 
(CASE STUDY) READ ABSTRACT |

A Framework for 2.0 Adoption in the Enterprise by NewsGator

May 05, 2010 - (Free Research)
This report draws from the knowledge of full‐time practitioners who orchestrate enterprise‐wide rollouts in their organizations. We outline patterns of adoption and highlight practical insight that will help your company and your clients plan for the process and help set realistic expectations for a successful 2.0 rollout. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 13 November 2012: Government commits to open standards by ComputerWeekly.com

November 13, 2012 - (Free Research)
In this week's Computer Weekly, we look at the government's controversial new policy on open standards and what it means for public sector IT. After hurricane Sandy hit New York, we talk to one datacentre operator about how it kept services running. And our latest buyers' guide examines the market for infrastructure on demand. Read the issue now. 
(EZINE) READ ABSTRACT |

Case Study: Nestle Nespresso Values Real-Time Security Intelligence from HP by Hewlett-Packard Limited

August 02, 2013 - (Free Research)
This quick video explores who one of your peers turns to for security and threat intelligence which enables them to better protect their organization's and clients' most valuable assets. 
(VIDEO) READ ABSTRACT |

SSG Report: Enterprise Use Cases for Solid State Storage/Flash Memory by Dell and VMware

September 17, 2013 - (Free Research)
This analyst report outlines enterprise solid state storage and why it matters to customers. It also highlights findings from a study of more than 550 IT professionals on their plans for SSD deployment. Read on to find out what your peers chose as the #1 vendor of choice to deploy flash and solid state storage technologies. 
(WHITE PAPER) READ ABSTRACT |

The Acronis Global Disaster Recovery Index: 2011 by Acronis

January 28, 2011 - (Free Research)
When it comes to successfully recovering from a serious incident the Australians were the least confident. Just 22% of Australian businesses felt that they would be able to recover quickly in the event of downtime, compared to a global average of 50%. 
(WHITE PAPER) READ ABSTRACT |

Reaping the Benefits of Business Agility with Cloud Computing: Real-World Profiles by VMware, Inc.

August 01, 2013 - (Free Research)
Not every cloud fits every organization, but a well-employed cloud can mean serious cost reductions and significantly increased business agility. Learn how cloud computing platform implementation drives business agility in a number of real-world case studies detailed in the following article. 
(WHITE PAPER) READ ABSTRACT |

Reducing call volumes by helping customers self-serve by Jive Software

June 20, 2013 - (Free Research)
In this brief case study, discover how Citrix integrated a software toolkit within their existing content systems that dramatically improved their customer self-service offerings. Customers can now easily search online for answers and interactions with peers and service reps in the same community space. 
(CASE STUDY) READ ABSTRACT |

eGuide: New views on application modernization and the cloud by CA Technologies.

December 13, 2012 - (Free Research)
Check out this e-guide to find out what the experts and your peers think about training the business process management (BPM) lens on legacy applications to fulfill enterprise modernization needs. Read a case study detailing the role of business processes in the Army and Air Force Mutual Aid Association's application modernizations effort. 
(EGUIDE) READ ABSTRACT |

Five steps for increasing availability and reducing energy consumption and costs across cloud and virtual platforms by CA Technologies.

February 01, 2012 - (Free Research)
Discover the energy and environmental benefits of cloud computing, including 3 factors that help ensure an eco-friendly cloud environment, and 5 simple steps that lead to an improved and automated energy management strategy. In addition, read 3 case studies and discover the benefits your peers are witnessing with green cloud computing. 
(WHITE PAPER) READ ABSTRACT |

2013 State of the Mobile Enterprise Study by Macquarie Telecom Pty Limited (E-mail this company)

September 20, 2013 - (Free Research)
This exclusive white paper analyzes how organizations are generating revenue using mobile technology and policies. Read on for a helpful tool to benchmark your own uptake of mobile compared to your peers and help IT better understand the platforms and products they should support. 
(WHITE PAPER) READ ABSTRACT |

The Case for Server-Based Messaging Security Solutions - Webcast by Sunbelt Software

August 2008 - (Free Research)
What are some of the latest, messaging-based security threats and risks to your organization? How is a server-based, security solution able to address those risks, in many cases better than a hosted or appliance-based solution? 
(WEBCAST) READ ABSTRACT |

Unchain Your Network with Application Intelligence and Control by SonicWALL

February 2011 - (Free Research)
This paper discusses the new risks facing organizations in light of the prevalence of Web-based applications and offers best practices for gaining control of applications, data and bandwidth. 
(WHITE PAPER) READ ABSTRACT |

Emerging Media Series: How Blogs & Real Simple Syndication (RSS) Impact B2B Technology Purchase Decisions by KnowledgeStorm, Inc (E-mail this company)

September 2006 - (Free Research)
This report, the second in a series of studies looking at the impact emerging online applications have on B2B technology marketing, finds that blogs and Real Simple Syndication (RSS) are catching on more quickly than previously thought. 
(ANALYST REPORT) READ ABSTRACT |

Podcast: Emerging Media Series II: Blogs and Real Simple Syndication Report by KnowledgeStorm, Inc (E-mail this company)

September 2006 - (Free Research)
This podcast will focus on the content of a new KnowledgeStorm research report, the second in a series of studies looking at the impact emerging online applications have on B2B technology marketing. The research finds that blogs and Real Simple Syndication (RSS) are catching on more quickly than previously thought. 
(PODCAST) READ ABSTRACT |

Irish Life and Permanent plc: Using CA’s Next Generation Tools and Utilities to Simplify Mainframe Management by CA Technologies.

January 2010 - (Free Research)
This success story provides insight into the current state of the mainframe and forecasts the future of these critical systems. Get advice on how to recruit the next generation of specialists and hear from one company that implemented a tool designed to simplify mainframe management. 
(CASE STUDY) READ ABSTRACT |

Computer Weekly E-Zine: 5-11 July 2011 by ComputerWeekly.com

July 2011 - (Free Research)
The Computer Weekly eZine carries on the best tradition of the Computer Weekly Magazine by providing UK IT leaders with the best information, the best knowledge and the best buying information to help succeed in the industry. 
(EZINE)

Case Study: Providence College Captures Previously Undetected Attacks with FireEye Web Malware Protection System by FireEye

May 2011 - (Free Research)
This case study will show how Providence College was able to keep there network secure from advanced malware attacks, and how this security solution could do the same for you. 
(CASE STUDY) READ ABSTRACT |

Case Study: Bellevue School District by Websense, Inc.

November 2008 - (Free Research)
Read this case study to learn how the Bellevue School District dramatically improved their web security and productivity by extending their security policy management and administrator controls to additional IT staff members. 
(CASE STUDY) READ ABSTRACT |

IT Security Case Studies by ComputerWeekly.com

June 2013 - (Free Research)
Warwick Ashford presents 4 critical IT security case-studies selected from the winners of Computer Weekly's European User Awards. 
(CASE STUDY) READ ABSTRACT |

1 - 25 of 453 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts