Penn SolutionsWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Penn Solutions returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Fraud Detection & Prevention
 •   Intellectual Property Protection/ Extrusion Prevention
 •   Enterprise Data Protection and Privacy
 •   Vulnerability Assessment
 •   Encryption and Key Management
 •   Insurance (Integrated)

Related Searches
 •   Advanced Penn Solutions
 •   Build Penn Solutions
 •   Penn Flow
 •   Penn Solutions License
 •   Penn Solutions Media
 •   Penn Solutions Mississippi
 •   Penn Solutions Operational
 •   Penn Solutions Systems
 •   Product Penn Solutions
 •   Work Penn Solutions
Advertisement

ALL RESULTS
1 - 25 of 500 | Next Page

Penn National Insurance: Real-Time Documents Provide Faster Time to Market with a Personal Touch by Exstream Software

April 2008 - (Free Research)
Penn National Insurance wanted to deploy a single, comprehensive infrastructure for its batch and real-time document applications. Exstream Software's Dialogue enterprise personalization solution met this goal, improving time to market ... 
(CASE STUDY) READ ABSTRACT |

Case Study: Reducing DR Costs and Complexity by IBM

May 2012 - (Free Research)
Penn State Hershey's research and patient care centers rely on a huge volume of data, ranging from files generated by its imaging modality systems to patient records. Penn State Hershey turned to IBM's XIV storage system, which delivered the performance and availability to make their disaster recovery program feasible almost overnight. 
(CASE STUDY) READ ABSTRACT |

Expert Analyst Reviews the Ins and Outs of Database Encryption by Guardium, an IBM Company

February 2010 - (Free Research)
In this expert E-Guide, learn the ins and outs of database encryption. Jonathon Penn, principal analyst at Forrester Research Inc., reviews desktop, laptop and full disk encryption and outlines a cost-effective approach for managing security. Also discover three questions you must answer before embarking on any encryption project. 
(EGUIDE) READ ABSTRACT |

Big Data in Motion by SearchCIO.com

March 2014 - (Free Research)
When large information sets are in transit, bottlenecks inevitably occur. CIOs must overcome these obstacles in order to extract real value from their data. In this SearchCIO handbook, we confront the obstacles posed by big data in motion. 
(EBOOK) READ ABSTRACT |

IT Transformation Consulting Services: Align Your Technology Direction by Hewlett-Packard Company

December 2012 - (Free Research)
This brief white paper demonstrates how your organization can make the right choices to transform your IT so that it's fully aligned with business goals by employing consulting services that create an integrated, strategic IT roadmap. 
(WHITE PAPER) READ ABSTRACT |

Improving Windows Client Performance and Security: An Impact Comparison of AC and Traditional AV by Lumension

May 2013 - (Free Research)
This Tolly Test report compares the effectiveness of both anti-virus and application control solutions to help you decide which would work best for your enterprise. View now to uncover which approach provides greater performance across diverse workloads and protects against more threats to keep your endpoints safe and secure. 
(WHITE PAPER) READ ABSTRACT |

Code Signing Debacle 2.0: A Hacked Adobe Server and Its Impact on Us All by Lumension

May 2013 - (Free Research)
Watch this webinar to learn about the threat of hacked vendor software, the technologies and controls that can help address the risk of compromised code signatures and infrastructures, and how to¬†preemptively address these vulnerabilities. 
(WEBCAST) READ ABSTRACT |

Dousing the Flame: How This Tom Clancy-Esque Attack Worked and What Should You Really Do to Protect Against It by Lumension

February 2013 - (Free Research)
This webcast walks you through the fascinating nuts and bolts of the Flame attack and explains the technical details about how it worked and what lessons can be learned. Take an in-depth look into the entire attack by tuning in to learn more now. 
(WEBCAST) READ ABSTRACT |

Weaponized Malware - A Clear and Present Danger by Lumension

September 2012 - (Free Research)
Weaponized malware and advanced persistent threats raise the bar on endpoint security. Originally intended for cyber-espionage and cyber-warfare, these sophisticated attacks are now available to any cyber-criminal. How can security pros protect their organizations from these emerging perils? 
(WHITE PAPER) READ ABSTRACT |

The Role of Data Integration and Quality Management in NIEM by Information Builders

May 2013 - (Free Research)
Check out this paper today to investigate how the National Information Exchange Model (NIEM) has grown. Learn about the challenges it was designed to overcome and of the important role that enterprise integration and data quality management technologies play in the execution of NIEM initiatives. 
(WHITE PAPER) READ ABSTRACT |

Social Intelligence Approaches to Support Four Core Customer Scenarios by Hewlett-Packard Company

April 2013 - (Free Research)
This paper outlines some of the best methods for deploying social intelligence to support your CRM strategies. Read this and learn how the right social intelligence can help you win new customers, retain existing customers, reduce the cost of customer management and more. Also, discover specific use cases of social intelligence. 
(WHITE PAPER) READ ABSTRACT |

Cirrus Configuration Manager by SolarWinds, Inc.

January 2008 - (Free Research)
Cirrus Configuration Manager. 
(TRIAL SOFTWARE) READ ABSTRACT |

Hitachi Accelerated Flash Storage by Hitachi Data Systems

October 2013 - (Free Research)
This concise data sheet highlights a storage solution that offers a rack-optimized design that delivers more than 30TB per 2U tray and 4 times better device performance compared to enterprise solid-state drives. 
(DATA SHEET) READ ABSTRACT |

Hitachi Accelerated Flash: An Innovative Approach to Solid-State Storage by Hitachi Data Systems

January 2014 - (Free Research)
This white paper features a purpose-built flash controller that exploits the attractively priced MLC NAND technology. 
(WHITE PAPER) READ ABSTRACT |

Hitachi Unified Storage VM Flash: All Flash System by Hitachi Data Systems

October 2013 - (Free Research)
This data sheet highlights one flash storage solution that eliminates the tradeoffs in performance, capacity and functionality that organizations must take to reach the cost points they can accommodate. 
(DATA SHEET) READ ABSTRACT |

Hitachi Unified Storage VM: All Flash Solution by Hitachi Data Systems

July 2013 - (Free Research)
This white paper addresses the way all flash systems are helping storage pros handle the demands of their IT infrastructures. Read on to gain insight into 8 key features to look for when considering all flash system solutions. 
(WHITE PAPER) READ ABSTRACT |

Enterprise Project Management Software by Genius Inside

June 2013 - (Free Research)
Need to improve delivery of your New Product Development or IT projects? With Genius Project you can. Get a 360 degree view of your project and product pipeline, resources, budgets, earnings, and strategic alignment of all of your projects today! 
(TRIAL SOFTWARE)

2014 Ultimate Buyers Guide to Endpoint Security Solutions by Lumension

February 2014 - (Free Research)
This informative webcast provides a helpful buyers guide to the top endpoint security solutions on the market today, helping your organization to analyze each tool's offering and determine which would deliver the most benefits. 
(WEBCAST) READ ABSTRACT |

Beyond FTP: Securing and Managing File Transfers by Linoma Software

March 2010 - (Free Research)
Every day, millions of files are exchanged all over the world by corporations, government entities and other organizations. Most file transfers use the popular protocol known as FTP. This paper will examine how FTP has become the standard for business-to-business file transfers and the key pitfalls that face management using this open protocol. 
(WHITE PAPER) READ ABSTRACT |

New Opportunities for Business Intelligence: Eight Ways to Generate Revenue and Drive Growth Now by Information Builders

December 2012 - (Free Research)
This white paper presents how to support new growth strategies and drive new revenue using eight important technologies. Our approach is practical, with success stories that demonstrate how trailblazers have already proven the value of these innovations. 
(WHITE PAPER) READ ABSTRACT |

Improve the Patient Journey With Omni-Patient by Information Builders

April 2013 - (Free Research)
This informative paper examines the challenges healthcare organizations are currently facing when it comes to providing high-quality patient care. Discover the major barriers hindering their success in this area and discover a tool to help overcome these challenges. 
(WHITE PAPER) READ ABSTRACT |

Mission-Critical Platforms for Databases and Enterprise Applications by Hitachi Data Systems

October 2012 - (Free Research)
Learn more about a converged platform that offloads systems integration responsibilities from your IT department. 
(WHITE PAPER) READ ABSTRACT |

Dimensional Research: Uncovering the Business Value of IT Service Management: Five Ways HP Service Manager Can Make You a Hero by Hewlett-Packard Company

February 2013 - (Free Research)
Access this research report that discusses how 11 different customers deployed HP service manager to improve their ITSM strategy. Discover the results they achieved and how your organization could similarly benefit. 
(WHITE PAPER) READ ABSTRACT |

Collaborative IT: A Pragmatic Approach for Bringing the Service Desk and Operations Together by Hewlett-Packard Company

July 2010 - (Free Research)
This reports looks at best practices and technologies that can support an effective integration of the Service Desk and Operations teams. The report focuses on closed loop incident and problem management, as well as end-to-end change and configuration management, with a particular focus on automation. 
(WHITE PAPER) READ ABSTRACT |

Security Intelligence for a Faster World by Hewlett-Packard Company

May 2012 - (Free Research)
This resource explores how a new security information and event management (SIEM) system provides the unparalleled protection your organization needs to face the risks of big data. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 500 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts