Policy Using Focus PriceWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Policy Using Focus Price returned the following results.
RSS What is RSS?
Related Categories

 •   Security Policies
 •   Data Security
 •   Virtualization
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Network Security
 •   Enterprise Data Protection and Privacy
 •   Security Monitoring
 •   Endpoint Security
 •   Business Process Management (BPM)
 •   Application Servers

Related Searches
 •   Balancing Policy
 •   Email Policy
 •   Manufacturers Policy
 •   New Policy Using
 •   Package Policy Using
 •   Policy Outsource
 •   Policy Technologies
 •   Policy Using Focus Indiana
 •   Policy Using Focus Managers
 •   Review Policy
Advertisement

ALL RESULTS
1 - 25 of 475 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

The 10 myths of safe web browsing by Sophos, Inc.

October 04, 2010 - (Free Research)
Do you and your users practice safe web browsing? Avoid risky sites? Limit time spent online during work hours? Employ a rock-solid internet access policy? Use a secure browser? Have the experience to know a risky site when you see one? If you answered “Yes” to any of these questions, you need to read the rest of this report. 
(WHITE PAPER) READ ABSTRACT |

Architecting the Ultimate Control Point - Advanced Cyber Threat Mitigation by Intel

October 13, 2010 - (Free Research)
This session looks at applying the complete lifecycle of a Security Architect's job dealing with Web Services Threats and Countermeasures. View Industry security expert Gunnar Peterson develop a Web service Threat model and show how access control and SAML can mitigate spoofing and elevation of privilege attacks. 
(WEBCAST) READ ABSTRACT |

Solution Note: Enabling the Secure Use of Facebook by Palo Alto Networks

April 13, 2012 - (Free Research)
With millions of users, Facebook offers significant opportunities for organizations to conduct research, execute targeted marketing, increase awareness and more. But enabling the use of Facebook introduces a number of security risks. In this paper, uncover how to reap the benefits of social networking while doing it in a safe and secure manner. 
(WHITE PAPER) READ ABSTRACT |

Integrating Information Labeling and Microsoft Active Directory Rights Management Services (AD RMS) by TITUS

November 12, 2010 - (Free Research)
This white paper examines the challenges of content protection and user acceptance of content protection technology. It provides an overview of Microsoft's Active Directory Rights Management Services (AD RMS) and its integration with Titus' Document Classification and Message Classification product suites. 
(WHITE PAPER) READ ABSTRACT |

RHEV for Servers: Competitive Pricing whitepaper by Red Hat

May 25, 2012 - (Free Research)
This document compares the pricing of Red Hat Enterprise Virtualization (RHEV) with the pricing of VMware vSphere 5 for server virtualization. Inside, find detailed pricing comparisons for the use cases of 100 and 250 virtual servers. 
(WHITE PAPER) READ ABSTRACT |

RHEV for Desktops: Competitive Pricing Whitepaper by Red Hat

May 25, 2012 - (Free Research)
This document compares the pricing of Red Hat Enterprise Virtualization for Desktops (RHEV) with the pricing of VMware View 5 for desktop virtualization. Access a detailed price comparison for the use cases of 100 virtual desktops. 
(WHITE PAPER) READ ABSTRACT |

HP Virtual Server Environment Capitalizes on Workload Management Integration by Hewlett-Packard Company

October 2008 - (Free Research)
Virtualization can significantly improve the utilization of computing resources. In this white paper learn how virtualization can assign unused resources to workloads in other parts of an organization that can benefit from them. 
(WHITE PAPER) READ ABSTRACT |

How to configure Mac OS X Server by ComputerWeekly.com

March 2013 - (Free Research)
This step by step guide shows you how to configure Max OS X Server. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Accenture Technology Vision 2011 by ComputerWeekly.com

February 2011 - (Free Research)
Just as the U.S. space program could not have put a man on the moon using conventional aviation technology, IT leaders and business executives cannot use yesterday’s approaches to realize tomorrow’s objectives. 
(WHITE PAPER) READ ABSTRACT |

Moving Towards Customer-Centric Pricing: From Strategy to Implementation, the New Opportunities for Banks to Compete in the Current Economic Downturn by IBM

December 2010 - (Free Research)
Pricing is a strategic weapon for acquiring new customers and, as importantly, retaining existing ones. As such, effective and innovative pricing strategies are crucial for banks to achieve organic growth. This white paper argues that banks need more than ever technologies such as the BRMS to effectively manage their pricing policies. 
(WHITE PAPER) READ ABSTRACT |

Finding Gold with Analytics: 5 Key Metrics for Successful Software Development by CollabNet

July 2009 - (Free Research)
Join us for a live demonstration of 5 key metrics you can use to answer many of the biggest, meatiest issues that confront development teams, and learn practical approaches for increasing efficiency and software quality in your development projects. 
(WEBCAST)

Dell EqualLogic TCO Analysis: The Economics of EqualLogic Virtualized iSCSI Storage by Dell, Inc.

December 2009 - (Free Research)
This ESG Lab report examines the economic excellence of highly scalable EqualLogic iSCSI storage solutions compared to traditional direct attached storage (DAS), Fibre Channel storage area network (FC SAN), and multi-protocol solutions (defined as systems that provide FC, iSCSI, and NAS connectivity). 
(ANALYST REPORT) READ ABSTRACT |

IDC Technology Spotlight: Optimizing Storage to Reduce Data Footprint and Lower Costs by Hewlett-Packard Company

December 2008 - (Free Research)
This white paper examines data deduplication technologies supported by the latest Storage Solutions from HP. Data deduplication is a hot topic in data protection and therefore, also a relevant topic for HP Data Protector software. 
(WHITE PAPER) READ ABSTRACT |

Get the most bang for your buck out of flash by SearchStorage.com

July 2013 - (Free Research)
This e-guide examines how many of your peers are actually using flash and discusses the most common usage scenarios and implementation methods. Learn why you shouldn't focus solely on performance numbers when evaluating vendor offerings and get advice on how you can make the most of your flash investment. 
(EGUIDE) READ ABSTRACT |

Success with Static Analysis for Security: Why Code Audits Fail by Parasoft Corporation

April 2009 - (Free Research)
This paper explains why and how to apply static analysis tools in the context of a policy-based security process that not only prevents security vulnerabilities, but also focuses on SDLC productivity. 
(WHITE PAPER) READ ABSTRACT |

Quantum's Tiered Architecture and Approach to Data Protection by Quantum Corporation

January 2014 - (Free Research)
This white paper highlights a tiered architecture and approach to data protection to match data value to storage costs over time. 
(WHITE PAPER) READ ABSTRACT |

McAfee Total Protection for Secure Business by Insight

March 2010 - (Free Research)
McAfee solutions cover all the critical elements of security medium businesses need: desktop and server protection, data protection, email and web security, and compliance. Total Protection for Secure Business provides comprehensive protection against the most lethal threats and exploits - in one package, from one trusted and proven vendor. 
(WHITE PAPER) READ ABSTRACT |

Author and deploy rules using WebSphere ILOG JRules Business Rules Management System by IBM

December 2010 - (Free Research)
Learn how the WebSphere ILOG JRules BRMS can automate decision making for data validation, eligibility and pricing in a real-world scenario. This demo shows how JRules BRMS allows organizations to gain a competitive advantage by adapting business systems to evolve with changing business policies and decisions. 
(PRODUCT DEMO) READ ABSTRACT |

Recovery Manager for Active Directory by Dell Software

Quest Recovery Manager for Active Directory offers an easy-to-use solution for fast, granular, online recovery of Active Directory (AD) in the event of inadvertent modification of AD due to software failure or human error. 
(ASP & SOFTWARE PRODUCT)

Enhancing Business Process Management with Business Rules by FICO

May 2010 - (Free Research)
While a business process management system can save time and cut costs by governing process, it can’t decide what to do, given a particular circumstance. A business rules management system enables the right decisions to be made quickly. This white paper uses case studies to illustrate the value of adding rules to BPM. 
(WHITE PAPER) READ ABSTRACT |

6 Key Metrics for Measuring Lean Success by Infor

September 2008 - (Free Research)
This webcast by IndustryWeek discusses the key metrics your company can use to help ensure you accomplish you lean goals. It brings together members of the manufacturing community to discuss strategic and operational initiatives. 
(WEBCAST) READ ABSTRACT |

Tiered Storage Takes Center Stage (Horison) by Oracle Corporation

December 2010 - (Free Research)
This paper describes how tiered storage, as a storage initiative, has been proven to significantly reduce acquisition and operating costs for medium and large scale storage enterprises. Read this paper to learn more about how tiered storage is taking center stage. 
(WHITE PAPER) READ ABSTRACT |

First the Tick, Now the Tock: Next Generation Intel Microarchitecture - Nehalem by Intel Corporation

April 2009 - (Free Research)
Read this paper and get a look at how the next generation microarchitecture's dynamically scalable and design-scalable features directly contribute to power efficiency and performance. 
(WHITE PAPER)

Computer Weekly - 28 February 2012: Taking UK government into the cloud by ComputerWeekly.com

February 2012 - (Free Research)
This week's edition asks, now that the the G-Cloud store is up and running, will the government's cloudstore transform the market for public sector IT buyers and suppliers? It also examines research that has indicated OS upgrades will attract a significant chunk of investment this year. 
(EZINE)

Forum Presidio - Open PGS Security Gateway - Regulatory Compliance by Forum Systems

Forum Presidio™ is a comprehensive secure content exchange platform that allows enterprises to immediately comply with Government privacy regulations using a low cost and easy to manage centralized solution. Forum Presidio™ can be used as a legacy-to-XML security bridge for a smooth migration to XML Web services. 
(SOFTWARE PRODUCT)

1 - 25 of 475 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts