Process Identity-BasedWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Process Identity-Based returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Identity Management/ User Provisioning
 •   Network Security
 •   E-Mail Management
 •   Application Security
 •   Enterprise Data Protection and Privacy
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Access Control
 •   Encryption and Key Management
 •   Enterprise Information Integration/ Metadata Management

Related Searches
 •   Forms Process Identity-Based
 •   Problem Process
 •   Process Flow
 •   Process Identity-Based Budgets
 •   Process Identity-Based Canadian
 •   Process Identity-Based Conferencing
 •   Process Identity-Based Fact
 •   Process Identity-Based Simple
 •   Process Identity-Based Small
 •   Rfp Process Identity-Based
Advertisement

ALL RESULTS
1 - 25 of 483 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Secure By Design: Building Identity-based Security into Today’s Information Systems by IBM

March 11, 2013 - (Free Research)
Consult this white paper to learn how you can improve your IT strategy. As the number of IT security incidents increases, businesses must begin to invest in information security and IT risk management. Find out how you create a security technique that is built-in to your company's structure by reading this resource. 
(WHITE PAPER) READ ABSTRACT |

The MATH, MYTH, & MAGIC: An Introduction to Identity Data Search-and-Match by Informatica

December 2008 - (Free Research)
This book is of value to both the person who is tackling a "name search" and "name matching" problem for the first time, as well as to the experienced specialist in "identification and search" systems. 
(BOOK) READ ABSTRACT |

How to Protect Your Critical Resources with Identity-based Access Control by AEP Networks

April 2008 - (Free Research)
This paper addresses the concerns facing network security architects and introduces AEP IDpoint as an advanced IBAC solution that meets datacenter security needs and satisfies modern business security challenges. 
(WHITE PAPER) READ ABSTRACT |

Email Security- The IBE Architectural Advantage by Voltage Security, Inc.

April 2012 - (Free Research)
This resource examines the challenges of securing business communication and how to overcome it. View now to explore the shortcomings of existing encryption solutions, key requirements for ubiquitous secure business communication, how Identity-based encryption (IBE) meets these requirements, and more. 
(WHITE PAPER) READ ABSTRACT |

The True Costs of E-mail Encryption by Trend Micro

August 2010 - (Free Research)
Currently, e-mail encryption is a bit of a paradox. Large organizations understand and want privacy, but e-mail encryption technology is too in-depth for mass usage. Fortunately things are changing. Read this paper to learn so much more. 
(WHITE PAPER) READ ABSTRACT |

Internet Gambling Sites: Expose Fraud Rings and Stop Repeat Offenders with Device Reputation by iovation, Inc.

June 2009 - (Free Research)
This white paper will help you understand what new and innovative techniques can be used to combat online fraud and abuse, and how online casinos can realize a true return on investment by reducing losses from fraud exposure and increasing operational efficiency within the fraud detection process. 
(WHITE PAPER) READ ABSTRACT |

Tackling the Top Five Network Access Control Challenges by Juniper Networks, Inc.

March 2011 - (Free Research)
In this document we explore five common networking challenges that enterprises face—network protection, guest user access, network visibility and monitoring, application access control, and identity-based Quality of Service (QoS)—and discuss how UAC can be used to address each 
(WHITE PAPER) READ ABSTRACT |

Online Dating: Keeping Your Members Safe from Online Scams and Predators by iovation, Inc.

June 2009 - (Free Research)
This whitepaper will help you understand what new and innovative techniques can be used to protect the reputation of your business, keep your members in a safe and trusted environment, while keeping the fraudsters out. Device fingerprinting helps identify the bad guys so sites can eliminate their accounts from the network once and for all. 
(WHITE PAPER) READ ABSTRACT |

Interpol, Entrust Develop Advanced Multipurpose SmartCard by Entrust, Inc.

November 2011 - (Free Research)
See how in this real world case study the power of advanced enterprise security was harnessed to create the most advanced multipurpose credentials in the world for INTERPOL. 
(WHITE PAPER) READ ABSTRACT |

InterScan Messaging Hosted Security (IMHS) Trial by Trend Micro, Inc.

August 2009 - (Free Research)
Many traditional email security solutions take up too much time and are not as effective as they should be in stopping spam. Hosted email security by Trend Micro provides unlimited email scanning capacity with always-up-to-the-minute security that is continuously tuned and optimized 24x7. 
(DOWNLOAD) READ ABSTRACT |

InterScan Messaging Hosted Security (IMHS) Trial by Trend Micro, Inc.

August 2009 - (Free Research)
Many traditional email security solutions take up too much time and are not as effective as they should be in stopping spam. Hosted email security by Trend Micro provides unlimited email scanning capacity with always-up-to-the-minute security that is continuously tuned and optimized 24x7. 
(DOWNLOAD) READ ABSTRACT |

Cisco ASA 5500 Series by Cisco Systems, Inc.

The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, so you can feel confident your business is protected. 
(HARDWARE PRODUCT)

Boosting Efficiency with IT Process Automation by CA Technologies.

June 2008 - (Free Research)
As data center infrastructures become increasingly complex, so do the IT processes--such as incident management and server provisioning--that keep infrastructure up and running. 
(WHITE PAPER) READ ABSTRACT |

What's Up With Business Processes in the Cloud by SearchSOA.com

May 2014 - (Free Research)
Learn about the business conditions that help determine cloud computing decision-making. 
(EBOOK) READ ABSTRACT |

Top 5 Ways to Improve Agility Via Next-Generation Business Process Management by OpenText

February 2014 - (Free Research)
For some time, IT organizations have improved their alignment with business goals by investing in business process management (BPM) tools, but what does the next generation have in store? Find out in this expert white paper, where you'll discover five steps your organization can take to improve agility and competitiveness using next-gen BPM tools. 
(WHITE PAPER) READ ABSTRACT |

What role does BPM play and how can it help you improve your business operations? by OpenText

December 2013 - (Free Research)
Your business processes are fundamentally linked to operations and overall performance. Achieving efficient, flexible, and agile processes involves collaboration between business and IT -- which is where many businesses fall short. Fortunately, business process management (BPM) can address all of these issues. 
(WHITE PAPER) READ ABSTRACT |

The future of BPM by OpenText

May 2013 - (Free Research)
Read today's expert resource to learn the new trends of business process management (BPM) including event processing, predictive analytics, and business process competency centers. And hear from experts on how to bring these new technologies to your organization's BPM strategy. 
(EGUIDE) READ ABSTRACT |

Complete Process Automation to be More Productive by OpenText

November 2013 - (Free Research)
This white paper highlights a complete process automation and case management system that enables organizations to become more agile, more productive, and more competitive. 
(WHITE PAPER) READ ABSTRACT |

Smart Process Applications Evaluation, Q2 2013 by OpenText

April 2013 - (Free Research)
This Forrester Wave report aims to help CIOs find the right smart process app vendor partners for improving this full spectrum of human-based processes. Read today to explore Forrester's key takeaways after conducting a 15-criteria evaluation of twelve software vendors. 
(WHITE PAPER) READ ABSTRACT |

Thinking Beyond Traditional BPM: Managing the Customer Lifecycle in an Information-Rich Environment by OpenText

April 2013 - (Free Research)
Today, monitoring the myriad content and processes that make up the complete customer relationship requires more than legacy enterprise applications can provide. This white paper discusses the shortcomings of traditional BPM, and how an emerging breed of packaged applications offers greater targeted functionality with a shorter deployment time. 
(WHITE PAPER) READ ABSTRACT |

5 conditions for more productive business operations by Iron Mountain

March 2012 - (Free Research)
In order to compete in today’s economic climate, companies are under constant pressure to do more with less. Read this brief guide to find five tips and best practices for streamlining your information management processes. 
(DATA SHEET) READ ABSTRACT |

eDiscovery and Compliance Information Workflow with CommVault Simpana 10 Software by CommVault Systems, Inc.

March 2014 - (Free Research)
This informative datasheet gives information on two solutions that can help organizations handle their own compliance and discovery workflows without the help (and expense) of outside consultants. 
(DATA SHEET) READ ABSTRACT |

Smarter Process in the age of the customer by IBM

April 2013 - (Free Research)
Customers expect your operations to be instant, seamless and insightful so that each interaction is fast and effective. Access this fascinating white paper today to learn about expert solutions for improving business operations so as to effectively cater to customer interactions. 
(WHITE PAPER) READ ABSTRACT |

Dancing with Elephants - Making Your Business Processes Agile by Fujitsu America, Inc.

January 2011 - (Free Research)
Think Agile BPM is not for you because you don't have simple processes that follow the same path every time? Think again. This webcast illustrates how Agile BPM allows you to get results by striking the right balance between structure and flexibility in processes how Fujitsu's Agile BPM solution can help you to achieve that goal. 
(WEBCAST) READ ABSTRACT |

Making the Case for BPM: A Benefits Checklist by IBM

December 2010 - (Free Research)
BPM is the best investment a company can make in establishing a platform for continuous improvement. The challenge for many companies is justifying the BPM investment instead of traditional paths for solving process problems – like buying an application or building a custom application. This paper provides a virtual checklist for the benefits. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 483 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts