Productivity Versus Security SoftwareWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Productivity Versus Security Software returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Network Security
 •   Application Security
 •   Data Center Management
 •   Endpoint Security
 •   Enterprise Systems Management
 •   Application Integration
 •   Security Monitoring
 •   Vulnerability Assessment
 •   Virtualization

Related Searches
 •   Canadian Productivity Versus Security
 •   Productivity Versus Code
 •   Productivity Versus Implementation
 •   Productivity Versus Research
 •   Productivity Versus Security Articles
 •   Productivity Versus Security Kentucky
 •   Productivity Versus Utah
 •   Productivity Washington
 •   Terms Productivity Versus Security
Advertisement

ALL RESULTS
1 - 25 of 469 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Symantec Endpoint Protection 11.0.3 by Symantec Corporation

March 2009 - (Free Research)
In this Tolly Group competitive performance evaluation, learn how Symantec Endpoint Protection 11.0.3 consistently delivered faster response time than competing products tested. 
(WHITE PAPER) READ ABSTRACT |

Protecting Your Roaming Workforce With Cloud-Based Security by Sophos, Inc.

December 2013 - (Free Research)
This exclusive resource examines how transitioning to a cloud-based security service can help you meet the challenges met by employees working beyond your organization's secure perimeter. 
(WHITE PAPER) READ ABSTRACT |

Sophos Computer Security Scan by Sophos, Inc.

April 2010 - (Free Research)
Use this tool to scan up to 200 computers on your network to discover threats that your existing security software might have missed.  Scan for viruses, spyware, adware, rootkits, unwanted devices and applications, and suspicious files. You'll receive a comprehensive report of the results and  recommendations for guarding against the threats found. 
(TRIAL SOFTWARE)

Secure Enterprise e-mail Solutions with Microsoft® Exchange by Agilysys-Sun Technology Solutions

July 1967 - (Free Research)
This white paper describes HP's set of add-on Microsoft Exchange solutions that protect against security, performance and availability risks and enable e-mail administrators to set and better enforce message handling policies. 
(WHITE PAPER) READ ABSTRACT |

Warehouse Management Solutions: Embedded or Best-of-Breed? by Epicor Software Corporation

January 2006 - (Free Research)
Warehouse management solutions (WMS) help increase customer satisfaction, productivity and utilize resources. Learn cost factors and questions to ask that will help you decide between and embedded and stand-alone system. 
(WHITE PAPER) READ ABSTRACT |

Using enterprise architecture to develop a blueprint for improving your energy efficiency and reducing your carbon footprint by IBM

December 2008 - (Free Research)
This whitepaper is about enterprise architecture as it pertains to finding and maximizing the business value in greener operations. Higher energy efficiency and a smaller carbon footprint are obvious areas of interest for any business, but how do you balance these goals with productivity, customer service, and all your other business concerns? 
(WHITE PAPER) READ ABSTRACT |

Hospital Improves Patient Care and Clinician Productivity with WLAN by Juniper Networks, Inc.

May 2011 - (Free Research)
To facilitate high-quality patient care, Memorial Hospital deployed a wireless LAN to provide both data and voice access throughout the facility. The instantaneous communication and broad information access has significantly improved the quality of patient care, because it lets staff spend more time caring for patients and less time on paperwork. 
(WHITE PAPER) READ ABSTRACT |

White Paper: The State of Workforce Mobility by Nokia

January 2008 - (Free Research)
The State of Workforce Mobility is based on the key conclusions of a market research project conducted by global research leader Simpson Carpenter on behalf of Nokia Enterprise Solutions. 
(WHITE PAPER) READ ABSTRACT |

About to Buy Guide: Spam/virus protection for Exchange by SearchSecurity.com

June 2012 - (Free Research)
This expert e-guide explores the value of a comprehensive email security strategy, and compares the pros and cons of various approaches. Discover how you can gain the antispam and antivirus protection you need to keep email threats at bay and productivity high. 
(EGUIDE) READ ABSTRACT |

Don’t Fire Your Firewall by AT&T Corp

January 2011 - (Free Research)
Listen to this webcast to learn how AT&T Security Device Management (SDM) can help you control complexity, cost and compliance by monitoring your on-premise security hardware and software. 
(WEBCAST) READ ABSTRACT |

Security Threat Report: July 2008 by Sophos, Inc.

November 2008 - (Free Research)
This report gives a comprehensive insight into the events and trends that emerged during the first half of 2008, and helps businesses to stay ahead of today's increasingly covert threats. 
(WHITE PAPER) READ ABSTRACT |

Total Economic Impact™ of Trend Micro Enterprise Security by Trend Micro, Inc.

July 2009 - (Free Research)
The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of choosing Trend Micro Enterprise Security for their complete content security protection. 
(ANALYST REPORT) READ ABSTRACT |

U.S. Navy Cyber Defense Operations Command by Novell, Inc.

December 2009 - (Free Research)
Using Novell® Sentinel™ as part of its PROMETHEUS system, the Navy Cyber Defense Operations Command (NCDOC) has automated and centralized security monitoring across hundreds of diverse locations worldwide. 
(WHITE PAPER) READ ABSTRACT |

Dissecting the XWM Trojan Kit: A Peek at China's Growing Underground Online Gaming Economy by Trend Micro, Inc.

October 2010 - (Free Research)
This research paper introduces a popular online gaming Trojan kit known as the "Xiang Wei Ma (XWM) Kit," which roughly translates to "Rattle Trojan," that targets popular online games in China. 
(WHITE PAPER) READ ABSTRACT |

Slipping Through The Cracks Of Web Services To Serve Malware by Trend Micro, Inc.

October 2010 - (Free Research)
Today's generation of cybercriminals continue to find more ways to abuse commonly used Web services for spamming and to spread malware. Leveraging the ever-growing number of Web 2.0 and computing platforms to facilitate operations, cybercriminals have moved away from simple and so much more. 
(WHITE PAPER) READ ABSTRACT |

Virtual Desktop Foundations eBook: Chapter 1- Restructuring for Virtual Desktops by Pano Logic, Inc

September 2010 - (Free Research)
Our Virtual Desktop Foundations e-book will prepare you to introduce virtual desktops into your enterprise by answering a few critical questions, including: what are some considerations, how should you upgrade your infrastructure, is your WAN optimized, when is the best time to migrate desktops to a new OS, and more. 
(EBOOK) READ ABSTRACT |

Virtual Criminology Report Cybercrime versus Cyberlaw by McAfee, Inc.

December 2008 - (Free Research)
Global cybercrime has a significant impact on businesses and consumers across the globe. Read this whitepaper for a discussion on the extent to which cyberlaw is keeping up with the crimes being committed, and bring to justice the perpetrators of c... 
(WHITE PAPER) READ ABSTRACT |

Web application security: automated scanning versus manual penetration testing by IBM

January 2008 - (Free Research)
There are two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis. The purpose of this paper is to compare these two methods. 
(WHITE PAPER) READ ABSTRACT |

Web Application Security: Automated Scanning versus Manual Penetration Testing by IBM

February 2009 - (Free Research)
This paper explains two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis. 
(WHITE PAPER) READ ABSTRACT |

Using SaaS to Reduce the Costs of Email Security by Proofpoint, Inc.

February 2009 - (Free Research)
This whitepaper discusses the dramatic cost savings that companies can realize by adopting a SaaS (Software-as-a-Service) model for email security versus an on-premises approach. 
(WHITE PAPER) READ ABSTRACT |

Web Application Security: Automated Scanning versus Manual Penetration Testing by Logicalis

December 2008 - (Free Research)
This paper explains the two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis. 
(WHITE PAPER) READ ABSTRACT |

How to Expand on SAP Workflow by Esker Inc.

July 2013 - (Free Research)
Trying to decide between third-party and SAP's own add-ons to SAP Workflow is a confusing but important process for ensuring employee adoption, efficiency, and productivity. This eBook helps identify and analyze SAP Workflow add-on solutions. 
(EBOOK) READ ABSTRACT |

Genius Project4Domino versus Microsoft Project Server 2007 by Genius Inside

September 2008 - (Free Research)
Genius Project4Domino improves your ROI and reduces your TCO, and is clearly the best value proposition with the more functionality. 
(WHITE PAPER) READ ABSTRACT |

Information Security Magazine – April 2014 by SearchSecurity.com

April 2014 - (Free Research)
In this issue, we help you assess your mobile security strategy in the face of emerging threats and attackers' use of mobile devices to carry out attacks. 
(EZINE) READ ABSTRACT |

Optimizing Worldwide SharePoint Data and Content Access with DocAve by AvePoint, Inc.

July 2011 - (Free Research)
This white paper outlines the technological and infrastructural barriers that businesses must overcome to ensure their SharePoint platform can quickly respond to ever-changing needs at "Web speed." 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 469 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts