Public Generic Company SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Public Generic Company Security returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Enterprise Data Protection and Privacy
 •   Virtualization
 •   Network Security
 •   Security Policies
 •   Storage Management
 •   Storage Security
 •   Anti-Virus Solutions
 •   Endpoint Security
 •   Application Security

Related Searches
 •   Business Public Generic
 •   Electronic Public Generic Company
 •   Examples Of Public
 •   Patent Public Generic Company
 •   Public Designs
 •   Public Download
 •   Public Generic Company Conversions
 •   Public Generic Company Implement
 •   Public Generic Configurations
 •   Public Products
Advertisement

ALL RESULTS
1 - 25 of 453 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Business Continuity Management by Matrix42

September 2008 - (Free Research)
This White paper explains the concept of Business Continuity and demonstrates how matrix42 Empirum supports the Business Continuity Strategy in the enterprise. 
(WHITE PAPER) READ ABSTRACT |

Best Practices to Protect the Cardholder Data Environment and Achieve PCI Compliance by Rapid7

July 2012 - (Free Research)
Cyber-attacks that target customer and financial information are becoming more popular and businesses need to protect their data. Prevent attackers from taking advantage of the gaps in your security plan by creating a comprehensive information security policy. 
(WHITE PAPER) READ ABSTRACT |

How to Choose Between Generic and Industry-Specific ERP Systems by Epicor Software Corporation

December 2012 - (Free Research)
This article suggests ways to simplify your ERP selection process and points out the differences between industry-specific and generic ERP solutions. 
(WHITE PAPER) READ ABSTRACT |

Generic ERP Means Big Problems for Manufacturers by Epicor Software Corporation

November 2012 - (Free Research)
This guide provides insight to help organizations in particular industries – like the food and beverage industry – decide between a generic and industry-specific ERP system. 
(WHITE PAPER) READ ABSTRACT |

Managed Office Protection: Switching from AV to SaaS by Panda Security

March 2008 - (Free Research)
Antivirus products require too much time and effort for small and mid-sized companies. Security as a Service (SaaS) means delivering traditional security applications as an Internet-based service to customers. Now you can focus on your core business, switch from Antivirus to Security as a Service and start enjoying the benefits of SaaS. 
(WHITE PAPER) READ ABSTRACT |

Generic vs. Industry-Specific ERP: Which Best Meets Your Needs? by Epicor Software Corporation

November 2013 - (Free Research)
The following white paper outlines the criteria you should consider when choosing an ERP solution. Find out how each can benefit your organization and what you can do to make sure that the ERP solution is the right one for you. 
(WHITE PAPER) READ ABSTRACT |

Disclosures 2012 - The Vulnerability of Publicly Traded Companies by Veracode, Inc.

May 2012 - (Free Research)
In a recently-released State of Software Security featured supplement, Veracode examines the software security posture of public companies and the material risks they face due to the weaknesses in their software applications. This webinar uses Veracode data to examine how public companies manage the risks inherited from software. 
(WEBCAST) READ ABSTRACT |

Excerpts from Virus Bulletin Comparative Reviews August-December 2010 by ESET

March 2011 - (Free Research)
The basic requirements for a product to achieve VB100 certification status are that a product detects, both on demand and on access, in its default settings, all malware known to be ‘In the Wild’ at the time of the review, and generates no false positives when scanning a set of clean files. 
(WHITE PAPER) READ ABSTRACT |

Heuristic Analysis- Detecting Unknown Viruses by ESET

February 2010 - (Free Research)
The aim of this paper is to reduce some of the confusion around the workings of AV technology, and to clarify what is realistic to expect from AV protection, particularly heuristic analysis. 
(WHITE PAPER) READ ABSTRACT |

Customer Spotlight - Learn How SSO and Authentication Helped Mackenzie Health Strike a Balance between Access and Security by Imprivata

February 2014 - (Free Research)
This case study feature Mackenzie Health's experience transitioning to an automated access management system with single sign-on (SSO) capabilities to ensure security, improve workflows, and reduce helpdesk calls and costs. 
(WHITE PAPER) READ ABSTRACT |

How Automated Solutions Can Help with Efforts Toward Sarbanes-Oxley Compliance by Varonis

September 2008 - (Free Research)
This document provides a brief overview of the Sarbanes-Oxley Act, (Sections 302 and 404), the impact of SOX on IT Departments, and the Varonis Data Governance solution for critical portions of the Sarbanes-Oxley Act of 2002. 
(WHITE PAPER) READ ABSTRACT |

New Growth from Enterprise Systems: Achieving High Performance through Distinctive Capabilities by Accenture

June 2008 - (Free Research)
New Accenture research unequivocally shows that successful implementations of enterprise systems drive corporate financial performance. 
(WHITE PAPER) READ ABSTRACT |

FUELING GROWTH, DRIVING OPERATIONAL EXCELLENCE by SoftBrands, Inc.

March 2008 - (Free Research)
Learn about an easily implemented, affordable and standardized solution that will boost your productivity with the advanced technologies of SAP combined with the manufacturing functionality. 
(WHITE PAPER) READ ABSTRACT |

Success Story: Company Delivers Dynamic IT with Public and Private Clouds on Proven Storage by NetApp

December 2012 - (Free Research)
This short case study examines how one organization easily and affordably deployed a storage system designed to deliver superior availability and proven performance to satisfy the most demanding workloads. 
(CASE STUDY) READ ABSTRACT |

E-Guide: Build a Hybrid Storage Cloud by Hitachi Data Systems

April 2013 - (Free Research)
This expert E-Guide explores the choices that must be considered when combining public and on-premise cloud storage and provides insight into the available products and services to help you make those decisions. 
(EGUIDE) READ ABSTRACT |

Computer Weekly - 6 March 2012: Windows 8 - tablet meets desktop by ComputerWeekly.com

March 2012 - (Free Research)
This week’s Computer Weekly delves into the new world of Windows 8. We also talk to some top CIOs about how the downturn has shaped their priorities. You'll also find the third and final part of our Buyer's Guide to IPv6 migration, all inside this digital magazine. 
(EZINE)

Global Best Practices in Email Security, Privacy and Compliance by Proofpoint, Inc.

August 2008 - (Free Research)
A new generation of email security solutions is needed to meet the challenges of growing message traffic, rapidly-evolving security threats and increasingly complex data protection and privacy regulations. This paper examines such a solution. 
(WHITE PAPER) READ ABSTRACT |

From private cloud to hybrid cloud: Six things to consider by VMware, Inc.

November 2013 - (Free Research)
This expert e-guide details how to get the most out of the cloud by combining public and private clouds to form a hybrid cloud. 
(EGUIDE) READ ABSTRACT |

Stuxnet Under the Microscope by ESET

October 2010 - (Free Research)
This report is devoted to the analysis of the notorious Stuxnet worm (Win32/Stuxnet) that suddenly attracted the attention of virus researchers this summer. This report is primarily intended to describe targeted and semi-targeted attacks, and how they are implemented, focusing mainly on the most recent, namely Stuxnet. 
(WHITE PAPER) READ ABSTRACT |

Certifiedmail Managed Service by DataMotion

February 2011 - (Free Research)
Schalleur, Devine & Surgent (SDS) is a mid‐sized Certified Public Accounting agency with over 30 employees comprised of CPAs and other certified professionals based in Devon, Pennsylvania. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly - 1 May 2012: The technology behind the England football team by ComputerWeekly.com

May 2012 - (Free Research)
This week's Computer Weekly examines how the Football Association's IT director is using technology to help improve the prospects for the England national team. Our Buyer's Guide to government IT looks at the future of open source in the public sector and we report from Infosec 2012 on the rising number of cyber attacks. Read the issue now. 
(EZINE)

Computer Weekly – 24 April 2012: Are CIOs earning credibility in the boardoom? by ComputerWeekly.com

April 2012 - (Free Research)
This week’s Computer Weekly examines research that suggests CEOs want to invest in IT more than ever, but still see CIOs as technical experts and not business people. We review SQL Server 2012 and ask if Microsoft's database software is catching its competitors as well as concluding our Buyer's Guide to data security. 
(EZINE)

The Private vs. Public Cloud by Panzura

June 2012 - (Free Research)
This presentation transcript with DeepStorage.net Chief Scientist Howard Marks explains the differences between private and public clouds and how cloud storage is a much more feasible, affordable option than you probably think. Read now to learn more. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Buyer's Checklist: Cloud gateway appliances by SearchStorage.com

November 2012 - (Free Research)
Cloud storage services often fit in best when used as a storage tier for nearline, archive or backup data. Cloud gateway appliances integrate easily and provide an easy on-ramp to cloud storage. In any of those scenarios, the essential element is a cloud gateway appliance that integrates on-site storage operations with cloud storage services. 
(EZINE) READ ABSTRACT |

Computer Weekly 11 October 2011: Download this week's issue of the UK's leading technology publication, featuring the latest news, analysis and opinion on the big trends in IT by ComputerWeekly.com

October 2011 - (Free Research)
In this week's Computer Weekly, we find out how mainframe technology that was meant to be dead and buried is finding innovative new applications. We analyse the challenges facing the government's largest deployment of agile software development, and our Buyer's Guide highlights the firms making the most of social media. Download the new issue now. 
(EZINE) READ ABSTRACT |

1 - 25 of 453 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts