Purchasing Security Privacy AndWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Purchasing Security Privacy And returned the following results.
RSS What is RSS?
Related Categories

 •   Enterprise Data Protection and Privacy
 •   Data Security
 •   Security Policies
 •   Storage Management
 •   Network Security
 •   Storage Security
 •   Application Security
 •   Backup Systems and Services
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Endpoint Security

Related Searches
 •   Computing Purchasing
 •   Purchasing Security Designer
 •   Purchasing Security Events
 •   Purchasing Security Kansas
 •   Purchasing Security Making
 •   Purchasing Security Privacy Based
 •   Purchasing Security Privacy File
 •   Purchasing Security Privacy Maintenance
 •   Purchasing Security Privacy Webcasts
 •   Purchasing Security Screen
Advertisement

ALL RESULTS
1 - 25 of 451 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

ESG Analyst Report: “Changing the Way You Purchase Storage” by NetApp

August 25, 2010 - (Free Research)
This ESG white paper discusses the key criteria you need to consider before making your next IT investment and why it’s time to modernize your approach to storage. 
(WHITE PAPER) READ ABSTRACT |

The State of Privacy and Data Security Compliance by Sophos, Inc.

November 30, 2009 - (Free Research)
The purpose of the study is to determine if various international, federal and state data security laws improve an organization’s security posture. What is the value of compliance and does it correlate with the value of the compliance effort? Read on to find out. 
(ANALYST REPORT) READ ABSTRACT |

Why Managing Mobility Matters by SAP America, Inc.

January 05, 2011 - (Free Research)
Mobile devices continue to be purchased in record numbers, pouring into the organization. These devices are coming in a wide variety of hardware and operating system types, making their management and security a big IT challenge. This IDG Playbook is designed to help guide your strategy to manage and secure the booming mobile environment. 
(WHITE PAPER) READ ABSTRACT |

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc.

The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. 
(HARDWARE PRODUCT)

CW Buyers Guide To Finance and Insurance by ComputerWeekly.com

February 04, 2014 - (Free Research)
This 11-page buyer's guide looks at mitigating the risks of data breaches with liability insurance; how to finance your organisation's technology platforms; and funding software investment for the economic recovery while budgets remain tight. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Buyer’s Guide to Antimalware by Panda Security

October 27, 2009 - (Free Research)
Companies face complicated buying decisions when it comes to buying host-based antimalware. Should you purchase a protection suite? What should you include in that all-in-one package? Read this guide for helpful information about purchasing antimalware products. 
(EGUIDE) READ ABSTRACT |

Oracle Database 11g Application Development by Oracle Corporation

June 2007 - (Free Research)
Application development organizations have a wide variety of programming languages and technologies to choose from. In this white paper learn how Oracle Database 11g delivers a highly productive and powerful set of application development tools. 
(WHITE PAPER) READ ABSTRACT |

Enabling Enterprise Mobility: Transform the Mobile Computing Environment by Hewlett-Packard Company

September 2011 - (Free Research)
Read this paper to uncover best practices for a three-step mobile management strategy that looks at: foundational enterprise-wide policies around security, privacy, and end-user computing; the collaboration infrastructure that  needs to be established; and the required end-to-end architectural decisions, application, and infrastructure models. 
(WHITE PAPER) READ ABSTRACT |

eGuide: Information Security - Buyer's Guide to Messaging Security by SearchSecurity.com

November 2009 - (Free Research)
Protecting messaging services is an important part of any business messaging strategy. Vulnerabilities abound when you allow messaging traffic for delivery over the Internet. The scope of this guide will focus on email security although many of these concepts will also apply to other types of messaging. 
(EGUIDE) READ ABSTRACT |

Understanding and Selecting a Database Assessment Solution by Application Security, Inc.

February 2010 - (Free Research)
In this analyst report, Securosis’ Adrian Lane explores the inner workings of assessment tools and the business value they provide, and will make specific recommendations on evaluating, purchasing, and deploying Database Assessment. 
(ANALYST REPORT) READ ABSTRACT |

Information Security Magazine – December 2010: Understanding the Data Accountability and Trust Act by Information Security Magazine

December 2010 - (Free Research)
This month’s issue of Information Security magazine takes you deep inside the Data Accountability And Trust Act (DATA), pending legislation that could reshape the national privacy landscape and impact the way enterprises and midmarket companies architect their security operations. 
(EZINE)

Oracle Accelerate - Not Just Smart but Timely by Oracle Corporation

March 2009 - (Free Research)
This paper gives you an overview of how Ovum has helped penetrate the upper-midmarket. Even when the slowing growth of the market hasn't. 
(WHITE PAPER) READ ABSTRACT |

A Guide to Data Privacy for Business and IT Executives by IntraLinks, Inc

December 2013 - (Free Research)
This white paper explains the latest global government efforts in enforcing stronger data privacy laws. Click now to uncover 6 data protection recommendations to help you mitigate the risks of information sharing and prevent regulatory and market sanctions. 
(WHITE PAPER) READ ABSTRACT |

e-Zine: Purchasing Considerations for Exchange 2010 by Dell and Microsoft

April 2012 - (Free Research)
Find out why now is the best time to migrate to Exchange 2010 in this expert e-zine. Plus, discover how to cost-effectively meet the hardware and performance demands of this latest upgrade. 
(EZINE)

Taking the fear out of bringing Government Systems online by IBM

July 2012 - (Free Research)
People are quickly navigating to a more mobile environment and many individuals are urging government agencies to develop online services. In the past, certain aspects of online sharing have caused government agencies to hesitate, but this white paper helps outline some of the benefits of online systems. 
(WHITE PAPER) READ ABSTRACT |

ForwardView: Four Areas of Security Vital to Business Health by IBM

November 2008 - (Free Research)
Identifying areas of vulnerability can be increasingly challenging for small to mid-size businesses, but there are four areas – privacy, compliance, risk management and overall security capabilities – where information security is vital to business and profitability. 
(WHITE PAPER) READ ABSTRACT |

Enterprise Data Services in SOA using ODI Suite by Oracle Corporation

February 2009 - (Free Research)
This whitepaper will demonstrate why Data Services are a foundation requirement for enterprise SOA deployments by describing just how valuable, and complex, business data is for the businesses that rely on it. 
(WHITE PAPER) READ ABSTRACT |

Solution Brief: The Top Four Business Risks of Social Media by BlueCoat

September 2011 - (Free Research)
Social networks are changing the way people interact, communicate, form opinions, and purchase. And businesses must support social media to drive their business. However, this medium can also pose new security risks. View now to explore the top four risks of social networking and discover various ways to protect against and mitigate these risks. 
(WHITE PAPER) READ ABSTRACT |

Information Security Magazine: May 2010 - Data: Do you know where it’s going? by Information Security Magazine

May 2010 - (Free Research)
This month’s cover story deals with database activity monitoring and how to keep vigilant watch over your data. Other features cover new stealthy and sophisticated malware that aims at hijacking business banking accounts and Windows 7 operating system security improvements. Read on and take a look at all three featured articles and much more. 
(EZINE)

Data Security and Governance best practices for 2012 by Advent Global Solutions Inc.

December 2011 - (Free Research)
This extensive e-guide focuses on how to remain up to speed with data security and governance programs for your growing enterprise. 
(EGUIDE) READ ABSTRACT |

The Hidden Costs of Microsoft® BitLocker®: White Paper by WinMagic

August 2011 - (Free Research)
This paper explores the issues that you may or may have not known about Microsoft BitLocker. View now to explore enterprise mobile security considerations that will help you make educated decisions on what’s best for your business. 
(WHITE PAPER) READ ABSTRACT |

Magic Quadrant for Mobile Data Protection by Sophos, Inc.

April 2011 - (Free Research)
This Magic Quadrant is a snapshot of the overall market that ranks vendors against each other, according to competitive criteria. Vendors in any quadrant, as well as those not ranked on the Magic Quadrant, may be appropriate for your enterprise's needs and budget. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: IT Decision Checklist: SIMs and Log Management by Tripwire, Inc.

April 2010 - (Free Research)
Security information management systems are effective platforms for the collection, analysis and storage of events from a broad range of systems and devices. We’ll outline what you should look for to get the most relevant data from SIMs. Read this paper to find out more. 
(EGUIDE) READ ABSTRACT |

NetApp Storage Efficiency Guide by NetApp

February 2012 - (Free Research)
While IT managers wrestle with budget concerns and IT purchasing decisions, data continues to grow day by day, causing data proliferation. This resource presents best practices you can use to your advantage in order to attack the problems related to data proliferation. 
(WHITE PAPER)

Global Sourcing Trends in 2012 by ComputerWeekly.com

March 2012 - (Free Research)
The latest IT outsourcing trends from global law firm Morrison & Foerster. 
(IT BRIEFING) READ ABSTRACT |

1 - 25 of 451 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts