Raiser S Edge SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Raiser S Edge Security returned the following results.
RSS What is RSS?
Related Categories

 •   Fund Management
 •   Nonprofit Organizations (Integrated)
 •   School/ Student Administration
 •   Fund Raising
 •   Alumni Management
 •   Course and Curriculum Management

Related Searches
 •   Comparing Raiser
 •   Finding Raiser
 •   Markets Raiser S
 •   Paper Raiser S
 •   Raiser Intranet
 •   Raiser S Edge Computerized
 •   Raiser S Edge Repairs
 •   Raiser S Facts
 •   Raiser S Iowa
 •   Raiser Scheduling
Advertisement

ALL RESULTS
1 - 25 of 470 | Next Page

The Education Edge: School Administration Software by Blackbaud

This complete solution was developed exclusively for school administrators to help effectively manage every aspect of school administration and student information. 
(SOFTWARE PRODUCT)

The Financial Edge™: Fund Accounting Software for Nonprofits by Blackbaud

The Financial Edge gives you all the information you need to make the best financial decisions for today and tomorrow. Think of it as insurance for your organization’s future. 
(ASP & SOFTWARE PRODUCT)

Presentation Transcript: Protecting Data on the Edge by Zenith Infotech

November 24, 2009 - (Free Research)
According to industry statistics, the majority of a typical company's data doesn't reside on data center storage -- it lives on the "edge." The edge may be desktop PCs, laptops or even smart phones and PDAs. In this transcript, W. Curtis Preston describes the most effective techniques, tools and best practices for protecting edge or mobile data. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Critical Need For Edge Data Protection by CommVault Systems, Inc.

January 31, 2012 - (Free Research)
This white paper highlights the challenges involved with protecting edge data. It also highlights a solution that is lightweight, easy-to-use, scalable and comprehensive. 
(WHITE PAPER) READ ABSTRACT |

Fortinet's Data Center Solution: Security From the Edge to the Core by Fortinet, Inc.

December 31, 2013 - (Free Research)
This white paper highlights the features and benefits of a security platform that defends the network core and edge to better protect data centers from today's latest risk factors. 
(WHITE PAPER) READ ABSTRACT |

The Critical Need for Edge Data Protection with Security, Access, and Control by CommVault Systems, Inc.

October 04, 2013 - (Free Research)
In this white paper, the challenges associated with safeguarding data and opening up universal access for distributed desktop and laptop systems residing at the edge of an organization's IT infrastructure are examined. 
(WHITE PAPER) READ ABSTRACT |

EdgePlatform for Application Acceleration and Delivery by Akamai Technologies

The Akamai EdgePlatform is a purpose built Application Delivery Network that accelerates delivery of applications and content over the Internet, which can lead to increased usage, adoption and improved productivity. 
(SOFTWARE PRODUCT)

THE CASE FOR ENDPOINT USER DATA PROTECTION by Cibecs

July 06, 2011 - (Free Research)
Cibecs is an automated data backup and recovery solution specifically developed for endpoint devices. Cibecs offers tangible operational benefits over and above the “insurance” benefit of quick and easy data recovery.C 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Choosing an edge switch: What to consider before you invest by NETGEAR Inc.

March 08, 2011 - (Free Research)
While edge switches may not be as powerful or expensive as 10GbE core switches, it is just as important to evaluate these products before investing. This e-guide details your options to help make your decision easier and discusses top considerations before you make an investment. 
(EGUIDE) READ ABSTRACT |

Unified Access and Optimization with F5 BIG-IP Edge Gateway by F5 Networks

November 15, 2013 - (Free Research)
This exclusive paper examines a gateway solution that integrates security, availability, and application acceleration services to enable context-aware networking, providing the unified access that today's mobile users need while keeping mobile data secure. 
(WHITE PAPER) READ ABSTRACT |

High-performance protection at the network edge—what, why and how by Sophos, Inc.

November 05, 2009 - (Free Research)
With more demands being put on lightweight network-edge hardware to provide security and connectivity, combining simplified malware detection with URI filtering can offer excellent proactive protection without overburdening the hardware or the administrator. 
(WHITE PAPER) READ ABSTRACT |

Tripwire VIA System State Intelligence executive brief by Tripwire, Inc.

September 28, 2012 - (Free Research)
What's missing from today's approach to IT security is real-time security intelligence that immediately shows you when you have a security problem, what caused it and what to do about it. This white paper reveals how you can easily utilize cutting-edge technologies to take the guesswork out of identifying the activity that needs your attention. 
(WHITE PAPER) READ ABSTRACT |

451 Group Report on Federation Gateway Market & Cloud Access 360 by Intel

March 08, 2011 - (Free Research)
In this Market Insight Report, 451 Group Steve Coplan provides a comprehensive independent review of the Intel Expressway Cloud Access 360 federation gateway. Steve covers how Intel’s acquisition of Nordic Edge plays into Intel’s latest moves in the security sector. 
(ANALYST REPORT) READ ABSTRACT |

A Peer Survey: Desktop Virtualization Separating the Hype from Reality by Dell Software

June 28, 2011 - (Free Research)
Organizations are looking to desktop virtualization for improved productivity, security and easier management. Cut through the hype – and get to the facts – in this white paper from IT Business Edge and Quest Software. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 13 May 2014: Retail's data challenge by ComputerWeekly.com

May 12, 2014 - (Free Research)
In this week's Computer Weekly, we look at how data analytics is driving a new approach to customer relationship management within the retail sector. Customer who shops in multiple channels offer greater value to retailers. We find out how auction site eBay has developed a bespoke data analytics architecture to track every customer interaction. 
(EZINE) READ ABSTRACT |

Information Security Magazine – June 2010: Laptop Lockdown by Information Security Magazine

June 16, 2010 - (Free Research)
This month’s cover story is on useful and affordable encryption options for preventing data loss in your organization’s riskiest endpoints. Other articles in this issue cover cloud security, Symantec’s recent acquisitions, compliance management, and a debate over hiring convicted hackers. Read these great articles and more in this month’s issue. 
(EZINE)

Windows Server 2012 Security from End to Edge and Beyond by ComputerWeekly.com

September 02, 2013 - (Free Research)
This extract from the book Windows Server 2012 Security from End to Edge and Beyond shows you how to plan your platform security requirements and gives you the critical questions to ask. 
(BOOK) READ ABSTRACT |

Windows Azure Platform Security Essentials: Module 1 - Security Architecture by Microsoft

December 16, 2010 - (Free Research)
In this video module, Graham Calladine, Security Architect with Microsoft Services partners with the Security Talk Series to describe the security features of the Windows Azure platform, resources available to protect applications and data running on the Microsoft cloud and SQL Azure security and authentication options. 
(WEBCAST) READ ABSTRACT |

Windows Azure Platform Security Essentials for Technical Decision Makers by Microsoft

December 01, 2010 - (Free Research)
In this video, Graham Calladine, Security Architect with Microsoft Services, answers the most common security concerns CxOs and other technical decision-makers have regarding the security of their data in Windows Azure cloud platform. 
(WEBCAST) READ ABSTRACT |

VMware’s Approach: Enabling the Journey to Your Cloud by VMware, Inc.

May 23, 2011 - (Free Research)
Cloud computing can provide a more efficient, cost-effective way for companies to meet business needs. Find out about a virtualization approach that can help you tailor your cloud model for improved business agility and responsiveness. 
(VIDEO) READ ABSTRACT |

Cisco Catalyst 2950 Series Switches with Enhanced Image SW by Cisco Systems, Inc.

The Cisco Catalyst 2950 Series switches offer enhanced data security through a wide range of security features. 
(HARDWARE PRODUCT)

Protecting Data at the Edge More Effectively by CommVault Systems, Inc.

December 31, 2013 - (Free Research)
Access this resource to discover a platform that manages and protects all of your data, no matter where it may be in today's fluid business environment. 
(WHITE PAPER) READ ABSTRACT |

Extending Next Generation Firewalls – Security Leaders must Address Threats from Rising SSL Traffic by Fortinet, Inc.

March 18, 2014 - (Free Research)
This exclusive paper discusses the next generation firewall, examining its market drivers, critical requirements and how it is extending to respond to the ever-changing needs of the modern enterprise. 
(WHITE PAPER) READ ABSTRACT |

Identity-Centric Security: Enabling and Protecting the Business by CA Technologies.

May 31, 2013 - (Free Research)
Discover why the enterprise perimeter as we know it is dissolving and how your users are taking its place – creating numerous security issues for your IT department. In addition, learn how identity-centric security can help you protect data and maintain compliance in this new enterprise model. 
(WHITE PAPER) READ ABSTRACT |

Protecting Essential Information: Securing the Foundation of the Internet Business Platform by Websense, Inc.

July 2008 - (Free Research)
Today's threats use Web 2.0 to integrate daily operations which has changed the requirements for web security, email security and data loss prevention. Download this white paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 470 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts