Related AboutWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Related About returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Storage Management
 •   Enterprise Information Integration/ Metadata Management
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Virtualization
 •   Business Process Management (BPM)
 •   Email Archiving
 •   Business Intelligence Solutions
 •   Network Management
 •   Customer Relationship Management (CRM)

Related Searches
 •   Devices Related About
 •   Guidelines Related
 •   Intrastructures Related About
 •   Operational Related About
 •   Questions Related
 •   Related About Knowledge
 •   Related About Manuals
 •   Related About Objectives
 •   Related About Office
 •   Tracking Related
Advertisement

ALL RESULTS
1 - 25 of 487 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..
Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

The Network Evolution University: Next Generation Networks by SearchNetworking.com

November 09, 2011 - (Free Research)
In order to combat the ever-evolving challenges of today’s networks, it’s time to head back to school in our exclusive Network Evolution University – Featuring three distinct classes and nine progressive learning lessons that explore all there is to know about next generation networks and how to overcome the challenges they present. 
(VIRTUAL SEMINAR) READ ABSTRACT |

Information Governance Perspectives from RSD: E-mail Archiving by RSD

August 17, 2009 - (Free Research)
With the ever increasing compliance regulations in terms of E-mail archiving, It becomes clear that E-mail archiving is an information governance imperative. This paper presents the 3 technical challenges which should be understood when evaluating email archiving solutions 
(WHITE PAPER) READ ABSTRACT |

5 Things You Thought You Knew About Linux Virtualization by Red Hat

December 02, 2013 - (Free Research)
This video presentation discusses how IT can improve the decisions they make about Linux virtualization. 
(VIDEO) READ ABSTRACT |

CFO Executive Briefing: How confident are you about your company expenses? by Concur Technologies (E-mail this company)

April 01, 2014 - (Free Research)
Miscalculations, human error, and outdated software can all add extra zeros to your expenses bill. This resource explores the risks of errors related to travel and entertainment (T&E) spending, and offers insight to help CFOs cut costs and fuel success. 
(WHITE PAPER) READ ABSTRACT |

Re-architecting the Data Protection Process with Data Deduplication using Symantec Backup Exec and Data Domain (Podcast) by EMC Backup and Recovery Solutions

February 17, 2009 - (Free Research)
This podcast explores the changes in storage requirements and the efficiencies that can be achieved by deployment of new technologies as it relates to enterprise level backup and DR practices. 
(PODCAST) READ ABSTRACT |

Outbound Email and Content Security in Today's Enterprise by Proofpoint, Inc.

July 2008 - (Free Research)
Discover surprising statistics about how large companies manage the risks associated with outbound email. Read this report which summarizes the key findings from a survey of technology decision makers conducted by Proofpoint and Forrester Consulting. 
(WHITE PAPER) READ ABSTRACT |

Strategies for Controlling Email Risks with Declining Budgets by Proofpoint, Inc.

September 2009 - (Free Research)
Proofpoint CEO Gary Steele discusses today's email security landscape, including trends related to inbound spam and virus, data loss prevention, email encryption, email archiving and how SaaS email security solutions can greatly reduce costs while improving security. 
(VIDEO) READ ABSTRACT |

Security Best Practices for Developing Windows Azure Applications by Microsoft

November 2010 - (Free Research)
Are you a software designer, architect, developer or tester interested in secure cloud computing solutions?  Download this breakthrough paper focusing on the security challenges and recommended approaches to design and develop more secure applications for Microsoft's Windows Azure platform.  
(WHITE PAPER) READ ABSTRACT |

Customer Service is Not an Assembly Line - Retool your Service Experience with Dynamic Case Management by KANA (E-mail this company)

June 2012 - (Free Research)
Check out this informative webcast to understand how customer service and dynamic case management are related and how to build a strategy for both. 
(WEBCAST) READ ABSTRACT |

The Importance of Network Time Synchronization by Symmetricom

October 2009 - (Free Research)
This paper explains why accurate network time -- and therefore precise network time synchronization -- is critically important for network management. Read on to learn more about the importance of network time synchronization. 
(WHITE PAPER) READ ABSTRACT |

WatchGuard- Data Loss Prevention by WatchGuard Technologies, Inc.

November 2013 - (Free Research)
This infographic will help you learn critical information about data security and the challenges today’s business face when it comes to keeping data safe. 
(DATA SHEET) READ ABSTRACT |

OFCCP Compliance: Understanding the OFCCP's New Ruling on Internet Applicants by iCIMS

July 2008 - (Free Research)
The Internet Applicant final rule, issued by the Office of Federal Contract Compliance Programs (OFCCP), addresses recordkeeping by Federal contractors and subcontractors about the Internet hiring process and the solicitation of race. 
(WHITE PAPER) READ ABSTRACT |

Customer Satisfaction with Email Archiving Systems by Sunbelt Software

August 2008 - (Free Research)
Osterman Research surveyed organizations about a variety of email archiving systems to understand overall satisfaction of their current archiving system. The goal is to help decision makers in their archiving evaluation process. 
(WHITE PAPER) READ ABSTRACT |

IPv6 Transition Planning and Techniques for DNS and DHCP by Cisco Systems, Inc.

July 2011 - (Free Research)
Tune into this webcast which addresses common issues and concerns related to the transition to IPv6 and customers will learn about the following with respect to DNS and DHCP. 
(WEBCAST) READ ABSTRACT |

Five Truths About Enterprise Data Protection by PGP Corporation

December 2008 - (Free Research)
How can your business secure data that is always on the move? Read this paper to learn valuable information for securing your data with an enterprise-wide data encryption strategy. 
(WHITE PAPER) READ ABSTRACT |

THE SQL SERVER SECURITY THREAT — IT’S CLOSER THAN YOU THINK by Idera

January 2012 - (Free Research)
This white paper discusses the information security and compliance issues associated with Microsoft SQL Server database systems. Whether you’re a CSO, IT manager, internal auditor or database administrator, you'll learn about the database security threat, how compliance fits into the overall scheme and what you should do to minimize your risks. 
(WHITE PAPER) READ ABSTRACT |

Information Security Magazine Online July/August Issue – Demystifying APT: Get the facts about this targeted threat activity by Information Security Magazine

July 2010 - (Free Research)
The industry has preached the need for software security and secure coding for several years now. After all, if software is designed securely from the start, it means fewer problems down the road. Read this paper now to learn more. 
(WHITE PAPER) READ ABSTRACT |

How to better manage batch jobs in Oracle environments by UC4 Software, Inc

November 2011 - (Free Research)
In part one of this two-part e-guide series, readers will learn about the basics of batch technology and how it relates to business processes. In addition, learn how batch processing and business process automation are handled in Oracle-specific environments. 
(EGUIDE) READ ABSTRACT |

ASG-Rochade the Leading Metadata Repository by ASG Software Solutions

ASG-Rochade is a metadata management solution for large and medium-sized organizations. It is a strategic, facilitating technology that manages information about data and systems across your enterprise. 
(SOFTWARE PRODUCT)

Networking and Unified Communications Reference Guide by CDW Corporation

September 2009 - (Free Research)
CDW is committed to getting you everything you need to make the right purchasing decisions — from products and services to information about the latest technology. This reference guides is designed to provide you with an in-depth look at Networking and unified communications as they relate to the IT challenges your organization faces. 
(ESSENTIAL GUIDE) READ ABSTRACT |

User Directed Storage Management: How To Make Users Accountable For Responsible Storage Usage by Northern Parklife

February 2009 - (Free Research)
The accelerated pace of doing business in today's world puts organizations under tremendous pressure. They need to be fleet and flexible, able to rapidly respond to opportunities, make decisions, and deploy resources. Critical to this is the way information is managed and stored. 
(WHITE PAPER) READ ABSTRACT |

More Than a Vision: SAP's Perfect Plant in the Chemical Industry by SAP America, Inc.

August 2009 - (Free Research)
Find out what ARC has to say about SAP's progress towards turning the "perfect plant vision" into reality by leveraging the chemical industry value network. SAP is also well-aligned with ARC's thought leadership models related to collaborative manufacturing Management. 
(WHITE PAPER) READ ABSTRACT |

A Holistic View of Virtualization in the Data Center by Agilysys-Sun Technology Solutions

October 2008 - (Free Research)
Each type of virtualization - server, storage, desktop, application, and network - offers its own ROI. Learn about features and benefits of the five main types of virtualization to cater your virtualization strategy to your organization. 
(WEBCAST) READ ABSTRACT |

Troubleshooting the Blackberry Enterprise Solution by BlackBerry

January 2009 - (Free Research)
This webcast explains about five common troubleshooting areas, that is Enterprise Activation Issues, Mail delivery and latency Issues, Mobile Browsing Issues, PIM Synchronization Issues and Wireless Application Push Issues. 
(WEBCAST) READ ABSTRACT |

Outbound Email And Data Loss Prevention In Today's Enterprise, 2009 by Proofpoint, Inc.

August 2009 - (Free Research)
The convenience and ubiquity of email as a business communications tool has exposed enterprises to a wide variety of legal, financial and regulatory risks associated with outbound email. This report summarizes the findings of Proofpoint's sixth annual survey of enterprise attitudes about outbound email, content security and data protection. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 487 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts