Related AboutWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Related About returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Enterprise Information Integration/ Metadata Management
 •   Business Process Management (BPM)
 •   Endpoint Security
 •   Virtualization
 •   Storage Management
 •   Customer Relationship Management (CRM)
 •   Application Security
 •   Email Archiving

Related Searches
 •   Info About Related
 •   Note Related
 •   Related About Claims
 •   Related About Downloads
 •   Related About Monitor
 •   Related About New Mexico
 •   Related Framework
 •   Related Procedure
 •   Rfi Related
 •   Web Casts Related
Advertisement

ALL RESULTS
1 - 25 of 488 | Next Page

How To Avoid Heartbleed Or Similar SSL Related Vulnerabilities? by i-Sprint Innovations (E-mail this company)

May 29, 2014 - (Free Research)
This informative guide explores top strategies for resolving Heartbleed and similar SSL-related vulnerabilities. 
(WHITE PAPER) READ ABSTRACT |

Information Governance Perspectives from RSD: E-mail Archiving by RSD

August 17, 2009 - (Free Research)
With the ever increasing compliance regulations in terms of E-mail archiving, It becomes clear that E-mail archiving is an information governance imperative. This paper presents the 3 technical challenges which should be understood when evaluating email archiving solutions 
(WHITE PAPER) READ ABSTRACT |

5 Things You Thought You Knew About Linux Virtualization by Red Hat

December 02, 2013 - (Free Research)
This video presentation discusses how IT can improve the decisions they make about Linux virtualization. 
(VIDEO) READ ABSTRACT |

The Network Evolution University: Next Generation Networks by SearchNetworking.com

November 09, 2011 - (Free Research)
In order to combat the ever-evolving challenges of today’s networks, it’s time to head back to school in our exclusive Network Evolution University – Featuring three distinct classes and nine progressive learning lessons that explore all there is to know about next generation networks and how to overcome the challenges they present. 
(VIRTUAL SEMINAR) READ ABSTRACT |

Customer Service is Not an Assembly Line - Retool your Service Experience with Dynamic Case Management by KANA (E-mail this company)

June 22, 2012 - (Free Research)
Check out this informative webcast to understand how customer service and dynamic case management are related and how to build a strategy for both. 
(WEBCAST) READ ABSTRACT |

The Importance of Network Time Synchronization by Symmetricom

October 20, 2009 - (Free Research)
This paper explains why accurate network time -- and therefore precise network time synchronization -- is critically important for network management. Read on to learn more about the importance of network time synchronization. 
(WHITE PAPER) READ ABSTRACT |

WatchGuard- Data Loss Prevention by WatchGuard Technologies, Inc.

November 04, 2013 - (Free Research)
This infographic will help you learn critical information about data security and the challenges today’s business face when it comes to keeping data safe. 
(DATA SHEET) READ ABSTRACT |

Re-architecting the Data Protection Process with Data Deduplication using Symantec Backup Exec and Data Domain (Podcast) by EMC Backup and Recovery Solutions

February 17, 2009 - (Free Research)
This podcast explores the changes in storage requirements and the efficiencies that can be achieved by deployment of new technologies as it relates to enterprise level backup and DR practices. 
(PODCAST) READ ABSTRACT |

Outbound Email and Content Security in Today's Enterprise by Proofpoint, Inc.

July 2008 - (Free Research)
Discover surprising statistics about how large companies manage the risks associated with outbound email. Read this report which summarizes the key findings from a survey of technology decision makers conducted by Proofpoint and Forrester Consulting. 
(WHITE PAPER) READ ABSTRACT |

Strategies for Controlling Email Risks with Declining Budgets by Proofpoint, Inc.

September 2009 - (Free Research)
Proofpoint CEO Gary Steele discusses today's email security landscape, including trends related to inbound spam and virus, data loss prevention, email encryption, email archiving and how SaaS email security solutions can greatly reduce costs while improving security. 
(VIDEO) READ ABSTRACT |

Security Best Practices for Developing Windows Azure Applications by Microsoft

November 2010 - (Free Research)
Are you a software designer, architect, developer or tester interested in secure cloud computing solutions?  Download this breakthrough paper focusing on the security challenges and recommended approaches to design and develop more secure applications for Microsoft's Windows Azure platform.  
(WHITE PAPER) READ ABSTRACT |

Best Practices for Leveraging Automation in Your Windows 7 and Virtual Desktop Migrations by SearchDataCenter.com

March 2012 - (Free Research)
In this webcast discussion learn about the latest trends in Windows 7 migrations and desktop virtualization. The speakers also address issues around application compatibility, testing and remediation and cloud computing - as they relate to Windows 7 and desktop virtualization implementations. 
(WEBCAST) READ ABSTRACT |

Server hardware for a scalable virtual infrastructure by TechTarget

March 2014 - (Free Research)
Take two minutes to let us know how IT pros really view the server hardware market so the SearchDataCenter.com editorial team can report the facts and reveal the misconceptions, and by doing so, gain exclusive access to our exclusive server hardware buyer's guide. 
(RESOURCE)

Gartner: What CIOs should know about cloud‑based customer service by ComputerWeekly.com

November 2013 - (Free Research)
IT leaders and managers of customer support need to understand the limits of cloud-based CRM customer service and support software solutions, writes Michael Maoz, vice-president and distinguished analyst at Gartner. 
(ANALYST BRIEF) READ ABSTRACT |

CW+ Roundtable: IT fights back to deliver business-related benefits by ComputerWeekly.com

July 2010 - (Free Research)
There is no question that the past two financial years have been tough – IT budgets have been cut and IT managers have been under pressure to deliver more for less. But attitudes are changing, things are looking up and there’s a renewed sense of optimism within IT departments. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Mission-critical Unix Considerations by HP & Intel®

July 2011 - (Free Research)
Unix remains an important platform for critical enterprise applications. This resource explores the staying power of this venerable operating system and details many of the emerging factors that are affecting its use in the data center. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Channel Strategies E-Zine - June 2010/ No.2 by SearchITChannel.com

July 2010 - (Free Research)
For organizations who are patient and willing to follow the rules, the payoff from cashing in on the 2009 American Recovery and Reinvestment Act (ARRA) can be big. Check out this E-Zine to read about how to use the stimulus to your advantage, ROI and green IT, and more. 
(EZINE)

CIO Strategies for Consumerization: The Future of Enterprise Mobile Computing by Dell, Inc. and Microsoft

August 2011 - (Free Research)
Access this paper to learn about five trends that are shaping the future of enterprise mobility, and get nine recommendations for the new era of enterprise mobility. Finally, learn how Dell is uniquely prepared to help customers embrace and manage consumerization and the challenges and risks that come with consumerization-related changes. 
(WHITE PAPER) READ ABSTRACT |

Email Archiving: Common Myths and Misconceptions by Dell India

January 2009 - (Free Research)
This white paper explores 5 common myths about email archiving, and provides guidance and solutions to solving email management and archiving issues. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Which Virtualization Management Tool Is Right For Your Organization? by Dell and VMware

June 2009 - (Free Research)
In this informative Pocket Guide, brought to you by SearchServerVirtualization.com, Dell and VMware, learn more about the virtual management tools on the market and their functionality. Discover which product capabilities organizations should consider when evaluating virtual infrastructure management technologies. 
(EGUIDE) READ ABSTRACT |

Avoiding Data Quality Failure: Identifying Data Quality by Pitney Bowes Business Insight

March 2008 - (Free Research)
This presentation transcript features speaker Evan Levy, partner and co-founder of Baseline Consulting, a professional services firm concentrating on enterprise data issues. This discussion is about data quality and some of the challenges and pitfalls that are seen during data quality implementation. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Five Truths About Enterprise Data Protection by PGP Corporation

December 2008 - (Free Research)
How can your business secure data that is always on the move? Read this paper to learn valuable information for securing your data with an enterprise-wide data encryption strategy. 
(WHITE PAPER) READ ABSTRACT |

THE SQL SERVER SECURITY THREAT — IT’S CLOSER THAN YOU THINK by Idera

January 2012 - (Free Research)
This white paper discusses the information security and compliance issues associated with Microsoft SQL Server database systems. Whether you’re a CSO, IT manager, internal auditor or database administrator, you'll learn about the database security threat, how compliance fits into the overall scheme and what you should do to minimize your risks. 
(WHITE PAPER) READ ABSTRACT |

Information Security Magazine Online July/August Issue – Demystifying APT: Get the facts about this targeted threat activity by Information Security Magazine

July 2010 - (Free Research)
The industry has preached the need for software security and secure coding for several years now. After all, if software is designed securely from the start, it means fewer problems down the road. Read this paper now to learn more. 
(WHITE PAPER) READ ABSTRACT |

OFCCP Compliance: Understanding the OFCCP's New Ruling on Internet Applicants by iCIMS

July 2008 - (Free Research)
The Internet Applicant final rule, issued by the Office of Federal Contract Compliance Programs (OFCCP), addresses recordkeeping by Federal contractors and subcontractors about the Internet hiring process and the solicitation of race. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 488 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts