Research Topics Enterprise Network SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Research Topics Enterprise Network Security returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Wireless Technologies and Mobile Computing
 •   Network Security
 •   Wireless Security
 •   Mobile Device Management
 •   Virtualization
 •   Laptops/ Notebooks/ Tablet PCs
 •   Security Policies
 •   Security Monitoring
 •   Application Security

Related Searches
 •   Lists Research Topics Enterprise
 •   Projects Research Topics Enterprise
 •   Research Patent
 •   Research Production
 •   Research Reporting
 •   Research Topics Buying
 •   Research Topics Enterprise Articles
 •   Research Topics Enterprise Rfq
 •   Research Topics Full
 •   Starting Research Topics Enterprise
Advertisement

ALL RESULTS
1 - 25 of 467 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

eBook - The Mobile Enterprise: Taking Wireless Networking to the Next Level by SearchMobileComputing

September 10, 2009 - (Free Research)
Read this eBook to learn how faster, more robust 802.11n WLANs can help your business offer new mobility services to improve mobility and reduce cost through fixed-mobile convergence. Discover how unified communications applications can exploit wireless mobile connectivity to facilitate workforce collaboration and enhance productivity. 
(EBOOK) READ ABSTRACT |

The Network Evolution University: Next Generation Networks by SearchNetworking.com

November 09, 2011 - (Free Research)
In order to combat the ever-evolving challenges of today’s networks, it’s time to head back to school in our exclusive Network Evolution University – Featuring three distinct classes and nine progressive learning lessons that explore all there is to know about next generation networks and how to overcome the challenges they present. 
(VIRTUAL SEMINAR) READ ABSTRACT |

International Mobile Security: Survey Research Highlights and Considerations for Enterprise IT by Cisco (E-mail this company)

December 31, 2013 - (Free Research)
This informative whitepaper explores the role of network security in an increasingly mobile workplace and what you can do to enhance employee productivity. 
(WHITE PAPER) READ ABSTRACT |

Perceptions about Network Security: Ponemon research by Juniper Networks, Inc.

February 01, 2012 - (Free Research)
Ponemon Institute conducted a survey of over a thousand IT and IT security practitioners across Europe, studying their perspectives about the current threat landscape and what they believe the most effective strategies for keeping networks safe include. Uncover key findings and leverage this knowledge to build the right strategy for your business. 
(ANALYST REPORT) READ ABSTRACT |

Outbound Email And Data Loss Prevention In Today's Enterprise, 2009 by Proofpoint, Inc.

August 11, 2009 - (Free Research)
The convenience and ubiquity of email as a business communications tool has exposed enterprises to a wide variety of legal, financial and regulatory risks associated with outbound email. This report summarizes the findings of Proofpoint's sixth annual survey of enterprise attitudes about outbound email, content security and data protection. 
(WHITE PAPER) READ ABSTRACT |

When Advanced Persistent Threats Go Mainstream by EMC Corporation

August 15, 2011 - (Free Research)
The threat landscape is evolving and a new breed of sophisticated cyber attacks have emerged – APT. APT is highly targeted, thoroughly researched, amply funded, and difficult to detect. This report offers expert insight from information security leaders on APT, risks and defensive measures you can take against escalating threats. 
(ANALYST REPORT) READ ABSTRACT |

Tackling Today’s Networking Challenges: How to Reduce the Risk and Protect Your Network from Security Vulnerabilities by HP and Intel

September 09, 2011 - (Free Research)
This webinar presents important ways IT pros can protect their networks from security vulnerabilities. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Workshifting: A global market research report by Citrix

June 21, 2012 - (Free Research)
This market research report provides insight into the key drivers behind the trends of workshifting, IT consumerisation and Bring Your Own Device (BYOD). Discover how businesses are gaining tangible benefits from a more mobile and flexible workforce. 
(WHITE PAPER) READ ABSTRACT |

Workshifting: a global market research report by Citrix

June 21, 2012 - (Free Research)
This market research report provides insight into the key drivers behind the trends of workshifting, IT consumerisation and Bring Your Own Device (BYOD). Discover how businesses are gaining tangible benefits from a more mobile and flexible workforce. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Mobile Strategies, Part 1: Harnessing the IT Consumerization Deluge by Dell, Inc. and Intel®

January 25, 2012 - (Free Research)
This presentation transcript reveals key findings from a recent consumerisation poll and provides recommendations and best practices to help organisations address these key topics. Obtain predictions for the future of the media tablet market and gain insight into five trends that are shaping the consumerisation landscape. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Data Management & Architecture by Accenture

Accenture's Data Management & Architecture group addresses how an organization manages data across its entire lifecycle. 
(SOFTWARE PRODUCT)

May 2013 Pulse E-Zine by SearchHealthIT.com

May 15, 2013 - (Free Research)
The quarterly Pulse e-zine delves into a range of issues affecting hospitals, doctors, payers, policymakers and other industry stakeholders. Explore the hottest topics that impact IT decision makers today and gain knowledge from peers through snapshots of trends, SearchHealthIT industry research and our on-location conference coverage. 
(EZINE) READ ABSTRACT |

Understanding High Availability for the BlackBerry Enterprise Server by BlackBerry

August 06, 2009 - (Free Research)
Read this technical white paper to learn about the evolution of mobile devices and the introduction of high availability in a mobile context. Also learn about the Blackberry as well as load balancing, failover thresholds, and limited downtime upgrades. 
(WHITE PAPER) READ ABSTRACT |

CIO2CIO Global Research Study: Business Intelligence and Master Data Management (MDM) by SAP America, Inc.

July 1967 - (Free Research)
This global CIO2CIO research program was conducted for SAP, Inc. to gain insight into information management practices in various regions of the world and the research was conducted among IT professionals in the U.S., Europe and Asia. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly 25 October 2011: Read this week's issue of the UK's leading technology publication, with news, analysis and opinion on the topics that matter to IT managers by ComputerWeekly.com

October 2011 - (Free Research)
In this week's Computer Weekly, we ask IT experts to help answer the question of why so many big IT projects fail. We report from VMware's user conference in Copenhagen on the latest developments in virtualisation, and analyse the emerging threat from military-style cyber attacks on corporate IT networks. Download the new issue now. 
(EZINE)

Enterprise PC Backup: The New Fundamentals by Copiun

March 2011 - (Free Research)
This presentation transcript from Copiun, focuses on a conversation between Rachel Dines, Analyst at Forrester Research and Puneesh Chaudhry, CEO of Copiun. The main topic discussed is Enterprise PC backup solutions and how these types of solutions can positively affect your everyday business operations. Read on to learn more. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Killing Data by Voltage Security, Inc.

February 2012 - (Free Research)
Traditional perimeter-based security controls are no longer effective as today’s threat landscape continues to evolve and cybercriminals become more skillful and advanced. This Forrester Research resource examines how encrypting data – both in motion and at rest – is a more effective way to keep up with determined cybercriminals. 
(WHITE PAPER) READ ABSTRACT |

Roundup of Business Intelligence and Information Management Research, 1Q08 by Actuate

July 2008 - (Free Research)
This document provides a roundup of 1Q08 (and some earlier) research and toolkits for IT leaders on the topic of business intelligence (BI) and information management. 
(WHITE PAPER) READ ABSTRACT |

IDC white paper: Better Identity and Access Management in the Age of Cloud Computing by Ping Identity Corporation

August 2012 - (Free Research)
In this Q&A session, get the answers to your top identity and access management questions to learn how to achieve better IAM in the age of cloud computing. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Cloud Service Delivery Models - Security Risks and Recommendations by SecureWorks

August 2011 - (Free Research)
This presentation transcript examines how different levels of isolation and multi-tenancy in cloud models introduce different risks to organizations leveraging cloud services. We also discuss what organizations can do to address these risks and we recommend ways to deliver an improved security posture to organizations utilizing cloud services. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Implementing Breakthrough Technology for Clinical Development Modeling and Simulation by Univa UD

April 2008 - (Free Research)
When GlaxoSmithKline was challenged with improving efficiency in modeling and simulation, their clinical development research team turned to Univa technology for faster methods of establishing and running models for a drug’s effects on the body. 
(CASE STUDY) READ ABSTRACT |

The Customer You Know: Keeping, Leveraging, and Profiting from Current Customers with Business Analytics by SAS

May 2010 - (Free Research)
Read this paper to learn about business analytics and how it can significantly impact customer service improvements and customer retention and how it can enable your company to develop more agile strategies that will allow you to adapt to changing customer behavior and achieve their business goals. 
(ANALYST REPORT) READ ABSTRACT |

Salary Report: Trends in IT Compensation and Certifications by Global Knowledge Network, Inc.

May 2006 - (Free Research)
Global Knowledge keeps up to date with trends in IT careers, certifications, and compensation. In this, our inaugural quarterly report, we offer a look at salaries for the top 25 IT jobs, organized by region. We also offer a look at the top certifications and in-depth analysis from our resident market research analyst. 
(ANALYST REPORT) READ ABSTRACT |

UK IT priorities 2012 by ComputerWeekly.com

August 2012 - (Free Research)
This exclusive Computer Weekly research reveals how UK IT departments are prioritising their budgets in 2012, which technologies they are investing in, and the impact of cloud computing, mobile and other disruptive technology on their IT strategies. 
(IT BRIEFING) READ ABSTRACT |

Information Security Magazine, May 2009: Automating Compliance by Information Security Magazine

May 2009 - (Free Research)
This month's cover story is on Automatic Compliance. The weight of regulatory compliance can break the back of your IT operation. Automation can help you gear up for your next audit. We'll also cover new technologies for identity and access management, IDS vs. IPS, and more. 
(EZINE)

1 - 25 of 467 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts