Research About Summary FederatedWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Research About Summary Federated returned the following results.
RSS What is RSS?
Related Categories

 •   Network Security
 •   Business Intelligence Solutions
 •   Data Security
 •   Virtualization
 •   Security Policies
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Authentication / Password Management
 •   Mobile Device Management
 •   Application Security

Related Searches
 •   Improvements Research About Summary
 •   Note Research
 •   Offices Research About
 •   Operate Research About
 •   Outsource Research About
 •   Productivity Research About
 •   Research About Strategic
 •   Research About Summary California
 •   Research About Summary Operational
 •   Research Implementing
Advertisement

ALL RESULTS
1 - 25 of 465 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

How to tackle identity management and federated identity by ComputerWeekly.com

November 09, 2010 - (Free Research)
The majority of user authentication schemes today still use userid and password. The burden to users of managing large numbers of userids and passwords has led to proposals for Federated Identity systems, where a single set of credentials can be used to authenticate with several organisations, which have agreed to work together as a federation. 
(WHITE PAPER) READ ABSTRACT |

2013 Cyber Risk Report Executive Summary by Hewlett-Packard Company

February 28, 2014 - (Free Research)
This informative whitepaper reviews the threat landscape of 2013 and outlines the most troublesome risks coming your way in 2014. 
(WHITE PAPER) READ ABSTRACT |

Research Summary: Network Management Megatrends 2012 by EMC Corporation

June 04, 2012 - (Free Research)
Uncover details of three of the top network management megatrends of 2012, the effect they can have on your network, and why network managers are re-assessing the tools, technologies, and practices they currently use. 
(WHITE PAPER) READ ABSTRACT |

Executive Summary: Marketing and Demand Creation in B2B Marketplace: The Prospect's View by KnowledgeStorm Webinars (E-mail this company)

June 2006 - (Free Research)
SiriusDecisions has commissioned a new research study to examine the efficacy of demand creation - from the point of view of prospects and customers you are spending millions of dollars to communicate with. Read this executive summary of our Demand Creation webinar to find out which tactics are viewed most favorably in b-to-b marketplace. 
(CASE STUDY) READ ABSTRACT |

2014 IT Budget Benchmark by ComputerWeekly.com

November 2013 - (Free Research)
IT spending will grow  by 3% in 2014 but this hides a significant growth in shadow IT spending by other parts of the business, the CEB 2014 IT Budget Benchmark reveals. 
(IT BRIEFING) READ ABSTRACT |

CRM Buyer’s Guide – 2011 Edition by SearchCRM

June 2011 - (Free Research)
Welcome to SearchCRM.com’s Buyer’s Guide. This directory was designed to be a valuable resource for those getting started with research or evaluating vendors in the CRM market. 
(EBOOK)

Assured Federated Records Management - Achieving Compliance across the Enterprise by EMC Corporation

March 2008 - (Free Research)
Compliance is now a major issue for organizations and they're beginning to rethink their records management strategies. Read this white paper to learn about a records management solution that effectively addresses all of the needs required for this task. 
(WHITE PAPER) READ ABSTRACT |

Delivering on high cloud expectations by ComputerWeekly.com

March 2012 - (Free Research)
Many firms are now planning to run mission critical workloads on public cloud, according to this research from Forrester and BMC. 
(ESSENTIAL GUIDE) READ ABSTRACT |

America's Quest for IPv6 - Part II: An Analysis of the Business and Financial Metrics of the Coming IPv6 Marketplace by Command Information

June 2008 - (Free Research)
the transition to IPv6 is very much on its way to becoming a viable, profitable market. This white paper this conclusion with some attention grabbing highlights... 
(WHITE PAPER) READ ABSTRACT |

Federating Architectures For BI Professionals by Composite Software

December 2011 - (Free Research)
In this BeyeNETWORK e-book, data warehousing expert Wayne Eckerson describes how to create a federated business intelligence (BI) architecture that aligns with organizational imperatives. 
(EBOOK)

Network Purchasing Intentions 2013 by ComputerWeekly.com

December 2013 - (Free Research)
This exclusive Computer Weekly/TechTarget research ,based on a survey of over 400 European IT professionals, reveals organisations’ investment plans for networking technology. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Creating a Dynamic Information Infrastructure by IBM

September 2009 - (Free Research)
Discussions with customers and research into vendor offerings are the basis of this white paper. It prescribes a customer transformation roadmap, profiles two customers’ information infrastructure journeys, and provides an analysis of IBM’s and EMC’s associated visions and strategies. 
(WHITE PAPER) READ ABSTRACT |

2012 Bit9 Cyber Security Research Report by Bit9, Inc.

May 2012 - (Free Research)
Bit9 conducted a survey on 1,861 IT and security professionals worldwide to examine their current views on today’s evolving threat landscape and their stance against them. View this report for a summary of the overall results as well as key findings, and find out how you compare to your peers. 
(WHITE PAPER) READ ABSTRACT |

Get the Coverity Scan 2010 Open Source Integrity Report featuring the Android Integrity Report by Coverity

January 2011 - (Free Research)
The results from the 2010 edition of the Coverity Scan Open Source Integrity Report detail the findings of analyzing more than 61 million lines of open source code from 291 popular and widely-used open source projects such as Android, Linux, Apache, Samba and PHP, among others. Read on to learn more about these results. 
(WHITE PAPER) READ ABSTRACT |

2012 Security Outlook by ComputerWeekly.com

February 2012 - (Free Research)
This report from the Corporate Executive Board, based on extensive research with Chief Information Security Officers, identifies the top 10 security imperatives for 2012. 
(ESSENTIAL GUIDE) READ ABSTRACT |

CW+: Study: The economic benefits of cloud to business and the economy by ComputerWeekly.com

January 2011 - (Free Research)
This is a summary of the report on and results of an independent study to quantify the economicbenefits of cloud computing to business and to Europe’s five largest economies (in alphabetical order,France, Germany, Italy, Spain and the UK). 
(WHITE PAPER) READ ABSTRACT |

Federated Identity & Single Sign‐On Using Layer 7 by CA Technologies.

December 2012 - (Free Research)
In this white paper, learn how separate identity silos create gaps and complexities in security measures. Read on to reveal a solution that federates identity and provides single sign-on (SSO) services for mobile and virtual applications to reduce these challenges. 
(WHITE PAPER) READ ABSTRACT |

Top Five Reasons to Use the RadiantOne Federated Identity System With SharePoint by Radiant Logic, Inc.

June 2014 - (Free Research)
This resource highlights the benefits of a federated identity service for organizations with scalable user environments. 
(WHITE PAPER) READ ABSTRACT |

Smarter Computing and Breakthrough IT Economics by IBM

February 2012 - (Free Research)
This brief white paper examines multiple case studies that demonstrate how smarter computing - the idea of transforming IT to deliver breakthrough economics and support innovation - offers improved IT economics. The case studies inside cover different IT domains — optimized systems, federated data, cloud and new service delivery models. 
(WHITE PAPER) READ ABSTRACT |

Adaptive Strong Auth & Federated SSO - The New Power Couple by Intel

October 2011 - (Free Research)
Weak identity management policies can strain IT’s ability to scale when it comes to security, privacy, business agility and more. In this webcast, learn about authentication, access control and password policies that you can put into place for stronger data protection. 
(WEBCAST) READ ABSTRACT |

Mobile ticketing opens doors of opportunity for business by ComputerWeekly.com

November 2010 - (Free Research)
Juniper Research defines a mobile ticketing user as “someone who stores a ticket on their mobile phone for later redemption” at the point of travel, the music venue, the cinema etc. 
(WHITE PAPER) READ ABSTRACT |

New Research: How to Improve Your B2B Email Marketing Results in 2007 by KnowledgeStorm Webinars (E-mail this company)

January 2007 - (Free Research)
Find out how 3,637 marketers responded to tough questions about their open, click and conversion rates. Also, find out which tests work best, what's not working, list growth strategies and how email budgets are changing for 2007. Invite your entire team to attend – attendance for this Webcast is free! 
(WEBCAST) READ ABSTRACT |

The Need for SOA to Achieve Flexibility and Agility within Plant Operations by Apriso Corporation

August 2008 - (Free Research)
This white paper offers a check list that manufacturers can use for evaluating and comparing alternative Manufacturing Execution Systems (MES), Warehouse Management Systems (WMS) and Quality Management Systems (QMS). 
(WHITE PAPER) READ ABSTRACT |

Sales Performance Optimization: 2007 Survey Results and Analysis by CA Technologies.

September 2008 - (Free Research)
This report represents the summary findings of our thirteenth annual survey of challenges impacting sales performance today. 
(WHITE PAPER) READ ABSTRACT |

Top 10 Tips to Make Access to SaaS, Enterprise Class Secure by Intel

October 2011 - (Free Research)
In today’s cloud environment, the number of security breaches is on the rise - driving a new mandate for strong authentication technologies to ensure a more secure SSO. In this case study brief, learn first hand from industry experts and customers, their top 10 tips to make your federated SSO implementation a success and Enterprise class secure. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 465 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts