Research Designing Security ForWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Research Designing Security For returned the following results.
RSS What is RSS?
Related Categories

 •   Network Security
 •   Wireless Technologies and Mobile Computing
 •   Networks
 •   Mobile Device Management
 •   Business Intelligence Solutions
 •   Network Management
 •   Laptops/ Notebooks/ Tablet PCs
 •   Data Center Management
 •   Virtualization
 •   Wireless Security

Related Searches
 •   Contracts Research Designing
 •   Customers Research Designing
 •   Definitions Research Designing Security
 •   License Research Designing Security
 •   Research Designing Development
 •   Research Designing Price
 •   Research Event
 •   Research Issues
 •   Research On-Line
 •   Rfi Research
Advertisement

ALL RESULTS
1 - 25 of 479 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Nine Steps to Smart Security for Small Businesses by Qualys

December 30, 2011 - (Free Research)
This white paper lists 9 steps to achieving smart security for small businesses and focuses on how a cloud security solution can benefit organizations without the resources for traditional security approaches. 
(WHITE PAPER) READ ABSTRACT |

Server-Gated Cryptography: Providing Better Security for More Users by Thawte Inc.

May 10, 2013 - (Free Research)
Discover how Server-Gated Cryptography (SGC)-enabled SSL certificates are crucial to protecting your organization and your end-users in the threat-filled vastness of cyberspace. 
(WHITE PAPER) READ ABSTRACT |

CORE IMPACT Pro V10 by Core Security Technologies

December 30, 2009 - (Free Research)
Please join Core Security for a live demonstration of CORE IMPACT Pro, the most comprehensive product for performing security assurance testing on an organization’s network systems, endpoint systems, end users and web applications. 
(PRODUCT DEMO) READ ABSTRACT |

Securing microsoft exchange 2010 With Thawte SSL Certificates by Thawte Inc.

July 12, 2011 - (Free Research)
Security continues to be a facet of Exchange technology that must be managed, and your secure sockets layer (SSL) certificates are the key to managing security for Exchange servers. Access this expert white paper now to get an overview of SSL certificates for Exchange 2010. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Enterprise UTM Security: The Best Threat Management Solution? by NETGEAR Inc.

December 10, 2010 - (Free Research)
If you believe everything you read, enterprise unified threat management (UTM) products and appliances are the silver bullet for information security. However, I've never met a security professional who believes everything they read. UTM provides decent network security for small to midsized businesses, but probably has no place in the enterprise. 
(EGUIDE) READ ABSTRACT |

What Businesses Need to Know About Cyber Security by Lumension

April 17, 2014 - (Free Research)
Access this resource and witness 4 security experts discuss today's threat landscape and how cyber security is being dealt with across the world. 
(WEBCAST) READ ABSTRACT |

The Network Evolution University: Next Generation Networks by SearchNetworking.com

November 09, 2011 - (Free Research)
In order to combat the ever-evolving challenges of today’s networks, it’s time to head back to school in our exclusive Network Evolution University – Featuring three distinct classes and nine progressive learning lessons that explore all there is to know about next generation networks and how to overcome the challenges they present. 
(VIRTUAL SEMINAR) READ ABSTRACT |

UK IT priorities 2012 by ComputerWeekly.com

August 24, 2012 - (Free Research)
This exclusive Computer Weekly research reveals how UK IT departments are prioritising their budgets in 2012, which technologies they are investing in, and the impact of cloud computing, mobile and other disruptive technology on their IT strategies. 
(IT BRIEFING) READ ABSTRACT |

Interoperating with Cisco Systems: Hands-On Look at Configuring D-Link and Cisco for Seamless Savings by D-Link

July 02, 2010 - (Free Research)
The best network design invariably is multi-vendor. That is even more true in an era of constrained budgets where sticking with your existing vendor brings with it not only a price premium, but also the continuation of proprietary approaches. Read this whitepaper to learn more about D-Link's interoperability benefits with Cisco systems. 
(WHITE PAPER) READ ABSTRACT |

Top 10 Mobile Application Risks by Veracode, Inc.

May 11, 2012 - (Free Research)
<p>In this presentation, Veracode’s Vice President of Security Research, Chris Eng, will outline the Top 10 Mobile Application Risks, designed to educate developers and security professionals about the mobile application behavior – both maliciously- designed or inadvertent – putting users at risk.</p> 
(WEBCAST) READ ABSTRACT |

Watson – A System Designed for Answers by IBM

February 14, 2012 - (Free Research)
Following four years of research and development, IBM's Watson debuted on Jeopardy! last year, competing at the level of human experts in terms of precision, confidence and speed. This white paper details Watson's workload optimized system design, how it's a glimpse into the future of systems design and why it offers a new computing paradigm. 
(WHITE PAPER) READ ABSTRACT |

IT Security. Fighting the Silent Threat by Kaspersky Lab

October 09, 2013 - (Free Research)
Kaspersky Lab experts are releasing new research designed to assist you in your cybersecurity business decisions. Download the report now to get quantifiable statistics about perceived versus real cyberattacks. 
(WHITE PAPER) READ ABSTRACT |

CW+: Bloor Research - EU Compliance and Regulations for the IT Professional by ComputerWeekly.com

January 06, 2011 - (Free Research)
This paper highlights key directives and legislation within the European Union that have an impact on IT security practitioners, especially those responsible for the safe storage of data using data loss prevention technologies. 
(WHITE PAPER) READ ABSTRACT |

North Carolina Center for Automotive Research uses borderless network to keep engineers connected to data and services anywhere, anytime by Cisco Systems, Inc.

October 10, 2011 - (Free Research)
This case study demonstrates how one organization used borderless network technology to help them grow substantially in a short amount of time. 
(CASE STUDY) READ ABSTRACT |

Trends in Enterprise Mobility by ComputerWeekly.com

April 22, 2013 - (Free Research)
This research report from Comptia offers advice to organisations on provisioning mobile devices, assesses the benefits of mobile and identifies the challenges of remote working. 
(WHITE PAPER) READ ABSTRACT |

A Complete View Of The Enterprise: Linking Operational And Financial Planning In Global Organizations by SAP America, Inc.

May 01, 2008 - (Free Research)
In February 2008, CFO Research Services, a unit of CFO Publishing and part of The Economist Group, began a research project with Business Objects, an SAP company, asking senior finance executives to give views on their priorities and challenges around integrating operational and financial planning processes. 
(WHITE PAPER) READ ABSTRACT |

The Customer You Know: Keeping, Leveraging, and Profiting from Current Customers with Business Analytics by SAS

May 05, 2010 - (Free Research)
Read this paper to learn about business analytics and how it can significantly impact customer service improvements and customer retention and how it can enable your company to develop more agile strategies that will allow you to adapt to changing customer behavior and achieve their business goals. 
(ANALYST REPORT) READ ABSTRACT |

Information is King: Business Analytics in the Age of the Downturn and the (Re)Emergence of the Customer by SAS

April 07, 2010 - (Free Research)
BusinessWeek Research Services (BWRS) launched a research program in April 2009 to determine the attitudes and opinions of C-level executives with regard to the use and value of business analytics. This paper reviews a portion of the research and provides analysis and insights on the topic of business analytics. 
(WHITE PAPER) READ ABSTRACT |

Clabby Analytics Research Report - IBM NeXtScale System: A New Ultra-Dense Hyper-Scale x86 Server Design by IBM

September 18, 2013 - (Free Research)
This white paper details how high performance computing can be handled by hyper-scale servers. 
(WHITE PAPER) READ ABSTRACT |

Clabby Analytics Research Report - How Cisco's UCS Compares to IBM Flex System - Nov 2012 by IBM

December 31, 2012 - (Free Research)
Access this research report for an in-depth comparison of Cisco's UCS and IBM Flex System integrated system offerings. This report focuses on areas such as extended memory servers, blade and rack designs, performance, systems management, and more! 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 12 February 2013: Can BlackBerry 10 bridge the business-consumer smartphone divide? by ComputerWeekly.com

February 12, 2013 - (Free Research)
In this week's Computer Weekly, we look at the new smartphone from BlackBerry – it's designed to please both business and consumer users, but is it enough to save the company? We examine the options for using cloud services for disaster recovery. And IT leaders tell us what they think about the future of the data centre. Read the issue now. 
(EZINE) READ ABSTRACT |

Computer Weekly – 27 November 2012: Announcing the most influential people in UK IT by ComputerWeekly.com

November 27, 2012 - (Free Research)
In this week's Computer Weekly, we reveal our annual UKtech50 list of the 50 most influential people in UK IT, and interview the winner, Warren East, CEO of chip design firm ARM. Also in this issue, we conclude our buyer's guide to infrastructure as a service with an in-depth analysis of Microsoft's Azure cloud platform. Read the issue now. 
(EZINE) READ ABSTRACT |

Gartner: Five trends that will affect your cloud strategy by ComputerWeekly.com

April 23, 2012 - (Free Research)
Businesses need to keep a close eye on the evolution of cloud based services to avoid wasting money and missing out on business opportunities. 
(ANALYST BRIEF) READ ABSTRACT |

How Micro-Electro-Mechanical systems are taking over mobile devices by ComputerWeekly.com

February 06, 2012 - (Free Research)
In this report extract Juniper Research looks at the growing use of MEMS (micro-electro-mechanical systems) in mobile devices, tables, laptops and notebooks. 
(ANALYST BRIEF) READ ABSTRACT |

Computer Weekly - 6 March 2012: Windows 8 - tablet meets desktop by ComputerWeekly.com

March 06, 2012 - (Free Research)
This week’s Computer Weekly delves into the new world of Windows 8. We also talk to some top CIOs about how the downturn has shaped their priorities. You'll also find the third and final part of our Buyer's Guide to IPv6 migration, all inside this digital magazine. 
(EZINE)

1 - 25 of 479 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts