Research Done On SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Research Done On Security returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Network Security
 •   Enterprise Data Protection and Privacy
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Wireless Technologies and Mobile Computing
 •   Wireless Security
 •   Security Policies
 •   Managed Security Services
 •   Mobile Device Management
 •   Endpoint Security

Related Searches
 •   Related Research
 •   Research Done Integration
 •   Research Done On Cycle
 •   Research Done Seminars
 •   Research Done Solution Software
 •   Research Needs
 •   Research Review
 •   Research Technologies
 •   Research Webinars
 •   Specialists Research Done
Advertisement

ALL RESULTS
1 - 25 of 470 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Integrating Vulnerability Assessment and Remediation by Lumension

August 2008 - (Free Research)
An outline for successfully integrating vulnerability scanning and remediation capabilities is presented in this whitepaper. This will ensure that organizations maintain a secure environment while complying with internal and external security policies. 
(WHITE PAPER) READ ABSTRACT |

The new CIO: insights from the Center for CIO Leadership: An interview with Harvey Koeppel, Executive Director, Center for CIO Leadership by IBM

February 2009 - (Free Research)
Harvey Koeppel, executive director of the Center for CIO Leadership, talks about the challenges facing CIOs today and the emerging role of the CIO as a business leader helping to drive change and innovation. 
(WHITE PAPER) READ ABSTRACT |

Impact of Cloud: Top 10 Insights by Cisco Systems, Inc.

December 2013 - (Free Research)
This whitepaper shares some of the key findings from a study of the dramatic changes cloud computing is creating for IT at all key consumption lifecycle stages – how businesses plan for, procure, deploy, operate, and govern IT. 
(WHITE PAPER) READ ABSTRACT |

The Network Evolution University: Next Generation Networks by SearchNetworking.com

November 2011 - (Free Research)
In order to combat the ever-evolving challenges of today’s networks, it’s time to head back to school in our exclusive Network Evolution University – Featuring three distinct classes and nine progressive learning lessons that explore all there is to know about next generation networks and how to overcome the challenges they present. 
(VIRTUAL SEMINAR) READ ABSTRACT |

UK IT priorities 2012 by ComputerWeekly.com

August 2012 - (Free Research)
This exclusive Computer Weekly research reveals how UK IT departments are prioritising their budgets in 2012, which technologies they are investing in, and the impact of cloud computing, mobile and other disruptive technology on their IT strategies. 
(IT BRIEFING) READ ABSTRACT |

Software Licensing and Subscription by ComputerWeekly.com

August 2011 - (Free Research)
This research from Freeform Dynamics, based on a survey of end users,  identifies the challenges faced by IT departments and suppliers on software licensing, and offers advice to organisations on dealing with software licensing. 
(ANALYST BRIEF) READ ABSTRACT |

Keep Your Enemies Closer - Get Proactive about Security by AT&T Corp

March 2011 - (Free Research)
Forrester Research Inc. guest speaker, Khalid Kark, VP-Research Director, along with Steve Hurst of AT&T, will highlight today's complex enterprise security environments, discuss the latest research on security infrastructure essentials and explain how managed security services can reduce your risk and simplify policy compliance. 
(WEBCAST)

Virtualization Management Survey Report: Key Findings by Focus

August 2009 - (Free Research)
This FOCUS report of key findings presents the highlights of an end-user survey conducted in April 2009, outlining the current state of virtualization adoption, pain points, barriers to expansion, and management requirements. 
(ANALYST REPORT) READ ABSTRACT |

What Are The Real Threats? Using Threat Research Reports to Set Security Priorities by IntraLinks, Inc

May 2014 - (Free Research)
This resource features key findings from the top 4 security reports published in the last year to help IT pros better understand and identify potential threats. 
(WHITE PAPER) READ ABSTRACT |

UT Dallas: University turns to smartphones for multi-year research project by BlackBerry

September 2011 - (Free Research)
UT Dallas’ Center for Children and Families has been conducting a study on adolescents’ social networks and their impact on development. To assist in data collection, the team chose BlackBerry® hosted solution from Ceryx based on its ability to provide a controlled environment for their research. 
(CASE STUDY) READ ABSTRACT |

Research Report: Understand the True Cost of Data Encryption - Like Never Before by WinMagic

August 2012 - (Free Research)
World renowned Dr. Larry Ponemon, chairman of the Ponemon Institute presents the ground-breaking results of this revolutionary study on the True Cost of Data Encryption. Read this research report to learn how organisations around the world can lower the total cost of IT ownership while protecting their devices - with WinMagic data encryption. 
(WHITE PAPER) READ ABSTRACT |

Gartner research report on Cloud Services Brokerages by Intel

September 2011 - (Free Research)
A cloud services brokerage (CSB) is a type of service provider that plays an intermediary role in cloud computing. This research defines CSBs and outlines the capabilities that are needed to successfully intermediate cloud services. 
(WHITE PAPER) READ ABSTRACT |

Balancing Risk with Agility: Best Practices for Securing Cloud Deployments by Trend Micro

May 2014 - (Free Research)
Join a webinar hosted by Lauren E. Nelson, Lead Cloud Analyst, Forrester Research and Mark Nunnikhoven, Principal Engineer, Trend Micro on May 28, 2014 at 12PM EST for best practices to better secure cloud applications and data while minimizing cost and complexity. 
(WEBCAST) READ ABSTRACT |

Outsourcing the problem of software security by ComputerWeekly.com

July 2012 - (Free Research)
This report from analyst group Quocirca assess the benefits of using on-demand services to ensure security throughout the application life cycle. 
(ANALYST REPORT) READ ABSTRACT |

2012 Security Outlook by ComputerWeekly.com

February 2012 - (Free Research)
This report from the Corporate Executive Board, based on extensive research with Chief Information Security Officers, identifies the top 10 security imperatives for 2012. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Trust and security in the cloud by ComputerWeekly.com

February 2011 - (Free Research)
This study from analyst Freeform Dynamics gives guidance on security for organisations considering Software as a service. 
(ANALYST BRIEF) READ ABSTRACT |

Why Cloud-Based Security and Archiving Make Sense by Google Postini

June 2010 - (Free Research)
Join us for this live webinar on 'Why Cloud-Based Security and Archiving Make Sense'. We will address the critical and growing requirements for better email security and email archiving, as well as illustrate the benefits and cost savings of a cloud based approach to managing both. 
(WEBCAST) READ ABSTRACT |

Printing: a false sense of security? by ComputerWeekly.com

August 2013 - (Free Research)
Louella Fernandes and Bob Tarzey show how secure printing technology can provide authentication, authorisation and accounting capabilities, helping businesses improve document security and meet compliance regulations. 
(ANALYST REPORT) READ ABSTRACT |

Mobile Security Strategies by ComputerWeekly.com

November 2012 - (Free Research)
This exclusive report for Computer Weekly members explains the security risks and challenges of using mobile devices in the enterprise. 
(ANALYST REPORT) READ ABSTRACT |

Closing the print security gap by ComputerWeekly.com

November 2011 - (Free Research)
This report provides an overview of the inherent risks when operating an insecure print environment and discusses the current market landscape while recommending some best practices for adopting an integrated information and print security strategy. 
(WHITE PAPER) READ ABSTRACT |

The iPad Invasion: Leveraging SharePoint for Mobile Enterprise Security by Colligo Networks Inc.

June 2012 - (Free Research)
In order to leverage SharePoint and provide data access across a variety of technologies and locations, businesses everywhere are looking to integrate tablets into the enterprise, particularly the iPad. Check out this webcast to hear more on how iPads are changing the IT landscape and common challenges for iPads in the enterprise. 
(WEBCAST) READ ABSTRACT |

Why You Should Consider Hosted Messaging Security by Trend Micro GmbH

February 2009 - (Free Research)
In a major study of the hosted services market conducted by Osterman Research in 2008, antispam and virus protection were the two hosted offerings that organizations identified as services that they will likely or definitely deploy to supplement internally managed infrastructure. Read this paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

Network Purchasing Intentions 2013 by ComputerWeekly.com

December 2013 - (Free Research)
This exclusive Computer Weekly/TechTarget research ,based on a survey of over 400 European IT professionals, reveals organisations’ investment plans for networking technology. 
(ESSENTIAL GUIDE) READ ABSTRACT |

The NFC Retail Opportunity by ComputerWeekly.com

May 2012 - (Free Research)
This exclusive report for Computer Weekly readers by Juniper Research, offers a comprehensive briefing for senior IT professionals on the opportunities for NFC mobile payment technology, markets and trends. 
(ANALYST REPORT) READ ABSTRACT |

The Rising Impact of Virtualization on Data Backup and Recovery by Acronis

February 2012 - (Free Research)
This white paper highlights the rise of virtualization and explores what businesses today can do in terms of adjusting backup and recovery functions to maintain a functioning virtual data center. Learn what applications are most commonly virtualized today, discover the differences in backup between small and large organizations and more. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 470 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts