Research Security Agent CommercialWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Research Security Agent Commercial returned the following results.
RSS What is RSS?
Related Categories

 •   Virtualization
 •   Wireless Technologies and Mobile Computing
 •   Mobile Device Management
 •   Business Intelligence Solutions
 •   Storage Management
 •   Storage Security
 •   Data Security
 •   Backup Systems and Services
 •   Customer Relationship Management (CRM)
 •   Business Process Management (BPM)

Related Searches
 •   Experts Research Security
 •   Price Research
 •   Research Security Agent Packages
 •   Research Security Agent Quality
 •   Research Security Agent Source
 •   Research Security Designer
 •   Research Security Metrics
 •   Research Security Online
 •   Research Security Supplier
 •   Technical Research Security
Advertisement

ALL RESULTS
1 - 25 of 481 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Enterprise Security Architecture by ComputerWeekly.com

March 01, 2013 - (Free Research)
Mark Brown, Director for Advisory Risk & Information Security at Ernst & Young offers advice to security leaders on developing a robust Enterprise Security Architecture. 
(PRESENTATION) READ ABSTRACT |

How to tackle Enterprise Information Protection & Control by ComputerWeekly.com

November 09, 2010 - (Free Research)
Information protection needs to cover all data, from word processing documents to datawithin databases and executable code. It covers enterprise and personal data and is not justconfined to protecting entertainment media, which tends to be generically referred to as“Digital Rights Management” (DRM). 
(WHITE PAPER) READ ABSTRACT |

Spam, Spammers, and Spam Control by Trend Micro GmbH

March 06, 2009 - (Free Research)
This Ferris Research white paper looks at spam: what it is, how it is sent, and how it is filtered. It unravels the complexities and gives an accessible, factual overview into the scourge of spam. 
(WHITE PAPER) READ ABSTRACT |

Lowering the Cost of Business Intelligence With Open Source: A Comparison of Open Source and Traditional Vendor Costs by Pentaho Corporation

June 03, 2010 - (Free Research)
Many of the top reasons given for the use of open source BI software is "lower costs." The question is whether commercial open source actually matters when it comes to lowering license and support costs. Read this analyst report for comparison of the software and support costs of traditional BI vendors versus commercial open source BI from Pentaho. 
(ANALYST REPORT) READ ABSTRACT |

Storage Magazine: July 2013 by SearchStorage.com

July 03, 2013 - (Free Research)
This issue of Storage Magazine takes a closer look at the latest solid-state storage trends, uses, and form factors. It also provides cloud-based file sharing need-to-knows, expert perspectives on LTFS and the future of tape, advice on simplifying VM data protection and more. 
(EZINE) READ ABSTRACT |

Lumension Endpoint Management and Security Suite by Lumension

September 13, 2010 - (Free Research)
A new wave of vulnerabilities is threatening our endpoints and browsers at a much greater rate than operating systems and servers, which is why the SANS Institute has ranked “patching client-side software” as the number one security priority. 
(TRIAL SOFTWARE)

You Don't Need Science Fiction to Speed Up Cloud Storage by NetApp

July 01, 2013 - (Free Research)
This issue of Storage Magazine takes a closer look at the latest solid-state storage trends, uses, and form factors. It also provides cloud-based file sharing need-to-knows, expert perspectives on LTFS and the future of tape, advice on simplifying VM data protection and more. 
(EZINE) READ ABSTRACT |

Extending Advanced Malware Protection to Unmanaged devices, Cloud and Virtual Desktops by Trusteer

July 19, 2012 - (Free Research)
Advanced threats and emerging IT initiatives such as BYOD, cloud applications and desktop virtualization are making security more challenging than ever before. This resource explores these challenges and offers insight on how to build a layered defense. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Heuristic Analysis- Detecting Unknown Viruses by ESET

February 03, 2010 - (Free Research)
The aim of this paper is to reduce some of the confusion around the workings of AV technology, and to clarify what is realistic to expect from AV protection, particularly heuristic analysis. 
(WHITE PAPER) READ ABSTRACT |

Five Ways to Improve Your Company's Efficiency by Cisco Systems, Inc.

February 22, 2008 - (Free Research)
According to IDC research, 60.2% of SMBs cited improving efficiency as their top business priority in 2005. Read this article to find tips for enhancing efficiency. 
(ARTICLE) READ ABSTRACT |

Negotiating cloud contracts by ComputerWeekly.com

January 24, 2013 - (Free Research)
This article, drawing on sources including interviews with cloud computing providers, users and other market actors, is the first in-depth research into how cloud contracts are negotiated. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Computer Weekly 25 October 2011: Read this week's issue of the UK's leading technology publication, with news, analysis and opinion on the topics that matter to IT managers by ComputerWeekly.com

October 21, 2011 - (Free Research)
In this week's Computer Weekly, we ask IT experts to help answer the question of why so many big IT projects fail. We report from VMware's user conference in Copenhagen on the latest developments in virtualisation, and analyse the emerging threat from military-style cyber attacks on corporate IT networks. Download the new issue now. 
(EZINE)

Designing Artificial Intelligence for Games (part 2) by Intel Software Network

June 11, 2009 - (Free Research)
This article gets dangerously close to real artificial intelligence (AI). All intelligent agents need to have a basic ability to perceive their environment and some means of navigating and moving within the world around them-be it real or otherwise. Read on to learn more about AI. 
(WHITE PAPER)

Gartner: Time to rethink backup procedures by ComputerWeekly.com

February 04, 2014 - (Free Research)
IT leaders and storage managers can realise cost savings and improve their use of backup infrastructure by rethinking their back-up procedures, says Gartner analyst Dave Russell. 
(ANALYST BRIEF) READ ABSTRACT |

Debunking Security Concerns with Hosted Call Centers by inContact

January 10, 2011 - (Free Research)
This paper discusses the different layers requiring security, how security should be addressed in each layer, and how to select a qualified hosted call center provider. Read this white paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

Gartner: Best practices for I&O for cloud-readiness by ComputerWeekly.com

January 14, 2013 - (Free Research)
Gartner analysts explain how Infrastructure and Operations (I&O) teams can best prepare for the cloud. 
(ANALYST BRIEF) READ ABSTRACT |

Gartner: Context-aware computing by ComputerWeekly.com

June 01, 2012 - (Free Research)
Gartner analysts, William Clark, David W Cearley and Avivah Litan, explain how business can exploit context-aware computing and social media. 
(ANALYST BRIEF) READ ABSTRACT |

The Relevance & Value of a Storage Hypervisor by IBM

December 31, 2011 - (Free Research)
ESG asked senior IT professionals in enterprise and midmarket organizations in North America and Western Europe to identify the most important considerations for justifying IT investments in 2009-2011. Read now to learn the results. 
(WHITE PAPER) READ ABSTRACT |

Advanced Technologies Key to Next-Gen Contact Centers by LogMeIn, Inc.

March 27, 2014 - (Free Research)
Access this helpful e-guide to learn how to improve customer experience by equipping contact center agents with the right tools and technologies. Discover why Forrester Research analyst Art Schoeller recommends an "outside-in approach" to acquiring new contact center technologies, and explore his key considerations for adopting new tools 
(EGUIDE) READ ABSTRACT |

Celina Insurance Group Streamlines Collaborative Processes with Agents to Stay ahead of the Competition by IBM

March 13, 2009 - (Free Research)
Read this case study to see how Celina Insurance Group implemented a collaborative extranet based on IBM Lotus Notes and Lotus Domino to enhance their competitive edge. 
(CASE STUDY) READ ABSTRACT |

The Truth about Agent Vs. Agentless Monitorinng: A Short Guide to Choosing the Right Solution by uptime software inc.

July 1967 - (Free Research)
When selecting an enterprise-level monitoring solution, one of the first decisions the IT department needs to make is whether to opt for an agent based, or agentless monitoring solution. This paper helps you arrive at a decision. 
(WHITE PAPER) READ ABSTRACT |

Faster, Higher, Stronger: In-Memory Computing Disruption and What SAP HANA Means for Your Organization by SAP America, Inc.

November 2011 - (Free Research)
Over the course of several months in 2011, IDC conducted a research study to identify the opportunities and challenges to adoption of a new technology that changes the way in which traditional business solutions are implemented and used. The results of the study are presented in this white paper. 
(WHITE PAPER) READ ABSTRACT |

Gartner: How to build an online community by ComputerWeekly.com

February 2014 - (Free Research)
Gartner analyst Julie Hopkins explains seven ways to lure people to participate in online communities and shows how to choose the tactics that will best suit your business needs. 
(ANALYST BRIEF) READ ABSTRACT |

Gartner: What CIOs should know about cloud‑based customer service by ComputerWeekly.com

November 2013 - (Free Research)
IT leaders and managers of customer support need to understand the limits of cloud-based CRM customer service and support software solutions, writes Michael Maoz, vice-president and distinguished analyst at Gartner. 
(ANALYST BRIEF) READ ABSTRACT |

Technology, Innovation and Change by ComputerWeekly.com

August 2013 - (Free Research)
IT leaders identify the technologies most likely to impact on their organisations approach to change and innovation in this study by Theron LLP and Computer Weekly. 
(ESSENTIAL GUIDE) READ ABSTRACT |

1 - 25 of 481 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts