Research Security UsaWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Research Security Usa returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Network Security
 •   Enterprise Data Protection and Privacy
 •   Security Policies
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Wireless Technologies and Mobile Computing
 •   Mobile Device Management
 •   Managed Security Services
 •   Wireless Security
 •   Endpoint Security

Related Searches
 •   Developments Research Security Usa
 •   Free Research
 •   Linux Research
 •   Research Protocol
 •   Research Security Usa Distributions
 •   Research Security Usa Faqs
 •   Software Research Security
 •   Spreadsheets Research
 •   Statistics Research Security Usa
 •   Terms Research Security Usa
Advertisement

ALL RESULTS
1 - 25 of 481 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Unlocking growth potential in emerging markets by ComputerWeekly.com

April 23, 2012 - (Free Research)
Emerging markets offer huge potential for technology companies to expand. This report from Grant Thornton assess the opportunities in a range of emerging markets. 
(IT BRIEFING) READ ABSTRACT |

The Total Economic Impact of USA.NET SaaS Secure Messaging Solution by Perimeter eSecurity

January 20, 2012 - (Free Research)
The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of USA.NET's SaaS Secure Messaging solution on their organizations. 
(WHITE PAPER) READ ABSTRACT |

Enterprise Security Architecture by ComputerWeekly.com

March 01, 2013 - (Free Research)
Mark Brown, Director for Advisory Risk & Information Security at Ernst & Young offers advice to security leaders on developing a robust Enterprise Security Architecture. 
(PRESENTATION) READ ABSTRACT |

Best Practices for Securing Exchange Email When Using a Hosted Email Solution by USA.NET, Inc.

January 2007 - (Free Research)
For SMBs and large enterprises seeking secure, affordable Exchange email hosting, USA.NET offers a comprehensive blend of best security practices and best-of-breed technology. 
(WHITE PAPER) READ ABSTRACT |

Mobile ticketing opens doors of opportunity for business by ComputerWeekly.com

November 2010 - (Free Research)
Juniper Research defines a mobile ticketing user as “someone who stores a ticket on their mobile phone for later redemption” at the point of travel, the music venue, the cinema etc. 
(WHITE PAPER) READ ABSTRACT |

Harvey Nash CIO Survey 2012 by ComputerWeekly.com

May 2012 - (Free Research)
CIOs are more confident of securing technology budget increases than at any time in the last five years, according to the CIO Technology Survey 2012. 
(IT BRIEFING) READ ABSTRACT |

The Strategic Advantage of Cloud-Based Email and Blackberry Services by USA.NET, Inc.

September 2009 - (Free Research)
Hosted Exchange with Hosted BlackBerry® Services can provide significant strategic advantages to organizations that rely heavily on messaging and mobile functionality. This Osterman Research paper describes the reasons why IT organizations should seriously consider taking a strategic step forward by using these cloud-based services. 
(WHITE PAPER) READ ABSTRACT |

Case Study: Microsoft® Technology Center Reduced SharePoint 2010 Migration by Two Months with DocAve® by AvePoint, Inc.

June 2011 - (Free Research)
Migrating from SharePoint 2007 to the 2010 platform comes with a host of challenges. This brief case study shows how a leading New York City technology center saved time and money with a migration solution. 
(CASE STUDY) READ ABSTRACT |

Fast-Growing Municipality in Southeast USA Secures IT Operations and Services with AVG Anti-Virus Network Edition by AVG Technologies USA, Inc.

March 2010 - (Free Research)
The city of Brentwood’s IT environment is made up of 450 computers and counting. Increased population growth brings greater IT infrastructure needs. Brentwood’s old security provider couldn’t keep up. Read this brief case study to find out how Brentwood managed to meet their growing IT security needs. 
(CASE STUDY) READ ABSTRACT |

A Guide to Email Regulatory Compliance by USA.NET, Inc.

July 2009 - (Free Research)
This guide will list and review several regulations and privacy laws that apply to all businesses in order to protect private or sensitive information, discuss different approaches to email security, and give a rundown of several security solution services for your business hosted by USA.NET. 
(WHITE PAPER) READ ABSTRACT |

Sportif USA Transparently Automates the Archiving and Protection of Large Outlook Mailboxes with Metalogix by Metalogix

January 2012 - (Free Research)
In this case study, explore how Sportif, a leading outdoors clothing innovator, reduced email management costs and increased data protection for their users with Metalogix Archive Manager for Exchange. 
(WHITE PAPER) READ ABSTRACT |

Employing IBM Database Encryption Expert to meet encryption and access control requirements for the Payment Card Industry Data Security Standards (PCI DSS) by IBM

July 2011 - (Free Research)
This white paper explores the challenges of compliance with PCI and how organizations must take a holistic approach to protecting and securing their business-critical information. 
(WHITE PAPER) READ ABSTRACT |

Mercedes-Benz Takes a Smooth Ride to ERP 6.0 by Panaya, Inc.

February 2010 - (Free Research)
Mercedes-Benz USA needed to upgrade from 4.6C to ERP 6.0 to manage an increasingly complex application environment while doing it in-house without overtaxing development team members. Read this paper to find out how Panaya helped Mercedes-Benz USA come in on time and under budget with their SAP upgrade. 
(WHITE PAPER) READ ABSTRACT |

Virtual Criminology Report 2009 -- Virtually Here: The Age of Cyber Warfare by McAfee, Inc.

December 2009 - (Free Research)
Is the “Age of Cyber War” at hand? Since our 2007 report, there have been increasing reports of cyber attacks and network infiltrations that appear to be linked to nation-states and political goals. We decided it was time to further examine whether cyber warfare is now a part of human conflict that we should get used to seeing more often. 
(WHITE PAPER) READ ABSTRACT |

About T-Mobile USA by Jive Software

June 2013 - (Free Research)
Find out in this case study how a social business platform enabled T-mobile to consolidate and centralize information about products, services, pricing, policies and troubleshooting, enabling sales reps to better utilize their time. 
(CASE STUDY) READ ABSTRACT |

Battery Technology for Data Centers and Network Rooms: Fire Safety Codes - USA by APC by Schneider Electric

October 2011 - (Free Research)
Proper interpretation of the fire codes is essential in the design and implementation of data centers and network rooms. This resource explores fire safety regulations and their application to uninterrupted power supply (UPS) battery installations. 
(WHITE PAPER) READ ABSTRACT |

FUJIFILM Medical Systems USA Case Study by VMware, Inc.

July 2011 - (Free Research)
This white paper presents a case study of an organization that transformed their traditional applications into SaaS solutions without disrupting their existing business or requiring re-architecting of applications. 
(WHITE PAPER) READ ABSTRACT |

The Network Evolution University: Next Generation Networks by SearchNetworking.com

November 2011 - (Free Research)
In order to combat the ever-evolving challenges of today’s networks, it’s time to head back to school in our exclusive Network Evolution University – Featuring three distinct classes and nine progressive learning lessons that explore all there is to know about next generation networks and how to overcome the challenges they present. 
(VIRTUAL SEMINAR) READ ABSTRACT |

UK IT priorities 2012 by ComputerWeekly.com

August 2012 - (Free Research)
This exclusive Computer Weekly research reveals how UK IT departments are prioritising their budgets in 2012, which technologies they are investing in, and the impact of cloud computing, mobile and other disruptive technology on their IT strategies. 
(IT BRIEFING) READ ABSTRACT |

Webcast - Remote Data Replication: Combat Disasters and Optimize Business Operations by Silver Peak

October 2013 - (Free Research)
Watch this presentation to hear a discussion of up-and-coming data replication technologies and strategies with experts from Dell Compellent, Silver Peak, and Alaska USA Federal Credit Union. 
(WEBCAST) READ ABSTRACT |

Enterprise Performance Management - The Global State of the Art by Oracle Corporation

October 2010 - (Free Research)
In 2007 Oracle worked with Cranfield School of Management and four other Universities around the world on a global study of enterprise performance management. The study gathered data from 633 companies in Australia, China, Japan, UK and the USA. Read this white paper to find out the results. 
(WHITE PAPER) READ ABSTRACT |

Keep Your Enemies Closer - Get Proactive about Security by AT&T Corp

March 2011 - (Free Research)
Forrester Research Inc. guest speaker, Khalid Kark, VP-Research Director, along with Steve Hurst of AT&T, will highlight today's complex enterprise security environments, discuss the latest research on security infrastructure essentials and explain how managed security services can reduce your risk and simplify policy compliance. 
(WEBCAST)

Software Licensing and Subscription by ComputerWeekly.com

August 2011 - (Free Research)
This research from Freeform Dynamics, based on a survey of end users,  identifies the challenges faced by IT departments and suppliers on software licensing, and offers advice to organisations on dealing with software licensing. 
(ANALYST BRIEF) READ ABSTRACT |

Databases at Risk: Current State of Database Security (Enterprise Strategy Group) by IBM

September 2009 - (Free Research)
This ESG Research Brief analyzes the current state of database security and categorizes databases as a “dangerous and growing security gap”. Read this brief which offers steps to improve database security across the enterprise. 
(ANALYST BRIEF) READ ABSTRACT |

Virtualization Management Survey Report: Key Findings by Focus

August 2009 - (Free Research)
This FOCUS report of key findings presents the highlights of an end-user survey conducted in April 2009, outlining the current state of virtualization adoption, pain points, barriers to expansion, and management requirements. 
(ANALYST REPORT) READ ABSTRACT |

1 - 25 of 481 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts