Resource Based SecureWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Resource Based Secure returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Virtualization
 •   Network Security
 •   Data and Application Distribution
 •   Storage Management
 •   Endpoint Security
 •   Storage Area Network (SAN)/ Network Attached Storage (NAS)
 •   Desktop Management
 •   Mobile Device Management
 •   Application Management and Maintenance

Related Searches
 •   Content Resource Based Secure
 •   Examples Of Resource
 •   Manufacturers Resource
 •   Networking Resource Based
 •   Resource Based Market
 •   Resource Based Problems
 •   Resource Based Secure Diagram
 •   Resource Based Secure Distributions
 •   Resource Event
 •   Resource Tutorials
Advertisement

ALL RESULTS
1 - 25 of 466 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..
The Path to Enterprise Desktops: From Personal Computer to Personalized Computing by AMD and VMware, Inc..
This IDC white paper considers the concept of desktop virtualization, specifically as made available by VMware's VDI and ACE. The document also considers the benefits more...
>> Discover more offerings from AMD and VMware, Inc..

The Aruba Mobile Virtual Enterprise: The Next-Generation Network Access Architecture for the Post-Laptop Era by Aruba Networks, Inc.

March 22, 2011 - (Free Research)
Aruba MOVE unifies wired, wireless and remote access into one cohesive access solution - for traveling business professionals, remote office workers, corporate headquarters employees and guests.Access privileges are context aware and this dictates the type of network resources each person is entitled to. Read this paper for more. 
(WHITE PAPER) READ ABSTRACT |

Celina Insurance Group Streamlines Collaborative Processes with Agents to Stay ahead of the Competition by IBM

March 13, 2009 - (Free Research)
Read this case study to see how Celina Insurance Group implemented a collaborative extranet based on IBM Lotus Notes and Lotus Domino to enhance their competitive edge. 
(CASE STUDY) READ ABSTRACT |

Storage and Virtualization: Options for Smaller Environments by Dell, Inc.

October 2008 - (Free Research)
This document is based on a Dell/TechTarget webcast entitled "Storage and Virtualization: Options for Smaller Environments." 
(WHITE PAPER) READ ABSTRACT |

Private Cloud for Dummies by IBM

November 2011 - (Free Research)
Cloud computing is becoming an increasingly integral part of many companies’ business and technology strategy. Private Cloud For Dummies, IBM Limited Edition, helps put the private cloud model of computing into perspective for both business and technical leaders. Download your free copy today. 
(EBOOK) READ ABSTRACT |

Workload Automation: Helping Cloud Computing Take Flight by BMC Software, Inc.

April 2010 - (Free Research)
Many data centers are using the cloud to host applications and data storage but typically aren’t using the cloud to process effective batch computing workloads. Enterprise workload automation tools can give businesses a chance to take a much greater advantage of cloud computing. Read this whitepaper to learn how. 
(WHITE PAPER) READ ABSTRACT |

Information Security Roles and Responsibilities Made Easy by Information Shield, Inc.

Reducing the total cost of information security services by properly documented roles and responsibilities. 
(SOFTWARE PRODUCT)

crystalreports.com for Salesforce.com: Exception and Sales Reporting by Business Objects

crystalreports.com is a Web-based report-sharing service that allows you to share Crystal Reports with the right people - simply and securely. Create advanced reports from your Salesforce.com data. Dig deeper for answers using graphs with drill down capabilities. View, schedule, refresh, and distribute reports online - inside Salesforce.com. 
(SOFTWARE PRODUCT)

crystalreports.com: Web-Based Reporting & Information Sharing by Business Objects

crystalreports.com is a web-based report-sharing service that allows organizations to instantly share crucial business information with the right people - simply and securely. There is nothing to install, and places no additional workload on IT. It improves decision makers’ ability to make key business decisions based on timely and accurate data. 
(SOFTWARE PRODUCT)

Network Foundation - Cisco 1700 Series by Cisco Systems

Cisco 1700 Series modular routers are ideal for enterprise small branch offices and small and medium-sized businesses that need secure access to business applications, network resources, and Internet services. The Cisco 1700 Series delivers fast, reliable and secure Internet/network access through a wide-range of high-speed WAN access technologies. 
(HARDWARE PRODUCT)

AGL Resources Relies on F5 Products for Application Traffic Management, Link Load Balancing and Secure Remote Access by F5 Networks, Inc.

December 2004 - (Free Research)
AGL Resources, an Atlanta-based energy services holding company, relies on four different F5 products to support their growing infrastructure investments and to improve their ROI. 
(CASE STUDY) READ ABSTRACT |

VMware ACE 2 Enterprise Edition: Desktop Virtualization Solution by AMD and VMware, Inc (E-mail this company)

VMware ACE 2 Enterprise Edition delivers desktop virtualization solutions for enterprise users. Use VMware ACE 2 to deploy an ACE virtual machine as an IT managed “virtual laptop” to remote workers, provision controlled desktop images as sandbox environments or run legacy operating systems & applications on an existing PC as you migrate to Vista. 
(SOFTWARE PRODUCT)

Four Best Practices for Secure Web Access by RSA, The Security Division of EMC

June 2009 - (Free Research)
Read this white paper to learn best practices organizations can use to improve their ability to secure sensitive data and in turn, protect revenue, prevent the erosion of customer confidence and brand value, and meet the demands of regulatory compliance. 
(WHITE PAPER) READ ABSTRACT |

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc.

The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. 
(HARDWARE PRODUCT)

Browser based access to Windows applications and desktops – AccessNow by Ericom by Ericom Software

October 2011 - (Free Research)
Try this free trial download to learn about a technology that delivers pure browser-based access to business-critical Windows resources from any PC, Mac, Linux, Chromebook, iPad, Android, and other HTML5-enabled device. 
(TRIAL SOFTWARE) READ ABSTRACT |

Five Steps to Secure Internet Single Sign-On (SSO) by Ping Identity Corporation

June 2009 - (Free Research)
This white paper describes why and how any organization can implement secure Internet single sign-on, which provides for the portability and interoperability of identity information across organizational boundaries. Read this white paper to learn the five steps to secure internet single sign-on. 
(WHITE PAPER) READ ABSTRACT |

Building Secure Private Clouds with VMware vCloud Director by VMware, Inc.

April 2011 - (Free Research)
VMware vCloud Director gives you the ability to build secure private clouds that greatly increase datacenter efficiency and business agility. Coupled with VMware vSphere, VMware vCloud Director delivers cloud computing for existing datacenters by pooling virtual infrastructure resources and delivering them to users as catalog-based services. 
(WEBCAST) READ ABSTRACT |

Cloud Security as a Service For Secure Cloud-Based Server Hosting by IBM

April 2011 - (Free Research)
Access this expert e-guide where industry specialist Joseph Granneman highlights the need for cloud-specific security tools, such as encryption and identity management, and how they can be offered as a service to better mitigate cloud computing risks. 
(EGUIDE) READ ABSTRACT |

Email Security- The IBE Architectural Advantage by Voltage Security, Inc.

April 2012 - (Free Research)
This resource examines the challenges of securing business communication and how to overcome it. View now to explore the shortcomings of existing encryption solutions, key requirements for ubiquitous secure business communication, how Identity-based encryption (IBE) meets these requirements, and more. 
(WHITE PAPER) READ ABSTRACT |

Archive Attender™ for Exchange - Affordable Email Archiving by Sherpa Software

Archive Attender is a solution designed to move or copy messages from mailboxes, PST files and public folders. Administrators search indexed archives and view reports for storage and compliance. No SQL database or proprietary hardware required. Offers flexible archiving architecture. Free Trial available. 
(SOFTWARE PRODUCT)

Citrix XenApp: Single point of access, single point of control by Citrix

June 2013 - (Free Research)
This exclusive resource discusses a solution that provides secure, high-performance remote access to individualized Windows business applications that are centrally managed and secured in the data center. 
(WHITE PAPER) READ ABSTRACT |

The Key to Seamless SSO by Radiant Logic, Inc.

April 2014 - (Free Research)
This resource features a virtualized federated identity service that extends authentication beyond the security layer and reaches external applications, ensuring enterprise-wide protection. 
(WHITE PAPER) READ ABSTRACT |

Security - Pix 500 Series Firewalls by Cisco Systems

The world-leading Cisco PIX Security Appliance Series provides robust, enterprise-class, integrated network security services including stateful inspection firewalling, protocol and application inspection, virtual private networking, in-line intrusion protection, and rich multimedia and voice security-in cost-effective, easy-to-deploy solutions. 
(HARDWARE PRODUCT)

Protecting Customer Data: Moving Beyond Compliance by Voltage Security, Inc.

March 2012 - (Free Research)
The insurance industry has experienced unprecedented levels of change that has driven the need to secure customer and corporate data – beyond what is required for NAIC compliance. This resource offers key guidance for tackling the security challenges of this changing environment and how to ensure comprehensive data protection. 
(WHITE PAPER) READ ABSTRACT |

Iron Mountain Digital Virtual File Store Service: Trusted, Secure, Cost-Effective Cloud-Based Storage by Iron Mountain

March 2009 - (Free Research)
To help companies reduce the costs of storing and managing inactive data, Iron Mountain has created an enterprise-class cloud-based storage archive service, the Virtual File Store (VFS). The VFS service is part of Iron Mountain's Storage-as-a-Service portfolio, which includes email management/archiving, eDiscovery, and data backup/recovery. 
(DATA SHEET) READ ABSTRACT |

Food Manufacturer Extends Its Workforce with Secure Remote Access by Cisco Systems, Inc.

April 2008 - (Free Research)
This case study describes how one of the most well-known food producers and distributors achieved cost savings, increased productivity, and solved business challenges through deployment of the Cisco Adaptive Security Appliance (ASA) VPN Edition. 
(CASE STUDY) READ ABSTRACT |

1 - 25 of 466 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts