Rfi ConcernsWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Rfi Concerns returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Virtualization
 •   Enterprise Data Protection and Privacy
 •   Network Security
 •   Storage Security
 •   Intrusion Prevention Solutions
 •   Grid/ Utility Computing
 •   Anti-Virus Solutions
 •   Storage Management
 •   Security Monitoring

Related Searches
 •   Data Rfi
 •   Decisions Rfi
 •   Facts Rfi
 •   Guide Rfi
 •   Organizational Rfi Concerns
 •   Rfi Concerns Documents
 •   Rfi Concerns Firm
 •   Rfi Concerns Format
 •   Rfi Concerns Maine
 •   Rfi Designs
Advertisement

ALL RESULTS
1 - 25 of 476 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Preparing an RFI for Virtualization and the PCI Data Security Standard by HyTrust

March 22, 2011 - (Free Research)
This paper discusses how protecting cardholder data is a critical and mandatory requirement for all organizations that process, store or transmit information on credit or debit cards and the requirements and guidelines for securing cardholder data are specified in the Payment Card Industry (PCI) Data Security Standard (DSS). 
(WHITE PAPER) READ ABSTRACT |

Antimalware IT Checklist: RFP Technology Decisions Part 2 by SearchSecurity.com

April 11, 2012 - (Free Research)
Part 2 of SearchSecurity.com's 3-part guide on antimalware products offers expert insight into gathering pertinent information into the technical information necessary to move forward in the RFI process. Get an overview of technical requirements, questions to ask potential vendors, and a list of products that may meet your needs. 
(EGUIDE) READ ABSTRACT |

Mobile, Social Engineering Top Data Security Management Concerns by Thawte Inc.

November 15, 2013 - (Free Research)
This e-guide, from SearchCIO.com, explores how to set up the right policies in order to successfully eliminate mobile, social engineering and data security management concerns. 
(EGUIDE) READ ABSTRACT |

Securing the Physical, Virtual, Cloud Continuum by Juniper Networks, Inc and Plan B Technologies, Inc

July 26, 2010 - (Free Research)
Information security best practices remain largely the same as 15 years ago, based on a strong perimeter defense. However, virtualization and cloud computing are radically changing data center operations. Security and compliance controls need to extend across the physical, virtual, cloud continuum in order to adapt to this new infrastructure. 
(WHITE PAPER) READ ABSTRACT |

Securing and Mitigating Risk in the Cloud by SearchCIO.com

July 18, 2013 - (Free Research)
Cloud computing offers a number of upsides, but also sparks concerns about securing and mitigating risk in the cloud. Learn more in Modern Infrastructure, CIO Edition. 
(EGUIDE) READ ABSTRACT |

Social Networking in the Enterprise: Benefits and Inhibitors by Cisco Systems, Inc.

June 01, 2010 - (Free Research)
This white paper reveals the primary considerations for social networking, such as: business value and strategic relevance, adoption trends and concerns, and strategic considerations for ESS deployment. 
(WHITE PAPER)

Is the cloud safe? Breaking down the barriers to cloud computing by ComputerWeekly.com

December 09, 2010 - (Free Research)
Research by cloud provider Savvis has identified the five biggest concerns preventing IT managers from opting for cloud-based services. 
(WHITE PAPER) READ ABSTRACT |

Intel Cloud Computing Security Research Video: What’s Holding Back the Cloud? by Intel

May 29, 2013 - (Free Research)
This video will share the results of a survey questioning IT professionals on their thoughts and feelings when it comes to cloud security. Watch and learn what is on the forefront of these professionals minds when it comes to securing the cloud, and what you can do to address these concerns. 
(VIDEO) READ ABSTRACT |

Delivering Enterprise Information Securely on Android and Apple iOS Devices by Citrix

April 30, 2012 - (Free Research)
This white paper describes the issues that can arise when incorporating Android and iOS-based tablets and smartphones into the enterprise – with special attention paid to the latest Android 4.0 and iOS 5.1 versions. In addition, uncover the steps you should take to maintain security and control. 
(WHITE PAPER) READ ABSTRACT |

Mobile Security Report 2009 by McAfee, Inc.

December 07, 2009 - (Free Research)
Device manufacturers are balancing control with innovation, a dynamic that often controls the mobile ecosystem. This is why the McAfee Mobile Security Report 2009 is taking a closer look at manufacturers’ security experiences, their concerns and priorities, and their approach to major security challenges that lie ahead of them in the near future. 
(WHITE PAPER) READ ABSTRACT |

Cloud security concerns you must address by HP & Intel®

July 26, 2013 - (Free Research)
This exclusive white paper discusses the five cloud security concerns that must be addressed for your initiative to be successful. Discover how you can respond to today's threat landscape and efficiently deal with new security dynamics to protect both your physical and virtual assets along with your cloud data. 
(WHITE PAPER) READ ABSTRACT |

Addressing Outlook Security Concerns and Preparing Mobile Users for an Exchange Migration by Thawte Inc.

May 19, 2011 - (Free Research)
Users enticed by the ability to check email at a glance increasingly log onto Exchange 2010 remotely and cause new security risks. This expert e-guide from SearchExchange.com explains how to address these Outlook security concerns by creating a buffer zone between your internal network and the Internet. 
(EGUIDE) READ ABSTRACT |

10 Security Concerns for Cloud Computing by Global Knowledge

March 17, 2010 - (Free Research)
Read this paper to learn the many benefits of cloud computing as well as the 10 security concerns that need to be addressed when considering moving critical applications and sensitive data to public and shared cloud environments. 
(WHITE PAPER) READ ABSTRACT |

The Future of Authentication for Online Services by SafeNet, Inc.

November 02, 2009 - (Free Research)
In this white paper, we take a look at how strong authentication can benefit eCommerce and online services. We will evaluate the risks that identity fraud, phishing and cybercrime pose for online service providers and discuss how strong user authentication can alleviate these risks. 
(WHITE PAPER) READ ABSTRACT |

VOIP Infrastructure for the Evolving Enterprise: How to Control Costs, Mitigate Risk, and Ensure Service Levels in an Ever-Changing Network Environment by NET Quintum

November 2008 - (Free Research)
There are significant differences in VoIP hardware functionality that affect the cost, risk and consumption of staff resources. This white paper outlines what to consider when selecting a VoIP gateway/switching solutio 
(WHITE PAPER) READ ABSTRACT |

IPTV Test and Measurement Best Practices by Alcatel-Lucent

January 2007 - (Free Research)
This whitepaper focuses on providing a pragmatic set of test and measurement guidelines that can be implemented on a live operational IPTV service. The recommendations given in this paper are generally applicable to any IPTV system. 
(WHITE PAPER) READ ABSTRACT |

Secure Wireless Made Easy -- Selecting a Next-Generation Solution for Pervasive WLAN Implementations by SonicWALL

July 2009 - (Free Research)
This paper examines the characteristics of a next-generation solution that helps alleviate the prevailing issues and challenges associated with today's WLAN implementations. The emergence of products that conform to related criteria holds the key to enabling enterprises to fully realize the important benefits that wireless technology has to offer. 
(WHITE PAPER) READ ABSTRACT |

Trust and security in the cloud by ComputerWeekly.com

February 2011 - (Free Research)
This study from analyst Freeform Dynamics gives guidance on security for organisations considering Software as a service. 
(ANALYST BRIEF) READ ABSTRACT |

Is the cloud safe? Breaking down the barriers to cloud computing by ComputerWeekly.com

September 2010 - (Free Research)
Research by Savvis has identified the five biggest concerns preventing IT managers from opting for cloud-based services. In this report, we examine how to overcome these top five concerns to help IT managers put in place a strategy for cloud computing with confidence 
(WHITE PAPER) READ ABSTRACT |

Assuaging Concerns about Public Cloud Services And APM: Expert Roadmap by XO Communications

January 2014 - (Free Research)
In this e-guide, cloud networking expert Amy Larsen DiCarlo shares her insight on the public cloud, with emphasis on use cases, common concerns, and how to choose the right provider. Click through to also find 5 FAQs about network-based application performance management (APM) to ensure your business stays up-to-speed. 
(EGUIDE) READ ABSTRACT |

E-Guide: Evaluating cloud security concerns by CA Technologies

June 2011 - (Free Research)
The benefits of cloud computing such as reduced costs and greater efficiency are widely understood by today’s organisations, but security still remains a top concern. This expert tip provides advice on how to evaluate cloud computing providers and highlights some of the risks that must be considered when evaluating cloud solutions. 
(EGUIDE) READ ABSTRACT |

Solution Spotlight: Evaluating Cloud Security Concerns by IBM

December 2012 - (Free Research)
Access this expert e-guide that reveals successful strategies for protecting sensitive data in the cloud, as well as how to  effectively defend against the latest threats and maintain compliance while taking advantage of the benefits of cloud computing. 
(EGUIDE) READ ABSTRACT |

Reconciling Datacenter Consolidation and Security by Oracle Corporation

January 2010 - (Free Research)
Security concerns continue to hobble consolidation efforts in the data center. The concerns are real, and most often stem from a scattershot, non-integrated approach to consolidation. There is a better, more secure way, grounded in servers and software platforms built from the ground up to work optimally with one another. 
(WHITE PAPER) READ ABSTRACT |

5 Cloud Security Concerns You Must Address by Hewlett-Packard Company

May 2012 - (Free Research)
This white paper explains why security is a top deterrent to cloud adoption. Discover threats to consider when evaluating cloud for your organization and learn how to minimize risk by establishing an effective defense strategy. 
(WHITE PAPER) READ ABSTRACT |

CW Europe – March Edition by ComputerWeekly.com

March 2013 - (Free Research)
Never have we been so open about the information we share online, without so little concern for our privacy. In this issue of CW Europe read how the increase in social media usage has created new privacy concerns for businesses. 
(EZINE) READ ABSTRACT |

1 - 25 of 476 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts