Rfi NewWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Rfi New returned the following results.
RSS What is RSS?
Related Categories

 •   Network Security
 •   Intrusion Prevention Solutions
 •   Anti-Virus Solutions
 •   Security Monitoring
 •   Intrusion Detection/ Forensics
 •   Storage Security
 •   Data Security
 •   Content Delivery Networks/ Web Application Acceleration
 •   Virtualization
 •   Wi-Fi

Related Searches
 •   Cases Rfi
 •   Designs Rfi New
 •   Development Rfi
 •   International Rfi
 •   Internet Based Rfi New
 •   Manufacturing Rfi New
 •   Planning Rfi New
 •   Resource Rfi New
 •   Rfi New Buys
 •   Rfi New Faqs
Advertisement

ALL RESULTS
1 - 25 of 458 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Preparing an RFI for Virtualization and the PCI Data Security Standard by HyTrust

March 22, 2011 - (Free Research)
This paper discusses how protecting cardholder data is a critical and mandatory requirement for all organizations that process, store or transmit information on credit or debit cards and the requirements and guidelines for securing cardholder data are specified in the Payment Card Industry (PCI) Data Security Standard (DSS). 
(WHITE PAPER) READ ABSTRACT |

Antimalware: RFP Technology Decisions Guide

by SearchSecurity.com

April 18, 2012 - (Free Research)
<p>Part 2 of SearchSecurity.com's 3-part guide on antimalware products offers expert insight into gathering pertinent information into the technical information necessary to move forward in the RFI process. Get an overview of technical requirements, questions to ask potential vendors, and a list of products that may meet your needs. </p> 
(VIRTUAL SEMINAR) READ ABSTRACT |

Antimalware IT Checklist: RFP Technology Decisions Part 2 by SearchSecurity.com

April 11, 2012 - (Free Research)
Part 2 of SearchSecurity.com's 3-part guide on antimalware products offers expert insight into gathering pertinent information into the technical information necessary to move forward in the RFI process. Get an overview of technical requirements, questions to ask potential vendors, and a list of products that may meet your needs. 
(EGUIDE) READ ABSTRACT |

Wireless LAN ITDC - Checklist #2 by SearchSecurity.com

October 22, 2012 - (Free Research)
Download this quick read to get an overview of technical requirements for wireless solutions, questions to ask potential vendors, and a list of vendors that have products that may meet your needs. 
(EGUIDE) READ ABSTRACT |

Big data: New insights transform industries by IBM

December 18, 2013 - (Free Research)
Access the following white paper to uncover how companies are leveraging new analytics technology and practices to stay ahead of the big data curve. Discover how you can gain the actionable intelligence you need and what you can do to gain a sharper competitive edge. 
(WHITE PAPER) READ ABSTRACT |

Gartner: The Need for Next-Generation WAN Optimization Solutions by BlueCoat

August 30, 2011 - (Free Research)
Join Gartner Research VP Joe Skorupa as he navigates technical considerations and offers new ways to address your quality of service objectives. Learn how next generation WAN Op solutions can significantly reduce bandwidth costs, enable new SaaS and video initiatives, and optimize access to new business tools. 
(PODCAST) READ ABSTRACT |

Microsoft and SAP Announce New Cloud, Data and Mobile Experiences by SAP America, Inc.

May 19, 2014 - (Free Research)
SAP and Microsoft have maintained a long-term global partnership, but with new cloud, data, and mobile offerings, this partnership is taking things to the next level. In this press release, discover the exciting new projects that stem from the Microsoft-SAP collaboration and learn how they can benefit your business. 
(PRESS RELEASE) READ ABSTRACT |

On-Demand Seminar iOS7 for Business by Apple Inc. (E-mail this company)

April 29, 2014 - (Free Research)
Join us for a 30-minute online seminar with Apple Business Experts to learn about what’s new in iOS7 for business. 
(WEBCAST) READ ABSTRACT |

Extend the Life of Your Data Center by Chatsworth Products, Inc. (E-mail this company)

August 30, 2013 - (Free Research)
This whitepaper explains how implementing an effective airflow containment architecture in the data center can add enough life to an existing system and "buy" enough time to bring on new space intelligently – and perhaps even remove the need for new construction. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: New Malware Threats Require New Antimalware Protection Strategy by SearchSecurity.com

December 05, 2012 - (Free Research)
This expert e-guide examines emerging threats and malware that are targeting smartphones, mobile apps, social media, and cloud services. Inside, discover essential strategies and best practices for mitigating these risks and ensuring enterprise security. 
(EGUIDE) READ ABSTRACT |

Malware Attacks Demand a New Malware Defense Approach by SearchSecurity.com

June 19, 2013 - (Free Research)
Customized, targeted malware attacks require new defense measures beyond those currently in place. This e-guide from SearchSecurity.com offers advice on protecting your organization from these new threats. View now to learn more! 
(EGUIDE) READ ABSTRACT |

E-Book: New Enterprise Desktop Chapter 3: Windows 7 Security: Strengths and Weaknesses by SearchDataCenter.com

August 17, 2011 - (Free Research)
Each new OS is touted as the “Holy Grail” of features that every IT pro has been waiting for. Windows 7 is no different. This chapter looks at the Windows 7 security features such as BitLocker and Action Center, and separates those that really count from those that sound better on paper. 
(EBOOK) READ ABSTRACT |

Exploring new web browser security capabilities by SearchSecurity.com

October 04, 2012 - (Free Research)
New threats are created on a regular basis and businesses need to be prepared for the risks. View this expert E-Guide to explore some of the new security capabilities of web browsers and how they help prevent attacks. Learn more about the features that strengthen the security of Web gateway's by consulting this asset. 
(WHITE PAPER) READ ABSTRACT |

Protecting Your Enterprise Network by Infoblox

August 30, 2013 - (Free Research)
This comprehensive white paper provides deeper insight into enterprise IT security threats and the implementation of modern tools that are available to build more robust domain name server (DNS) infrastructures, including DNS firewalls to close security gaps. 
(WHITE PAPER) READ ABSTRACT |

New Zealand is taking the lead in cloud success: What are they doing right? by SearchDataCenter.com

April 04, 2014 - (Free Research)
This issue looks at the adoption of a cloud code of practice for suppliers in New Zealand. 
(EZINE) READ ABSTRACT |

Computer Weekly - 19 June 2012: How to succeed at desktop virtualisation by ComputerWeekly.com

June 19, 2012 - (Free Research)
In this week’s Computer Weekly, our latest Buyer's Guide examines best practice in desktop virtualisation. We ask if a six-year-old technology could be a key to tackling IT security threats. And we look at how universities are dealing with their IT challenges as they await the first intake of students at new higher tuition fees. Read the issue now. 
(EZINE) READ ABSTRACT |

Countdown: Top 5 technologies to help battle the new spam threat by Trend Micro, Inc.

November 27, 2007 - (Free Research)
In this featured podcast, Michael Cobb counts down the top 5 ways for your company to battle new and evolving spam threats, and discusses the pros and cons of current antispam technologies. 
(PODCAST) READ ABSTRACT |

Accelerate Innovation & Productivity with Rapid Prototyping and Development: Model New Ideas, Land More Business, and Control Costs by Attivio, Inc.

February 24, 2010 - (Free Research)
This paper discusses how a new generation of platforms in the application stack is designed to both deliver a specific layer of functionality and enable rapid prototyping, allowing development teams to focus their efforts on the value they add and gain time for more innovation. 
(WHITE PAPER) READ ABSTRACT |

The new business of technology: extend, transact and optimize by IBM

July 31, 2012 - (Free Research)
New opportunities for engagement bring with them new requirements for IT workloads and system structures. This resource outlines a three-part approach for extending SOA principles to outside business engagements: extending applications, processes and services, transacting with integrity, scale and speed, and optimizing business operations. 
(WHITE PAPER) READ ABSTRACT |

Red Hat and Intel: New Horizons in Scalable Performance, Reliability, Security, and Efficiency by Red Hat and Intel

December 18, 2013 - (Free Research)
This whitepaper talks more about how Red Hat Enterprise Linux combined with the power of Intel Xeon processors can help IT stay above workload management and set your business on the path towards a new computing environment. 
(WHITE PAPER) READ ABSTRACT |

Cisco IBSG Global Research Reveals New Ways for Banks To Prosper in an Omnichannel World by Cisco Systems, Inc.

August 17, 2012 - (Free Research)
Banking customers worldwide are ready for an omnichannel experience – are you ready to give it to them? This resource describes the concept of omnichannel banking, why your customers need it, and why you shouldn't wait to offer it to them. 
(WHITE PAPER) READ ABSTRACT |

Human Capital: The New Measure of Performance in Manufacturing by Kronos Incorporated

October 15, 2010 - (Free Research)
This paper explains how workforce selection - using science-based Behavioral Assessments to screen, select, and hire the best talent - is emerging as a vital new source of strategic advantage for manufacturers. Read on to learn how using behavioral assessments to hire new employees can greatly improve the accuracy of hiring decisions. 
(WHITE PAPER) READ ABSTRACT |

SingTel Selects Alcatel-Lucent as Strategic Partner in IPTV Deployment by Alcatel-Lucent

June 12, 2009 - (Free Research)
Read this case study to learn how SingTel, a major carrier in the Asia-Pacific region, overcame the challenges associated with providing new services and broadening their customer base. The solution allowed them to provide advanced IPTV features - including HD VoD - quickly and at aggressive prices, thereby affirming their place as a market leader. 
(CASE STUDY) READ ABSTRACT |

The Future Carrier Network: Adopting New Outsourcing Business Models by Alcatel-Lucent

November 2008 - (Free Research)
This paper is meant to help operators embrace a new strategy for differentiating and competing successfully in a market characterized by flux. 
(WHITE PAPER) READ ABSTRACT |

The Coming Carrier Network Infrastructure - A Very Different Landscape New Partnerships, New Business Models for Tomorrow's Telcos by Alcatel-Lucent

May 2008 - (Free Research)
To compete in this new environment, operators are rethinking their business models and are turning to outsourcing arrangements as a way to enhance their competitive positioning. Ownership of the network infrastructure is increasingly being viewed a... 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 458 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts