Rfi SingleWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Rfi Single returned the following results.
RSS What is RSS?
Related Categories

 •   Network Security
 •   Content Delivery Networks/ Web Application Acceleration
 •   Intrusion Prevention Solutions
 •   Anti-Virus Solutions
 •   Security Monitoring
 •   Intrusion Detection/ Forensics
 •   Storage Security
 •   Data Security
 •   Endpoint Security
 •   Virtualization

Related Searches
 •   Computing Rfi
 •   Equipment Rfi
 •   List Rfi Single
 •   Methodology Rfi
 •   Methods Rfi Single
 •   Rfi Managing
 •   Rfi Single Conference
 •   Rfi Single Template
 •   Rfi Single Webcasts
 •   Rfi Virginia
Advertisement

ALL RESULTS
1 - 25 of 462 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Preparing an RFI for Virtualization and the PCI Data Security Standard by HyTrust

March 22, 2011 - (Free Research)
This paper discusses how protecting cardholder data is a critical and mandatory requirement for all organizations that process, store or transmit information on credit or debit cards and the requirements and guidelines for securing cardholder data are specified in the Payment Card Industry (PCI) Data Security Standard (DSS). 
(WHITE PAPER) READ ABSTRACT |

Antimalware: RFP Technology Decisions Guide

by SearchSecurity.com

April 18, 2012 - (Free Research)
<p>Part 2 of SearchSecurity.com's 3-part guide on antimalware products offers expert insight into gathering pertinent information into the technical information necessary to move forward in the RFI process. Get an overview of technical requirements, questions to ask potential vendors, and a list of products that may meet your needs. </p> 
(VIRTUAL SEMINAR) READ ABSTRACT |

Antimalware IT Checklist: RFP Technology Decisions Part 2 by SearchSecurity.com

April 11, 2012 - (Free Research)
Part 2 of SearchSecurity.com's 3-part guide on antimalware products offers expert insight into gathering pertinent information into the technical information necessary to move forward in the RFI process. Get an overview of technical requirements, questions to ask potential vendors, and a list of products that may meet your needs. 
(EGUIDE) READ ABSTRACT |

Wireless LAN ITDC - Checklist #2 by SearchSecurity.com

October 22, 2012 - (Free Research)
Download this quick read to get an overview of technical requirements for wireless solutions, questions to ask potential vendors, and a list of vendors that have products that may meet your needs. 
(EGUIDE) READ ABSTRACT |

Addressing Single Sign-On Inside, Outside, and Between Organizations by Prolifics, A Premier IBM Business Partner

December 29, 2008 - (Free Research)
This white paper examines how IBM Tivoli Unified Single Sign-On addresses the needs of organizations for enterprise single sign-on, Web single sign-on, and federated single sign-on. 
(WHITE PAPER) READ ABSTRACT |

Single Point of Access, Single Point of Control by Citrix

January 07, 2014 - (Free Research)
Read on to learn how desktop virtualization can help support remote connectivity better than VPN. 
(WHITE PAPER) READ ABSTRACT |

Protecting Your Intellectual Property: It Starts with a Single Click by TITUS

August 07, 2013 - (Free Research)
Download Aberdeen's latest report to discover how you can protect your intellectual property with a single click. 
(WHITE PAPER) READ ABSTRACT |

Enterprise Single Sign-On The Holy Grail of Computing by Dell Software

October 02, 2009 - (Free Research)
In today's enterprise, IT managers are faced with the growing challenge of keeping track of multiple passwords and system identities. In this document, we'll discuss how Quest approaches enterprise single sign-on and a unique solution that addresses nearly all facets of the challenges. 
(WHITE PAPER) READ ABSTRACT |

Overcoming Single Provider MPLS Limitations by Virtela Communications, Inc.

July 2009 - (Free Research)
In this paper, Frost & Sullivan reviews the limitations associated with taking a single-provider approach to MPLS networks and its impact on the enterprise. They then examine Virtela's Global Service Fabric multicarrier network approach and how it overcomes these limitations to provide a best-of-breed global MPLS network solution. 
(WHITE PAPER) READ ABSTRACT |

Single Vendor Network: Myth or Reality by Avaya

June 2011 - (Free Research)
This white paper presents an analysis conducted by Gartner of hundreds of clients discussing why they introduced a second vendor into their network infrastructure, and the impact it has on operational costs. 
(WHITE PAPER) READ ABSTRACT |

Achieving a Single View of the Citizen With Information Management by Information Builders

December 2012 - (Free Research)
This resource explores how creating a single view of the citizen by consolidating and synchronizing data can empower government agencies to support enhanced, information-based decision-making, improve operational performance, and more. 
(WHITE PAPER) READ ABSTRACT |

The Importance of a Single Platform for Data Integration and Quality Management by Business Objects

September 2008 - (Free Research)
This paper examines the evolution of the data integration and quality industry, and explains the benefits of moving toward a single data services architecture. 
(WHITE PAPER) READ ABSTRACT |

McAfee Total Protection for Secure Business by Insight

March 2010 - (Free Research)
McAfee solutions cover all the critical elements of security medium businesses need: desktop and server protection, data protection, email and web security, and compliance. Total Protection for Secure Business provides comprehensive protection against the most lethal threats and exploits - in one package, from one trusted and proven vendor. 
(WHITE PAPER) READ ABSTRACT |

The Realities of Single Sign-On by PistolStar, Inc.

June 2008 - (Free Research)
Single Sign-On has emerged as a significant technology that resolves a major issue for organizations with multiple platforms, servers and applications requiring unique usernames and passwords for access. 
(WHITE PAPER) READ ABSTRACT |

Secure Internet Single Sign-On (SSO) 101 by Ping Identity Corporation

June 2009 - (Free Research)
Written for anyone interested in understanding how secure Internet SSO works, this white paper explores the limitations of current SSO implementations outside of a single security domain (including identity and access management systems and open source development) and introduces standalone secure Internet SSO as a solution. 
(WHITE PAPER) READ ABSTRACT |

Integrating multiple channels to build a single view of the customer by Genesys

February 2013 - (Free Research)
CEM is about so much more than just technology. It's also important to focus on implementing the right processes to facilitate collaboration across different departments and multiple applications. This expert resource describes proven strategies to optimize resources for CEM. 
(EGUIDE) READ ABSTRACT |

The Always Online Single-Instance Database by Oracle Corporation UK Ltd

December 2009 - (Free Research)
Availability is a growing concern for all customers.  Information, and the databases underlying that information, have become more and more integral to business processes and products. 
(WHITE PAPER) READ ABSTRACT |

Deloitte Consulting Presents: Risk and TCO in Single and Multivendor Networks by Cisco Systems, Inc.

March 2012 - (Free Research)
Can a multivendor network infrastructure actually reduce your overall costs, as some claim? To answer this question, Deloitte Consulting conducted in-depth research looking at enterprises' total cost of ownership (TCO), including capital outlays, operating expenses, and analyzed risks associated with the network. 
(WHITE PAPER)

Buyer’s Guide for Enterprise Single Sign-On by Oracle Corporation

April 2009 - (Free Research)
This whitepaper offers a thorough checklist that should enable potential ESSO implementers to deploy the right ESSO solution which should help eliminate sign-on problems, reduce helpdesk costs, maximize user productivity, strengthen security, simplify administration and accelerate regulatory compliance. 
(WHITE PAPER) READ ABSTRACT |

Unified communications integration: Single vs. multi-vendor environments by SearchSecurity.com

July 2012 - (Free Research)
This e-guide compares the pros and cons of implementing a single versus multi-vendor UC environment, and offers tips for overcoming key UC integration challenges. 
(EGUIDE) READ ABSTRACT |

Extending business intelligence with dashboards by IBM

February 2014 - (Free Research)
Access the following white paper to uncover how by adding a malleable dashboard to your BI and analytics solution you can effectively increase your ability to get the key insights you need to turn a higher profit. 
(WHITE PAPER) READ ABSTRACT |

Shouldn't Single Sign-on Be Child's Play? by Microsoft & Quest Software

October 2008 - (Free Research)
Check out this webcast and learn how your company can improve network efficiency, enhance security, and achieve compliance by integrating Single Sign-On (SSO) technology into the IT infrastructure. 
(WEBCAST) READ ABSTRACT |

Optimized Metro Aggregation Network for Triple Play Services by ECI Telecom

July 2008 - (Free Research)
Learn how the convergence of voice, video and data ("Triple Play") together with relaxed regulatory control have forced service providers to shift towards a combined offering of voice, video, and data service improving their position in the market 
(WHITE PAPER) READ ABSTRACT |

Debunking the Myth of the Single-Vendor Network by Juniper Networks, Inc.

December 2010 - (Free Research)
Read this analyst report to see why most organizations should consider a dual-vendor or multivendor solution as a viable approach to building their network.  Not only are significant cost savings achievable with no increase in network complexity, but there is also an improvement in focus on meeting business requirements. 
(ANALYST REPORT) READ ABSTRACT |

Centrify Express 2010.1 by Centrify Corporation

August 2010 - (Free Research)
Centrify Express is the #1 choice of IT professionals for Active Directory-based single sign-on to Linux and Mac systems.  It is a free solution with more functionality, tools, and upgrade options than alternative offerings. 
(DOWNLOAD)

1 - 25 of 462 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts