Samples Security IBM SupplierWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Samples Security IBM Supplier returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Network Security
 •   Business Intelligence Solutions
 •   Storage Management
 •   Security Monitoring
 •   Database Administration
 •   Databases
 •   Managed Security Services
 •   Application Security
 •   Database Planning and Implementation

Related Searches
 •   Event Samples Security
 •   Forms Samples Security
 •   Operations Samples
 •   Research Samples Security IBM
 •   Samples Security IBM Graphs
 •   Samples Security IBM Summary
 •   Samples Security IBM Training
 •   Samples Security Infrastructure
 •   Samples Security Screen
 •   Specialists Samples Security
Advertisement

ALL RESULTS
1 - 25 of 497 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Tips on Implementing Database Auditing to Address Security & Compliance Requirements  by IBM

December 03, 2010 - (Free Research)
Implementing Database Security and Auditing (Elsevier Digital Press) is the definitive guide for information security professionals, DBAs and auditors. You can now download Chapter 12, “Auditing Categories”.  In this chapter, you’ll learn which audit logging trails you need to address key security and compliance requirements. 
(BOOK) READ ABSTRACT |

crystalreports.com: Web-Based Reporting & Information Sharing by Business Objects

crystalreports.com is a web-based report-sharing service that allows organizations to instantly share crucial business information with the right people - simply and securely. There is nothing to install, and places no additional workload on IT. It improves decision makers’ ability to make key business decisions based on timely and accurate data. 
(SOFTWARE PRODUCT)

Excerpts from Virus Bulletin Comparative Reviews August-December 2010 by ESET

March 16, 2011 - (Free Research)
The basic requirements for a product to achieve VB100 certification status are that a product detects, both on demand and on access, in its default settings, all malware known to be ‘In the Wild’ at the time of the review, and generates no false positives when scanning a set of clean files. 
(WHITE PAPER) READ ABSTRACT |

Analytics - the new path to value by IBM

November 15, 2011 - (Free Research)
To better understand how today's organizations are using analytics, a survey was conducted amongst a global sample of nearly 3,000 executive managers and analysts. Based on the results, this study offers recommendations on how organizations can strengthen their analytics capabilities to achieve a long-term advantage. 
(EBOOK) READ ABSTRACT |

IBM SOA Sandbox Trial - WebSphere eXtreme Scale by IBM

October 12, 2010 - (Free Research)
This exercise will let you see a sample WAS exercise running with standard WebSphere Application Server HTTP Session management and enhanced with eXtreme Scale HTTP Session management. 
(TRIAL SOFTWARE) READ ABSTRACT |

The Value of PowerVM Workload Partitions: New Virtualization Options in IBM AIX v6.1 by IBM

January 16, 2009 - (Free Research)
This white paper from the Sageza Group, Inc. explains why Workload Partitions (WPARs) are a more cost-effective way to meet the needs of your organization. 
(WHITE PAPER) READ ABSTRACT |

ESET: Threat Center by ESET

September 02, 2010 - (Free Research)
IT managers need new solutions to combat ever changing threats to their security. ESET’s Internet Threat Map app shows you a map of global Infection rates, based on our daily analysis of over 100,000 samples of malware of all types. 
(PRODUCT DEMO) READ ABSTRACT |

Harness the Power of Big Data: The IBM Big Data Platform by IBM

August 31, 2013 - (Free Research)
This extensive e-book examines the topic of big data in depth. Access this six part book to examine details on in-motion and at-rest analytics, get big data use cases, gain confidence in your big data project, and much more. 
(EBOOK) READ ABSTRACT |

Enhance Business Insight and Scalability of XML Data with New DB2 9.7 pureXML Features by IBM

March 18, 2011 - (Free Research)
This is a developerWorks article. This article summarizes the new pureXML capabilities, explains how they can be used, and discusses sample application scenarios. 
(TECHNICAL ARTICLE) READ ABSTRACT |

Self-Management of Passwords (SMOP) Version 1.1 by turbo-IT Corporation

May 17, 2011 - (Free Research)
Active Directory users often have their accounts locked out or forget their passwords.  This download empowers users to perform self service password resets and unlock their accounts eliminating helpdesk calls resulting in increased productivity and reduced costs. 
(DEMO) READ ABSTRACT |

Pervasive Data Profiler v4 by Pervasive Integration

January 2008 - (Free Research)
Pervasive Data Profiler™ ensures data quality. Proactively audit all types of data; automate testing against changing business data quality needs and compliance regulations. Get hyper-fast, multithreaded processing of large data sets or sample data 
(WHITE PAPER) READ ABSTRACT |

Global Data Deduplication Results with NetBackup PureDisk by Symantec Corporation

February 2008 - (Free Research)
At the heart of NetBackup PureDisk customers will find flexible deduplication technology, a highly scalable software-based storage system, and integration with NetBackup for greater functionality. 
(WHITE PAPER) READ ABSTRACT |

The Modern Malware Review: Analysis of New and Evasive Malware in Live Enterprise Networks by Palo Alto Networks

March 2013 - (Free Research)
This crucial paper discusses the latest malware threats, analyzing more than 1,000 organizations and examining the malware samples that were initially undetected by industry-standard security solutions. 
(WHITE PAPER) READ ABSTRACT |

The Total Economic Impact™ of Dell's Server Virtualization Solutions by Dell, Inc. and Intel®

February 2009 - (Free Research)
In late 2008, Forrester Research commenced work on a research project commissioned by Dell, Inc., that focused on examining the potential return on investment (ROI) enterprises may realize by adopting Dell's server virtualization solutions in conjunction with VMware's ESX server and virtualization platform. Read this study to discover key findings. 
(ANALYST REPORT) READ ABSTRACT |

Hands-on Oracle Application Express security by ComputerWeekly.com

November 2013 - (Free Research)
This book extract demonstrates how Oracle Application Express (APEX) can be vulnerable to SQL injection, using sample code. 
(BOOK) READ ABSTRACT |

Exposing the Beast - Custom API Mgt for the Enterprise by Intel Corporation

November 2013 - (Free Research)
In this exclusive webcast, explore the key enterprise categories for B2B, internal, and open Web API models and discover sample use cases that highlight how an API platform simplifies API delivery and management. 
(WEBCAST) READ ABSTRACT |

Computer Weekly – 8 April 2014: Cloud wars by ComputerWeekly.com

April 2014 - (Free Research)
In this week's Computer Weekly, cloud users are set to benefit from cheaper services as Google and Amazon start a price war. The mainframe is still not dead yet – we look at 50 years of the IBM mainframe. And we assess the latest attempt to encourage overseas IT experts to fill the UK's skills shortages. Read the issue now. 
(EZINE) READ ABSTRACT |

FAQ: Gain Business Advantages through Operational Analytics: Empowering Near Realtime Decision Making by IBM

July 2013 - (Free Research)
In this Q and A, Dr. Barry Devlin, Founder, 9sight Consulting, will discuss the business value and technological foundations of operational analytics. He'll also explore how to bridge the business need for operational analytics with technology capabilities, as well as the business drivers for immediate decision making and action taking. 
(TRANSCRIPT) READ ABSTRACT |

Making the Right Move to a Managed Service Provider for SSL VPN by MegaPath Inc.

March 2010 - (Free Research)
Adoption of SSL VPNs is growing rapidly. A sample of areas in which SSL VPNs can help include serving more communities, supporting more access environments, providing access without application and network changes, enforcing compliance, protecting the network, quickly modifying access policies, and ensuring business continuity. 
(WHITE PAPER) READ ABSTRACT |

 Safer web browsing in four steps by Sophos, Inc.

October 2010 - (Free Research)
Accessing the web poses enormous risks, yet you can’t afford to be isolated from the internet and its resources. This white paper examines the latest web threats, and recommends four best practices and a layered approach that enables your users while also protecting your organization’s endpoints, network and data. 
(WHITE PAPER) READ ABSTRACT |

Symantec Report on Rogue Security Software by Symantec Corporation

October 2009 - (Free Research)
The Symantec Report on Rogue Security Software is an in-depth analysis of rogue security software programs. Read this report to learn the specifics about security software scams. 
(WHITE PAPER) READ ABSTRACT |

Total Economic Impact of Oracle Enterprise Manager Database Management Packs by Oracle Corporation

February 2008 - (Free Research)
This study highlights the benefits and costs of deploying the Oracle Enterprise Manager Diagnostic Pack and Tuning Pack across the enterprise of a sample organization. The study examines the estimated ROI for the sample organization and presents aggregate findings derived from the interview and analysis process and Forrester's independent research. 
(WHITE PAPER) READ ABSTRACT |

State of DNS Availability Report by Verisign, Inc.

November 2011 - (Free Research)
This domain name system (DNS) availability report illustrates the risks and impact that site downtime can have on revenue generation, business continuity, customer loyalty and more. 
(WHITE PAPER) READ ABSTRACT |

Digital Trust in the Cloud: Liquid Security in Cloudy Places by CSC

November 2011 - (Free Research)
While some individual users are experimenting with cloud processing, other users have already fully committed to the cloud as an important part of their enterprise architecture and operation. Read this white paper to learn about the evolution of cloud processing and whether or not the cloud processing boom will continue. 
(WHITE PAPER) READ ABSTRACT |

DNS Attack Prevention: Inside DNS Components Vulnerable to Attack by F5 Networks

January 2014 - (Free Research)
In this expert e-guide, industry leader Char Sample explains why the domain name system (DNS) is an attractive target for hackers, and which of its 4 components is most vulnerable. Click now to also unveil 3 mitigation tactics. 
(EGUIDE) READ ABSTRACT |

1 - 25 of 497 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts