Scheduling Enforce Security Case StudyWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Scheduling Enforce Security Case Study returned the following results.
RSS What is RSS?
Related Categories

 •   Network Security
 •   Data Security
 •   Virtualization
 •   Mobile Device Management
 •   Application Security
 •   Business Process Management (BPM)
 •   Enterprise Data Protection and Privacy
 •   Enterprise Resource Planning (ERP)
 •   Business Process Automation
 •   Wireless Security

Related Searches
 •   Collection Scheduling
 •   Functions Scheduling Enforce Security
 •   Scheduling Change
 •   Scheduling Enforce Knowledge
 •   Scheduling Enforce Security Cycle
 •   Scheduling Enforce Security Diagram
 •   Scheduling Enforce Security Expert
 •   Scheduling Enforce Security Schemas
 •   Scheduling Enforce Security Strategy
 •   Scheduling Maintain
Advertisement

ALL RESULTS
1 - 25 of 452 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

NETGEAR ProSecure STM150 Helps Prepress Solutions Provider Double its Sales Prospects by NETGEAR Inc.

December 17, 2010 - (Free Research)
Agfa Graphics is a world leader in prepress solutions for the printing and publishing industries. Read this case study to learn how they maximize productivity gains from virtualization technology, without sacrificing network security with NETGEAR ProSecure STM150. 
(CASE STUDY) READ ABSTRACT |

NETGEAR Prosecure Security Threat Management by NETGEAR Inc.

October 20, 2010 - (Free Research)
An end-point solution for each threat was not a cost-effective solution, and paying for security on a per-user license basis was clearly out of the question. What’s more, a number of appliances only protected either web or email, but not both at the same time. Read this case study to learn more about an effective solution to these problems. 
(CASE STUDY) READ ABSTRACT |

Adventist Health System Uses FalconStor® VTL with Deduplication by FalconStor Software

December 31, 2011 - (Free Research)
This one-page case study explores how one vendor's DR solution helped an organization reduce their backup window by more than 50%, shrink their duplicate data with an average deduplication ratio of 7:1 and maximize their efficiency through reporting and capacity planning capabilities. 
(CASE STUDY) READ ABSTRACT |

Automotive Dealership Takes Control and Enhances Employee Productivity with NETGEAR® UTM Appliances by NETGEAR Inc.

May 04, 2011 - (Free Research)
Find out how Netgears UTM appliance helped an auto dealership solve all their network security issues. 
(CASE STUDY) READ ABSTRACT |

Case Study: HyTrust Enables University of California, Berkeley, to Cost-Effectively Enhance and Secure Its Virtualization Capabilities by HyTrust

July 01, 2011 - (Free Research)
With over 30 different divisions, including 350 different academic programs, the pressures on UC Berkeley's data center are phenomenal. This resource, a case study of UC Berkeley's implementation of the HyTrust Appliance, reveals how IT administrators have truly maximized the potential of the virtualized environment. 
(CASE STUDY) READ ABSTRACT |

Beaufort Memorial Hospital Case Study by VMware, Inc.

July 16, 2013 - (Free Research)
This informative case study details how a healthcare facility used a desktop virtualization solution to reduce desktop provisioning time, cut login time in half and dramatically improve security and productivity. 
(CASE STUDY) READ ABSTRACT |

Case Study: Park Nicollet Protects Vital SharePoint Data and Meets Compliance Objectives with DocAve by AvePoint, Inc.

August 01, 2011 - (Free Research)
This case study describes how Park Nicollet Health Services was able to leverage AvePoint's DocAve to meet crucial compliance objectives and protect vital SharePoint data. 
(CASE STUDY) READ ABSTRACT |

Food Manufacturer Extends Its Workforce with Secure Remote Access by Cisco Systems, Inc.

April 2008 - (Free Research)
This case study describes how one of the most well-known food producers and distributors achieved cost savings, increased productivity, and solved business challenges through deployment of the Cisco Adaptive Security Appliance (ASA) VPN Edition. 
(CASE STUDY) READ ABSTRACT |

Eagle Bank Keeps Deposits and Customer Data Safe by Imprivata

February 2010 - (Free Research)
This case study highlights one bank's successful enforcement of a strong password policy by implementing a single sign-on (SSO) solution. Read on to learn how you can maintain GLBA compliance, and reduce IT's access management. 
(WHITE PAPER) READ ABSTRACT |

The Total Economic Impact of Lumension Security's Sanctuary by Lumension

September 2007 - (Free Research)
Lumension&#39s Sanctuary Application and Device Control is an IT-driven solution that automatically enforces endpoint security policies. The financial impact of moving from a &#34voluntary&#34 compliance solution to an &#34automatic&#34 one is illustrated 
(WHITE PAPER) READ ABSTRACT |

Robot/ SCHEDULE Enterprise: Improves Quality of Life at Farm Credit Bank of Texas by Help/Systems

October 2009 - (Free Research)
Read this case study to see how FCBT used Robot/ SCHEDULE to connect and coordinate their job scheduling needs across multiple systems. 
(CASE STUDY) READ ABSTRACT |

Network Security 2.0: A Systems Approach to Threat Mitigation Augments Defense in Depth by Cisco Systems, Inc.

May 2008 - (Free Research)
In the first edition of a six part series on Network Security sponsored by Cisco Systems, security architecture is the focus. Specifically covered is a systems approach that builds on IT security investment using System Management for policy, reputation and identity. 
(WHITE PAPER) READ ABSTRACT |

Honeywell Schedules Big Profits for its Clients with FICO Xpress Optimization Suite by FICO

March 2011 - (Free Research)
In this case study learn how Honeywell used FICO Xpress Optimization Suite solution – a world class optimization software that’s transparent to the end user – to improve scheduling decisions. 
(CASE STUDY) READ ABSTRACT |

Case Study: German TV Broadcaster RTL II Accelerates Content Delivery with Storage Solutions from SGI by SGI

June 2011 - (Free Research)
As a TV station offering programming around the clock, the requirements of a storage solution for digital media content at RTL II are both clear and sophisticated: the technologies used must be state of the art in order to meet the demanding IT performance requirements, as large data volumes need to be transferred at top speeds. 
(CASE STUDY) READ ABSTRACT |

US Airways Standardizes WFM Across All Contact Centers by Aspect

September 2013 - (Free Research)
After a merger, US Airways was struggling with a great disparity between the applications used across its five call centers. It was evident that US Airways needed a single workforce management tool across all contact centers, in order to solve scheduling issues and better forecast call volume. 
(CASE STUDY) READ ABSTRACT |

Case Study: Healthcare Organization Reduces Downtime during Migration by Vision Solutions

April 2014 - (Free Research)
This brief case study explores how a healthcare organization found a solution to significantly cut downtime while also eliminating staff scheduling problems during migration. 
(CASE STUDY) READ ABSTRACT |

The Total Economic Impact of Lumension Security’s Sanctuary Application And Device Control by Lumension

September 2012 - (Free Research)
Consult this study to find out more about the financial impact of moving from "voluntary" compliance solution to an IT-driven solution that automatically enforces endpoint security policies. Read in-depth interviews with John C. Lincoln hospitals to see the benefits first-hand. 
(WHITE PAPER) READ ABSTRACT |

Recovery Manager for Active Directory by Dell Software

Quest Recovery Manager for Active Directory offers an easy-to-use solution for fast, granular, online recovery of Active Directory (AD) in the event of inadvertent modification of AD due to software failure or human error. 
(ASP & SOFTWARE PRODUCT)

JReport Solution Study: KANA Software by Jinfonet Software

July 2009 - (Free Research)
This case study looks at the Success KANA has had after implementing JReport from Jinfonet. KANA needed a reporting solution that could provide easy setup, intuitive reports for end-users, and the ability to run ad hoc reports and change settings like report type, date, etc. Read on to learn more about this great reporting solution. 
(CASE STUDY) READ ABSTRACT |

Case Study: Microsoft® Technology Center Reduced SharePoint 2010 Migration by Two Months with DocAve® by AvePoint, Inc.

June 2011 - (Free Research)
Migrating from SharePoint 2007 to the 2010 platform comes with a host of challenges. This brief case study shows how a leading New York City technology center saved time and money with a migration solution. 
(CASE STUDY) READ ABSTRACT |

Case Study - International Herald Tribune by Riverbed Technology, Inc.

May 2011 - (Free Research)
In this case study, learn how International Herald Tribune (IHT) was able to gain insight into their WAN traffic and a true end-to-end view of the application delivery path from servers to desktops using Riverbed Cascade™. 
(CASE STUDY) READ ABSTRACT |

New York Stock Exchange Chooses Juniper for Next-Generation Datacenters by Juniper Networks, Inc.

July 2009 - (Free Research)
This IDC Buyer Case Study examines the decision of NYSE Euronext to choose Juniper Networks as the primary supplier for the company's datacenter, Ethernet switching, and routing needs. Read on to learn more about how Juniper Networks is bringing the New York Stock Exchange into the twenty-first century. 
(CASE STUDY) READ ABSTRACT |

Computer Weekly Buyers' Guide: Cloud Computing by ComputerWeekly.com

January 2011 - (Free Research)
This seven-page Buyer’s Guide to Cloud Computing by Computer Weekly journalists details the kinds of cloud offering that CIOs and senior IT professionals will need to take into account as they plan future outsourcing, hosting and application strategies. 
(ESSENTIAL GUIDE) READ ABSTRACT |

New Opportunities for Business Intelligence: Five Ways to Enhance Governance and Compliance for Greater Control Now by Information Builders

December 2012 - (Free Research)
This white paper describes five innovative technology-driven solutions that can help companies to overcome the challenges in implementing and enforcing formal GRC policies and procedures. 
(WHITE PAPER) READ ABSTRACT |

Symmons Industries turns up the pressure on larger competitors with IBM Business Analytics software by IBM

November 2013 - (Free Research)
Access this fascinating case study today to see how Symmons - a mid-sized, US-based manufacturer in the plumbing industry - implemented expert solutions that enabled production-line staff to adapt manufacturing schedules and meet demands in real time, and much more! 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 452 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts