Search Security Operations CenterWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Search Security Operations Center returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Enterprise Information Integration/ Metadata Management
 •   Enterprise Search / Search Engines
 •   Storage Management
 •   Data Center Management
 •   Network Security
 •   Enterprise Content Management (ECM)
 •   Storage Security
 •   Application Security
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)

Related Searches
 •   Consulting Search Security
 •   Cycle Search
 •   Display Search Security Operations
 •   Papers Search
 •   Policy Search Security Operations
 •   Remote Search Security Operations
 •   Search Security Budgets
 •   Search Security Imports
 •   Search Security Operations Methods
 •   Search Webinars
Advertisement

ALL RESULTS
1 - 25 of 458 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Eguide: Addressing Mobile, Laptop and "Big Data" Backup by CommVault Systems, Inc.

February 21, 2012 - (Free Research)
Learn about a deduplication solution designed for remote laptop and desktop data management that can help you overcome today's mobile backup and security challenges. With the ability to search, access and recover content through any Windows, Apple or Android device, this technology can begin simplifying your remote management operations today. 
(EGUIDE) READ ABSTRACT |

Hitachi Data Systems Object Storage Solutions by Hitachi Data Systems

February 16, 2012 - (Free Research)
As unstructured data continues to grow, organizations are searching for new ways to increase the value of their storage resources. This resource explores a set of intelligent, object-based storage solutions able to support diverse use cases, from a single cluster, simultaneously, to enabling more efficient operations while increasing IT agility. 
(WHITE PAPER) READ ABSTRACT |

Collect, store, analyze all your operations log data by Hewlett-Packard Company

June 09, 2014 - (Free Research)
View this webcast to learn about an operations log intelligence program that enables you to easily collect, centralize, archive and search your log files. Watch now for a brief demonstration of this software and explore the many benefits it can offer your organization. 
(WEBCAST) READ ABSTRACT |

Creating Network-Aware Service Management by Microsoft

January 2008 - (Free Research)
The integration of EMC® Smarts® and Microsoft® System Center Operations Manager 2007 delivers the capabilities IT departments need to enable network-aware service management. 
(WHITE PAPER)

FAQ Guide: How to Build an Efficient Data Storage Environment by FileTek, Inc. (E-mail this company)

April 2012 - (Free Research)
This Q&A is here to help you get your storage on the right track - read on to discover how you can create a more efficient storage infrastructure today. 
(EGUIDE) READ ABSTRACT |

DCIG Buyer's Guide: Deduplicating Backup Appliance Under $50K by ExaGrid Systems, Inc.

September 2013 - (Free Research)
This resource presents its 2013 midrange deduplicating backup appliance buyer's guide for systems $50K and below. It puts at the fingertips of organizations a comprehensive list of deduplicating backup solutions and the features they offer in the form of detailed, standardized data sheets that can assist them in the important buying decision. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Managing Windows with IT Search by Splunk

April 2009 - (Free Research)
Read this presentation transcript of the “Managing Windows with IT Search” podcast with Windows Specialist and Director of Product Management at Splunk, Johnathon Cervelli, to learn how IT Search can help you dramatically simplify Windows Systems Management. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Forum XWall - Web Services Security Firewalls - Prevent Unauthorized Access by Forum Systems

Forum XWall™ is the industy's first Web Services Firewall equipped with data authentication as well as XML intrusion prevention to actively protect against unauthorized access, XML viruses, data corruption and denial of Web service attacks. Forum Systems is the leader in Web Services Security. 
(SOFTWARE PRODUCT)

The MATH, MYTH, & MAGIC: An Introduction to Identity Data Search-and-Match by Informatica

December 2008 - (Free Research)
This book is of value to both the person who is tackling a "name search" and "name matching" problem for the first time, as well as to the experienced specialist in "identification and search" systems. 
(BOOK) READ ABSTRACT |

Thomson Reuters Unleashes New Products with a Shared IT Infrastructure Built on NetApp by NetApp

January 2012 - (Free Research)
This case study outlines a recent development in Thompson Reuters' legal research service. In this study, you'll learn about the infrastructure technologies and solutions Reuters' implemented in order to successfully engineer this enhanced search platform, and learn about the benefits it brought the company. Read on for more. 
(CASE STUDY) READ ABSTRACT |

Best Practices for DR in the Cloud by SunGard Availability Services

January 2012 - (Free Research)
This E-Guide is your ticket to learning today's best practices regarding DR in the cloud. Discover eight scenarios in which a private cloud is more valuable than traditional DR solutions, understand the pros and cons associated with disaster recovery in the cloud, and learn which types of organizations can benefit most from such a solution. 
(EGUIDE) READ ABSTRACT |

E-Guide A Decision Maker’s Guide to Log Management by ArcSight, an HP Company

October 2010 - (Free Research)
While often underappreciated by IT professionals, logs are an extremely useful source of data for IT shops. Often undervalued as a strategic weapon, log management tools can play a vital role in securing mission-critical data and assuring accountability. Learn what to consider when it’s time to get a handle on your logs. 
(EGUIDE) READ ABSTRACT |

TiVo Reduces Call Center Costs by Google Search Appliance

November 2010 - (Free Research)
Implementing the Google Search Appliance not only reduced the amount of time TiVo's Customer Support Agents spent searching for content, it also reduced time spent on the phone with customers, ultimately leading to reduced call center costs. Watch this video. 
(VIDEO) READ ABSTRACT |

Webinar: Implementing Powerful IT Search on the Cloud by RightScale

March 2010 - (Free Research)
Traditional, static approaches to managing IT data simply aren't built for the cloud. In this webinar, Splunk provides an alternative that is dynamic and easily deployed using the RightScale Platform. 
(WEBCAST) READ ABSTRACT |

Achieving Actionable Insights from IT Operations Big Data by IBM

November 2013 - (Free Research)
IT operations faces a data deluge, at the same time as they're trying to keep up with a higher demand for service and a shrinking response window for when things go wrong. But with analytics for IT operations, you can turn terabytes of monitoring data into actionable insights that allow IT to take a proactive approach to application performance. 
(VIDEO) READ ABSTRACT |

In Search of Clarity: Unraveling the Complexities of Executive Decision-making by Business Objects

April 2008 - (Free Research)
Decision-making is at the core of all business activity, as executives set strategy and manage operations by weighing a vast array of factors to arrive at the desired balance of risk and reward. 
(WHITE PAPER) READ ABSTRACT |

HP-UX 11i v3 Operating Environments - Simplify UNIX operations with the right package by HP & Intel®

February 2011 - (Free Research)
This data sheet provides expert instructions on how to simplify UNIX operations with the HP-UX 11i. 
(DATA SHEET) READ ABSTRACT |

HP Operations Analytics: a New Analytics Platform to Support the Transformation of IT by Hewlett-Packard Limited

June 2013 - (Free Research)
What is operations analytics? Learn about an advancement in predictive analytics that allows you to forecast IT issues, identify topology changes, prevent business impact and optimize IT performance. 
(WHITE PAPER) READ ABSTRACT |

Recovery Manager for SharePoint by Dell Software

Recovery Manager for SharePoint is an enterprise recovery solution that provides emergency access to all SharePoint content all the time. With Recovery Manager, any recovered content can be restored to any SharePoint instance or saved to a file system. Get your business-critical data back online before the entire server farm comes back. 
(ASP & SOFTWARE PRODUCT)

Business Intelligence for CMOs by IBM

December 2010 - (Free Research)
This paper introduces you to the business intelligence solutions that can meet the needs of marketing- from CMOs to brand managers and marketing operations analysts to search engine marketing managers and campaign strategists. 
(WHITE PAPER) READ ABSTRACT |

Identity Finder Enterprise Suite 4.5 by Identity Finder, LLC

July 2010 - (Free Research)
Identity Finder accurately finds and allows remediation of sensitive data across desktops, laptops, servers, databases, and websites. This can be performed agent or agentlessly with full dynamic policy and reporting capability. 
(TRIAL SOFTWARE) READ ABSTRACT |

IBM Rational Asset Manager e-Kit by IBM

March 2009 - (Free Research)
Explore the benefits of Rational Asset Manager with this IBM e-Kit. The e-Kit includes demos, white papers and a webcast. Discover how to track and audit your assets to utilize them for reuse, especially within a service-oriented architecture. 
(PRODUCT DEMO) READ ABSTRACT |

Improving Business Agility with Unstructured Data - The Power of Leveraging the Web, News Feeds, and Customer Commentary in Daily Decisions by Endeca Technologies, Inc.

February 2011 - (Free Research)
This white paper examines how business intelligence platforms can help organize unstructured data such as emails, Word documents, PDF documents, and spreadsheets, posts on Internet message boards and social media websites, and turn it into a useful tool for customer and industry insight. Read on and find out more. 
(WHITE PAPER) READ ABSTRACT |

Secure Search: Balancing Security with the Need for Information Access by EMC Corporation

August 2008 - (Free Research)
This white paper summarizes the issues of secure search for large organizations and explores the pros and cons of traditional enterprise search versus federated search. 
(WHITE PAPER) READ ABSTRACT |

Enterprise Strategy Group (ESG) Report: Today's Information Access Requirements Outpace Open Source Search Options by Attivio, Inc.

March 2010 - (Free Research)
This paper examines the new information access functionality and administrative requirements - including enterprise concerns for scalability, high availability, and fault tolerance - while measuring the ability of current open source alternatives to meet these demands. This report also explores the financial aspects of open source search adoption. 
(ANALYST REPORT) READ ABSTRACT |

1 - 25 of 458 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts