Secure CaseWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Secure Case returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Virtualization
 •   Security Policies
 •   Security Monitoring
 •   Application Security
 •   Network Security
 •   Access Control
 •   Enterprise Systems Management
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)
 •   Managed Security Services

Related Searches
 •   Billing Secure
 •   Developments Secure Case
 •   Secure Case Concerns
 •   Secure Case Objectives
 •   Secure Case Public
 •   Secure Case West Virginia
 •   Secure Patent
 •   Secure Schedule
 •   Statistics Secure Case
 •   Us Secure Case
Advertisement

ALL RESULTS
1 - 25 of 462 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Beaufort Memorial Case Study by Imprivata

February 28, 2014 - (Free Research)
This case study highlights Beaufort Memorial Hospital's success in implementing a secure communications platform that allowed a more efficient, secure, and cost-effective clinician workflow. 
(WHITE PAPER) READ ABSTRACT |

Case Study: Novagalicia Secures Critical Applications with HP Fortify by Hewlett-Packard Limited

April 30, 2013 - (Free Research)
Assessing and improving the security of applications used in financial institutions is paramount. This case study explores the security-as-a-service (SaaS) testing solution one bank used after a merger to quickly and accurately assess their nearly 400 applications. View now to learn more! 
(CASE STUDY) READ ABSTRACT |

Case Study: Physician Organization Secures VMware Virtualized Environment with Trend Micro Deep Security  by Trend Micro

October 26, 2009 - (Free Research)
This case study illustrates how a physicians' organization providing medical management services to 1,500 members was able to introduce Trend Micro's Deep Security solution and achieve increased security, increased flexibility, reduced costs, streamlined administration, and easy scalability. 
(CASE STUDY) READ ABSTRACT |

9 Steps to Building a B2B Business Case by Sterling Commerce Manufacturing Solutions

March 2008 - (Free Research)
Justifying a strategic B2B initiative is especially critical. It encompasses integrating your major information systems to give your company the secure foundation it needs to collaborate effectively with customers, partners and suppliers. Fortunate... 
(WHITE PAPER) READ ABSTRACT |

Case Study: Computrace Helps HealthSpring Comply with HIPAA and the HITECH Act by Absolute Software

December 2012 - (Free Research)
This brief case study explains how the healthcare organization HealthSpring effectively supports and secures its increasingly mobile workforce – all while complying with HIPAA and HITECH regulations. Read on to learn more now. 
(CASE STUDY) READ ABSTRACT |

Case Study: Secure BYOD With an SDN Application by Hewlett-Packard Limited

April 2014 - (Free Research)
This exclusive case study examines how an educational institution was able to take advantage of an SDN application to leverage existing hardware and allow users to connect their personal devices to the network securely, allowing for a remarkable increase in productivity. 
(CASE STUDY) READ ABSTRACT |

Fast, Secure Apps for Remote Engineers by Dell, Inc. and Intel®

February 2014 - (Free Research)
This case-study explains how a large-scale, global research and engineering organization used VDI to centralize their infrastructure in order to provide seamless and secure access to high-performance apps, including intensive electronic design automation (EDA) applications. 
(WHITE PAPER) READ ABSTRACT |

Designing Secure Multi-Tenancy into Virtualized Data Centers by Continental Resources

April 2010 - (Free Research)
Today’s traditional IT model suffers from resources located in different, unrelated silos—leading to low utilization and gross inefficiency. Enterprise servers reside in one area of the data center and network switches and storage arrays in another. This document describes the design of - and the rationale behind - the Secure Cloud Architecture. 
(WHITE PAPER) READ ABSTRACT |

Securing the enterprise application layer: Expert Guidelines by IBM

August 2011 - (Free Research)
If you're a security professional, the focus on application security in IT these days may leave you feeling out of the loop. Yet, in many cases, application security pros rely on the infrastructure team to provide a secure foundation.  Find out how securing a naming and directory service will help build a solid platform that application can trust. 
(EGUIDE) READ ABSTRACT |

9 Steps to Building a Business Case for B2B Integration by IBM

February 2011 - (Free Research)
Putting together a business case does not rank high on most IT executives’ list of favorite activities. But the ability to put together a compelling case is now more than ever a core competency. This paper explains how you can significantly increase your chances of approval if you follow the nine steps provided within. 
(WHITE PAPER) READ ABSTRACT |

Oracle’s Optimized Solution for CRM - A Business Case for Secured Siebel CRM on Oracle’s SPARC T-Series by Oracle Corporation

March 2011 - (Free Research)
Data privacy and thefts, contractual terms and compliance requirements are issues that all need to be considered when installing a CRM system. This paper outlines how deploying Siebel CRM on Oracle's SPARC T-Series servers mitigates risk while helping maintain a low total cost of ownership by not requiring more equipment. 
(WHITE PAPER) READ ABSTRACT |

Top 10 Tips to Make Access to SaaS, Enterprise Class Secure by Intel

October 2011 - (Free Research)
In today’s cloud environment, the number of security breaches is on the rise - driving a new mandate for strong authentication technologies to ensure a more secure SSO. In this case study brief, learn first hand from industry experts and customers, their top 10 tips to make your federated SSO implementation a success and Enterprise class secure. 
(WHITE PAPER) READ ABSTRACT |

Case Study: State of New Mexico Chooses HyTrust to Secure Virtualized Infrastructure by HyTrust

July 2011 - (Free Research)
To meet the growing needs of the public, raise efficiency and streamline government processes, the New Mexico Human Services Department adopted a full-scale virtualization deployment. Take a look at this resource, a case study of New Mexico's implementation of the HyTrust Appliance for a new level of security in the virtualized environment. 
(CASE STUDY) READ ABSTRACT |

Case Study: A Major European Development Bank Turns to HyTrust to Virtualize its IT Infrastructure and Enable Secure, Efficient Delivery of Services by HyTrust

July 2011 - (Free Research)
With a data center structured on aging legacy systems, IT administrators at the Development Bank soon realized that server virtualization, was the key to supporting the bank's long-term goals. Access this exclusive resource for a case study of the Development Bank's implementation of the HyTrust Appliance alongside their virtualization deployment. 
(CASE STUDY) READ ABSTRACT |

Case Study: HyTrust Enables University of California, Berkeley, to Cost-Effectively Enhance and Secure Its Virtualization Capabilities by HyTrust

July 2011 - (Free Research)
With over 30 different divisions, including 350 different academic programs, the pressures on UC Berkeley's data center are phenomenal. This resource, a case study of UC Berkeley's implementation of the HyTrust Appliance, reveals how IT administrators have truly maximized the potential of the virtualized environment. 
(CASE STUDY) READ ABSTRACT |

Case Study: WebEx - Securing Web Collaboration by Qualys

May 2010 - (Free Research)
Read this case study to learn about the vulnerability and compliance risk management program WebEx has implemented to ensure security and confidentiality among their customers. 
(CASE STUDY) READ ABSTRACT |

Fast, Secure Apps for Remote Engineers by Dell, Inc.

December 2012 - (Free Research)
Access this exclusive case study to find out how a semiconductor organization achieved their IT goals by deploying a virtualized Linux desktop infrastructure built on Dell servers. 
(CASE STUDY) READ ABSTRACT |

Case Study: Rochford District Council Secures 25 Years' of History with Acronis by Acronis NEMEA

May 2011 - (Free Research)
Like many local governmental organisations, Rochford District Council depends heavily on the continual availability of its IT systems. Having a reliable disaster recovery strategy in place is an essential component of the Council’s IT strategy. Read on to learn more. 
(CASE STUDY) READ ABSTRACT |

Case Study: Providence College Captures Previously Undetected Attacks with FireEye Web Malware Protection System by FireEye

May 2011 - (Free Research)
This case study will show how Providence College was able to keep there network secure from advanced malware attacks, and how this security solution could do the same for you. 
(CASE STUDY) READ ABSTRACT |

First Command case study: Secure financial future with converged IT by Dell, Inc.

April 2013 - (Free Research)
This white paper details a company that moved on from its legacy infrastructure to keep up with its customer service demands and IT budget. 
(CASE STUDY) READ ABSTRACT |

Food Manufacturer Extends Its Workforce with Secure Remote Access by Cisco Systems, Inc.

April 2008 - (Free Research)
This case study describes how one of the most well-known food producers and distributors achieved cost savings, increased productivity, and solved business challenges through deployment of the Cisco Adaptive Security Appliance (ASA) VPN Edition. 
(CASE STUDY) READ ABSTRACT |

EXA Corporation Creates a Secure and Resilient Private Cloud by IBM

June 2012 - (Free Research)
In this case study, see how one organization implemented a cloud solution that provides automation, security, and management tools to ensure their data on their hybrid cloud remained protected across multiple servers. 
(WHITE PAPER) READ ABSTRACT |

The identity perimeter by ComputerWeekly.com

April 2013 - (Free Research)
Analysts Bob Tarzey and Rob Bamforth, make the case for identity management and advanced single-sign-on (SSO) to help businesses and their customers and partners work in a more integrated way. 
(ANALYST REPORT) READ ABSTRACT |

Case Study: Capita Group PLC by Druva Software

December 2010 - (Free Research)
Office and remote laptop users at Capita were unable to securely backup their critical data. A secure and scalable backup solution featuring low impact on system performance was crucial to fulfilling their backup needs. Find out why Capita selected Druva inSync for their backup solutions. 
(CASE STUDY) READ ABSTRACT |

Secure Cloud Access Reference Architecture & Use Model by Intel

March 2011 - (Free Research)
This session presents a simple use case and reference architecture and layers how each of these standards & technologies can play a role: AuthN: SAML, Open ID, OAuth, Pledge (OTP), AuthZ: XACML, Platform Connectors: IdM & Provisioning, Client & Server: TXT, IPT (Identity Protection). 
(WEBCAST) READ ABSTRACT |

1 - 25 of 462 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts