Secure FirmWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Secure Firm returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Endpoint Security
 •   Security Monitoring
 •   Network Security
 •   Business Intelligence Solutions
 •   Storage Management
 •   Enterprise Systems Management
 •   Enterprise Information Integration/ Metadata Management
 •   Technology Planning and Analysis
 •   Wireless Technologies and Mobile Computing

Related Searches
 •   Linux-Based Secure
 •   Net Secure
 •   Practice Secure Firm
 •   Secure Firm Document
 •   Secure Firm Features
 •   Secure Firm Research
 •   Secure Project
 •   Secure Scheduling
 •   Statements Secure
 •   Technologies Secure Firm
Advertisement

ALL RESULTS
1 - 25 of 467 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

10 Building Blocks for Securing File Data by Imperva

March 10, 2011 - (Free Research)
This guide describes ten phases for securing file data, including how and when to use these basic capabilities, as well as when to deploy other complementary technologies. 
(WHITE PAPER) READ ABSTRACT |

How Financial Firms Can Improve Business Integration Capabilities and Increase Straight-Through Processing Efficiency by Sterling Commerce, An IBM Company

September 01, 2009 - (Free Research)
This white paper discusses the increased demand placed on financial services organizations to improve their straight-through processing (STP) levels across all business units. 
(WHITE PAPER) READ ABSTRACT |

The Benefits of and Critical Buying Criteria for Clustered Storage Solutions by NetApp

March 29, 2013 - (Free Research)
This paper looks at the adoption and benefits of clustered storage across a variety of enterprises. Discover what these storage users consider to be the most important attributes for a clustered storage system. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly 8 November 2011: Read this week's issue of the UK's leading technology publication, with the news, analysis and opinion that matters to IT managers. by ComputerWeekly.com

November 04, 2011 - (Free Research)
In this week's Computer Weekly, we report from the London Cyberspace Conference where world leaders gathered to discuss internet security. We examine the tools available to help migrate from Windows XP to Windows 7; and hear from Royal Bank of Scotland about how to build a business case for virtual desktops. Download the new issue now. 
(EZINE)

IT Administrator Saves Engineering Firm More than 200 Hours a Week by Switching to Webroot Secure Anywhere by Webroot

August 06, 2012 - (Free Research)
The antivirus protection Doris network was using created problems and slowed the productivity of employees. Fortunately, Webroot offered an efficient and effective solution. Learn how Webroot remedied the inaccurate and difficult to manage reports by reading this informative resource. 
(WHITE PAPER) READ ABSTRACT |

Expert Guide to Secure Web Gateways by TechTarget

March 18, 2014 - (Free Research)
Investments in secure Web gateways (SWG) are on the rise because traditional firewalls don't stop all attacks against enterprise systems. Don't waste another minute researching SWG feature options. Participate in our brief survey and waiting for you is your complimentary e-guide that outlines why SWG is worth the investment. 
(RESOURCE)

Reducing Costs and Creating a More Secure IT Environment with a Holistic Approach to Data Protection: An ROI Analysis of FalconStor Storage Management Solutions by FalconStor Software

October 22, 2010 - (Free Research)
Data protection and disaster recovery continue to be overarching challenges for most firms. To remedy a myriad of problems with data protection as well as operational and disaster recovery, companies are replacing legacy backup methods with new approaches. Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

The Deloitte Consumer Review: A more secure customer by ComputerWeekly.com

March 12, 2013 - (Free Research)
This report from Deloitte assesses the impact of cybercrime on consumers and offers advice to businesses on how to respond. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Secure your data – protect your business by ComputerWeekly.com

November 12, 2012 - (Free Research)
This guide for C-level executives explains the risks faced by businesses and the practical solutions they can take to secure their data. 
(ESSENTIAL GUIDE) READ ABSTRACT |

The Network Evolution University: Next Generation Networks by SearchNetworking.com

November 09, 2011 - (Free Research)
In order to combat the ever-evolving challenges of today’s networks, it’s time to head back to school in our exclusive Network Evolution University – Featuring three distinct classes and nine progressive learning lessons that explore all there is to know about next generation networks and how to overcome the challenges they present. 
(VIRTUAL SEMINAR) READ ABSTRACT |

Good Energy case study: Renewable energy firm makes sound investments by Dell, Inc.

May 15, 2013 - (Free Research)
This case study details an organization that found a solution that could improve their performance and protect their customer's data at a good price. 
(CASE STUDY) READ ABSTRACT |

Case Study: Connecting Consultants and Customers Securely at Arthur D. Little by GlobalScape

May 22, 2014 - (Free Research)
This case study focuses on management consulting firm Arthur D. Little's experience with an enterprise-level file exchange solution that was easy to use, secure, rapid to deploy, and scalable. 
(WHITE PAPER) READ ABSTRACT |

Customer Success Story: ECSEC - ‘Hell’s Kitchen’ Contractor Goes to Heaven with Symantec by Symantec Corporation

July 15, 2010 - (Free Research)
By partnering with Symantec and Vitality Consulting Services, ECSEC implemented an integrated Symantec data protection and messaging security solution giving ECSEC the confidence that its network is now operating correctly, confidence that data is now properly secured and backed up. Download this Customer Reference to read the whole story. 
(WHITE PAPER) READ ABSTRACT |

Laying the IT Security Foundation by Lumension

April 06, 2009 - (Free Research)
Learn how in today's evolving threat landscape you need to lay the proper IT security foundation that proactively addresses the root cause of attacks such as Conficker. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 4 March 2014: How IT brings aid to refugees by ComputerWeekly.com

March 04, 2014 - (Free Research)
In this week's Computer Weekly, we talk to the CIO at the UN High Commission for Refugees about the vital role that technology plays in supporting its aid programmes. We hear from IT leaders who are ditching BlackBerry – but moving to Windows Phone instead. And we look at how to choose the best hybrid cloud provider. Read the issue now. 
(EZINE) READ ABSTRACT |

Computer Weekly – 4 December 2012: Games giant Sega takes to the cloud by ComputerWeekly.com

December 04, 2012 - (Free Research)
In this week's Computer Weekly, we talk to Sega about how the computer game giant has turned to the cloud to prepare for the Christmas rush. Our latest buyer's guide gives best practice advice on mobile device management. And Unilever tells us how business intelligence and analytics helps to better understand customer needs. Read the issue now. 
(EZINE) READ ABSTRACT |

Computer Weekly - 8 May 2012: The changing face of retail IT by ComputerWeekly.com

May 08, 2012 - (Free Research)
In this week’s Computer Weekly, we look at the IT challenges facing retailers, as consumers turn increasingly to web and mobile shopping channels. Oracle president Mark Hurd talks about how the supplier intends to simplify IT infrastructures. And new government CIO Andy Nelson discusses how he plans to transform Whitehall IT. Read the issue now. 
(EZINE)

Computer Weekly - 1 May 2012: The technology behind the England football team by ComputerWeekly.com

May 01, 2012 - (Free Research)
This week's Computer Weekly examines how the Football Association's IT director is using technology to help improve the prospects for the England national team. Our Buyer's Guide to government IT looks at the future of open source in the public sector and we report from Infosec 2012 on the rising number of cyber attacks. Read the issue now. 
(EZINE)

IT matters again by ComputerWeekly.com

December 01, 2011 - (Free Research)
This report from Deloitte argues businesses are again investing in IT to provide the differentiation and innovation critical from their competitors despite the downturn. 
(IT BRIEFING) READ ABSTRACT |

AVG Anti-Virus Network Edition Delivers Rock Solid, Easy to Manage Protection for US Construction Firm by AVG Technologies USA, Inc.

March 31, 2010 - (Free Research)
R&O Construction was having difficulty managing their mostly mobile network. With so many laptops and mobile devices in use remotely, the company was seeing an increase in security threats infecting the IT infrastructure. Their existing solution was overtaxing both system and human resources. Read on to learn how they overcame these challenges. 
(CASE STUDY) READ ABSTRACT |

Forrester Research: Improving Application Deployments - How an Application Delivery Architecture Can Help Businesses Overcome Deployment Challenges by F5 Networks

August 2007 - (Free Research)
Today's businesses must operate in a drastically changing environment. Forrester found most companies are not well equipped to reorient IT as a critical driver of top line success. This report showcases the results of an April 2007 Forrester survey. 
(WHITE PAPER) READ ABSTRACT |

Symantec Endpoint Protection 12 by Symantec Corporation

May 2011 - (Free Research)
Symantec Endpoint Protection 12 is built around an idea; that the context of a threat is as important as its content. Powered by Insight, the new Symantec Endpoint Protection uses age, frequency and source of files, along with other security metrics, to expose new and highly targeted threats. 
(DOWNLOAD) READ ABSTRACT |

Managing a Remote Workforce: Proven Practices from Successful Leaders by Citrix Online Go To Meeting

January 2012 - (Free Research)
Access this report from research and advisory firm Work Design Collaborative, LLC (WDC) to learn about the business benefits of a remote workforce and the best practices and technologies IT can implement to leverage them. 
(WHITE PAPER) READ ABSTRACT |

Wealth Management Firms Choose CRM to Improve Productivity and Client Service by Microsoft

August 2009 - (Free Research)
To more clearly understand how wealth management firms are using Microsoft Dynamics CRM, Microsoft turned to IT advisory firm Mainstay Partners for an independent assessment. Mainstay Partners interviewed a number of firms to identify the measurable benefits they have achieved through deploying Microsoft Dynamics CRM. 
(WHITE PAPER) READ ABSTRACT |

Winning Strategies for the Evolving Legal Marketplace by BlackBerry

October 2009 - (Free Research)
Law firms have had to develop new strategies to compete and win in a legal market that contains greater uncertainty than any that has come before it. This paper will briefly outline strategies for success in the evolving legal marketplace. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 467 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts