Secure HardwareWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Secure Hardware returned the following results.
RSS What is RSS?
Related Categories

 •   Network Security
 •   Data Security
 •   Virtualization
 •   Security Policies
 •   Enterprise Data Protection and Privacy
 •   Security Monitoring
 •   Vulnerability Assessment
 •   Firewalls
 •   Access Control
 •   Endpoint Security

Related Searches
 •   Manager Secure
 •   Secure Hardware Alaska
 •   Secure Hardware Compliance
 •   Secure Hardware Delaware
 •   Secure Hardware It
 •   Secure Hardware Knowledge
 •   Secure Hardware Technology
 •   Secure Hardware Tools Software
 •   Secure Manager
 •   Secure Supply
Advertisement

ALL RESULTS
1 - 25 of 484 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

WebSphere Cloudburst Appliance and PowerVM by IBM

July 07, 2011 - (Free Research)
Cloud computing is the pooling of computing resources to provide a single source of computing power to multiple users. Find out how a cloud manager provides a self-service portal that maintains permissions and information about cloud objects such as virtual images, patterns, and resources. 
(WHITE PAPER) READ ABSTRACT |

Practical Advantages of Fireware® XTM for Hands-On IT Administrators by WatchGuard Technologies, Inc.

July 26, 2009 - (Free Research)
Take a look at the new XTM (extensible threat management) network security from WatchGuard. See the tangible benefits this new generation of security solutions offers. No hype -- just concrete examples of XTM features and the advantages they deliver for you to evaluate against your current security. 
(WHITE PAPER) READ ABSTRACT |

VMware ACE 2 Enterprise Edition: Desktop Virtualization Solution by AMD and VMware, Inc (E-mail this company)

VMware ACE 2 Enterprise Edition delivers desktop virtualization solutions for enterprise users. Use VMware ACE 2 to deploy an ACE virtual machine as an IT managed “virtual laptop” to remote workers, provision controlled desktop images as sandbox environments or run legacy operating systems & applications on an existing PC as you migrate to Vista. 
(SOFTWARE PRODUCT)

Securing Physical and Virtual IT Assets without Hardware, Firewalls or VLANs by Apani

November 2008 - (Free Research)
This white paper will examine the challenges of traditional security approaches and reveal the many advantages of software-based access management. 
(WHITE PAPER) READ ABSTRACT |

Advanced Authentication Methods: Software vs Hardware by CA Technologies.

June 2011 - (Free Research)
View this webcast to discover the advantages of a software-based authentication solution and how it can help your organization extend strong authentication to all of your employees, partners and customers in a secure, convenient, cost effective manner. 
(WEBCAST) READ ABSTRACT |

TMOS - Secure Development and Implementation for Application Delivery Networks by F5 Networks

September 2008 - (Free Research)
In this white paper, read how TMOS--the foundation and architecture for F5's application delivery controllers running on the BIG-IP platform--brings a wealth of security to existing application delivery networks. 
(WHITE PAPER) READ ABSTRACT |

Forum Sentry™ - Web Services Security Gateway - Drive Return on Investment by Forum Systems

Forum Sentry™ provides a security infrastructure that drives a return on investment by enabling secure XML and Web services communications for mission critical applications. Forum Systems is the leader in Web Services Security. 
(SOFTWARE PRODUCT)

Security - Pix 500 Series Firewalls by Cisco Systems

The world-leading Cisco PIX Security Appliance Series provides robust, enterprise-class, integrated network security services including stateful inspection firewalling, protocol and application inspection, virtual private networking, in-line intrusion protection, and rich multimedia and voice security-in cost-effective, easy-to-deploy solutions. 
(HARDWARE PRODUCT)

Presentation Transcript: Securing the Virtualized Environment - Keeping the Dream Alive by Dell SecureWorks UK

August 2011 - (Free Research)
View this presentation transcript as Neil Anderson, a Principal Consultant from the Infrastructure Protection & Mobility team explores roadblocks of securing virtual environments, common pitfalls, and offers advice on combating these issues. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Fast, Secure Apps for Remote Engineers by Dell, Inc.

December 2012 - (Free Research)
Access this exclusive case study to find out how a semiconductor organization achieved their IT goals by deploying a virtualized Linux desktop infrastructure built on Dell servers. 
(CASE STUDY) READ ABSTRACT |

Secure with Confidence: Secure Your Enterprise with zEnterprise by IBM

July 2013 - (Free Research)
Check out this exclusive white paper to find out about IBM zEnterprise System and the results of a study of customers spending patterns who have deployed it. 
(WHITE PAPER) READ ABSTRACT |

Alternatives for Securing Virtual Networks by Juniper Networks, Inc.

March 2011 - (Free Research)
In this white paper, we will examine the virtualization issues that challenge today’s data centers and discuss their best options for securing virtual networks. 
(WHITE PAPER) READ ABSTRACT |

Securing Virtualized Data Centers by Trend Micro, Inc.

December 2009 - (Free Research)
On the surface, virtualized datacenters appear to have all of the same vulnerabilities and security challenges as conventional datacenters. With virtual machines, new challenges minimize the effectiveness of traditional protections. Read on to learn what it takes to secure today’s virtualized data centers. 
(EBOOK) READ ABSTRACT |

Security Practices for Vmware by Vyatta Inc.

June 2012 - (Free Research)
This expert resource explores best practices and common mistakes to avoid when securing your VMware environment. Learn how to leverage the proper settings, permissions and third-party tools to secure your systems. 
(WEBCAST) READ ABSTRACT |

Oracle’s Optimized Solution for CRM - A Business Case for Secured Siebel CRM on Oracle’s SPARC T-Series by Oracle Corporation

March 2011 - (Free Research)
Data privacy and thefts, contractual terms and compliance requirements are issues that all need to be considered when installing a CRM system. This paper outlines how deploying Siebel CRM on Oracle's SPARC T-Series servers mitigates risk while helping maintain a low total cost of ownership by not requiring more equipment. 
(WHITE PAPER) READ ABSTRACT |

10 Reasons Your Existing Security Information and Event Management Isn't Good Enough by eIQnetworks

February 2009 - (Free Research)
"Are we secure? Is our data protected?" Enterprises have turned to security information and event management (SIEM) solutions to answer these questions and address forensics or security operations issues. For the most part, SIEMs have failed to do what they promised. Read this paper to see what the problems are, and what solutions are available. 
(WHITE PAPER) READ ABSTRACT |

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc.

The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. 
(HARDWARE PRODUCT)

The Value of Off-Site Data Protection Services by Iron Mountain

January 2014 - (Free Research)
This whitepaper describes an off-site data protection service that can keep electronic media secure while providing efficient retrieval with the help of high-specification service elements for magnetic, optical and solid-state media. 
(WHITE PAPER) READ ABSTRACT |

crystalreports.com for Salesforce.com: Exception and Sales Reporting by Business Objects

crystalreports.com is a Web-based report-sharing service that allows you to share Crystal Reports with the right people - simply and securely. Create advanced reports from your Salesforce.com data. Dig deeper for answers using graphs with drill down capabilities. View, schedule, refresh, and distribute reports online - inside Salesforce.com. 
(SOFTWARE PRODUCT)

6 Reasons Why Software-Based Encryption Doesn’t Stack Up by MXI Security

April 2010 - (Free Research)
Read this white paper to learn the key differences between hardware-based and software-based encryption, which are becoming widely used technologies for companies using encrypted USB drives to ensure they are keeping their data secure as well as meeting industry security regulations. 
(WHITE PAPER) READ ABSTRACT |

Archive Attender™ for Exchange - Affordable Email Archiving by Sherpa Software

Archive Attender is a solution designed to move or copy messages from mailboxes, PST files and public folders. Administrators search indexed archives and view reports for storage and compliance. No SQL database or proprietary hardware required. Offers flexible archiving architecture. Free Trial available. 
(SOFTWARE PRODUCT)

zCisco 1800 Series Integrated Services Routers: Cisco 1841 Router (Modular) by Cisco Systems, Inc.

The Cisco 1841 router offers embedded hardware-based encryption enabled by an optional Cisco IOS Software security image. 
(HARDWARE PRODUCT)

A Practical Guide for Beginning the Migration to IPv6 by Fortinet, Inc.

July 2011 - (Free Research)
As many network administrators initiate their IPv6 migration projects, other IT professionals do not know where to begin. This white paper describes the importance of securing the network against IPv6 threats well before the introduction of any IPv6 traffic. It then outlines the steps involved to begin securing a transitional IPv4/IPv6 network. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly 24 January 2012: Has Microsoft succeeded with Trustworthy Computing? by ComputerWeekly.com

January 2012 - (Free Research)
In this week’s Computer Weekly, we mark the 10th anniversary of Microsoft’s Bill Gates announcing the Trustworthy Computing initiative, and ask if it has made IT more secure. We look at what Oracle’s latest developments mean for its software users running rivals’ servers, and conclude our Buyer’s Guide to IT consumerisation. Download the issue now. 
(EZINE) READ ABSTRACT |

Intel® Cloud Builders Guide: Parallels* Security Monitoring and Service Catalog for Public Cloud VPS Services by Intel

February 2012 - (Free Research)
A cloud environment can be hard to secure, but certain technology can mitigate your risks.This essential white paper focuses on establishing a robust foundation for the deployment of secure multi-tenancy operations. Learn about a set of hardware components that can help you build and maintain a chain of trust to protect your sensitive information. 
(WHITE PAPER)

1 - 25 of 484 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts