Secure MultiWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Secure Multi returned the following results.
RSS What is RSS?
Related Categories

 •   Network Security
 •   Data Center Management
 •   Virtualization
 •   Data Security
 •   Storage Area Network (SAN)/ Network Attached Storage (NAS)
 •   SSL VPN
 •   Application Security
 •   Storage Management
 •   Firewalls
 •   Security Monitoring

Related Searches
 •   Audit Secure
 •   Balancing Secure
 •   Global Secure Multi
 •   Issues With Secure
 •   Matrix Secure
 •   Operating Secure Multi
 •   Secure Corporation
 •   Secure Flow
 •   Secure Multi Kansas
 •   Secure Multi Manual
Advertisement

ALL RESULTS
1 - 25 of 464 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Designing Secure Multi-Tenancy into Virtualized Data Centers by Continental Resources

April 02, 2010 - (Free Research)
Today’s traditional IT model suffers from resources located in different, unrelated silos—leading to low utilization and gross inefficiency. Enterprise servers reside in one area of the data center and network switches and storage arrays in another. This document describes the design of - and the rationale behind - the Secure Cloud Architecture. 
(WHITE PAPER) READ ABSTRACT |

Intel® Cloud Builders Guide: Parallels* Security Monitoring and Service Catalog for Public Cloud VPS Services by Intel

February 29, 2012 - (Free Research)
A cloud environment can be hard to secure, but certain technology can mitigate your risks.This essential white paper focuses on establishing a robust foundation for the deployment of secure multi-tenancy operations. Learn about a set of hardware components that can help you build and maintain a chain of trust to protect your sensitive information. 
(WHITE PAPER)

BlackBerry Smart Card Reader Security by BlackBerry

January 01, 2005 - (Free Research)
Through an Elliptic Curve Diffie-Hellman (ECDH) key exchange, the BlackBerry Smart Card Reader is designed to enable wireless digital signing and encryption of wireless email messages. 
(WHITE PAPER) READ ABSTRACT |

The Benefits of and Critical Buying Criteria for Clustered Storage Solutions by NetApp

March 29, 2013 - (Free Research)
This paper looks at the adoption and benefits of clustered storage across a variety of enterprises. Discover what these storage users consider to be the most important attributes for a clustered storage system. 
(WHITE PAPER) READ ABSTRACT |

The HP 3PAR Architecture ~ Returning Simplicity to IT Infrastructures by HP and Intel

February 15, 2012 - (Free Research)
Industry-leading software solutions provide unique benefits that make any cloud more agile and efficient while ensuring secure segregation of user groups and applications. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: The Private Cloud Starts Today with HP Storage by Hewlett-Packard Limited

January 07, 2011 - (Free Research)
This webcast and accompanying podcast explore the reasons to move to a utility-based cloud computing model and outline the requirements every CIO and IT manager should keep in mind when looking to build their own private cloud. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Enterprise-Ready Scale-Out with Data ONTAP 8 Cluster-Mode by NetApp

September 06, 2012 - (Free Research)
This paper introduces an emerging unified scale-out solution purpose-built to provide an adaptable, always-on storage infrastructure for virtualized environments. Read on to learn what this approach to scale-out could mean for your company and its data. 
(WHITE PAPER) READ ABSTRACT |

Free yourself to do more, while securing your business simply and cost-effectively by Sophos, Inc.

June 24, 2009 - (Free Research)
It's vital for businesses to secure their systems and data against a growing field of threats. However, implementing and maintaining full-spectrum protection can be a heavy drain on financial and human resources if not done right. Read this whitepaper to learn how a more efficient approach to security can free up much needed resources. 
(WHITE PAPER) READ ABSTRACT |

Web Services Security: What's Required to Secure a Service-Oriented Architecture by Oracle Corporation

January 2008 - (Free Research)
This white paper details a holistic approach for Service Orientated Architecture (SOA) security using additional, application-level industry standards to secure web services and multi-step transactions in a SOA environment. 
(WHITE PAPER) READ ABSTRACT |

Best Practices for Securing Exchange Email When Using a Hosted Email Solution by USA.NET, Inc.

January 2007 - (Free Research)
For SMBs and large enterprises seeking secure, affordable Exchange email hosting, USA.NET offers a comprehensive blend of best security practices and best-of-breed technology. 
(WHITE PAPER) READ ABSTRACT |

EFT Server to Replace USB for SCADA; EFT Server Enterprise Helps to Reduce Risks through Multi-Zone Architecture by GlobalScape

December 2012 - (Free Research)
This whitepaper explains that USB drives have been used to transport viruses and malware, both on purpose and accidentally. 
(WHITE PAPER) READ ABSTRACT |

Application Brief: Virtual Firewall and Secure Access Gateway by Vyatta Inc.

April 2011 - (Free Research)
Vyatta delivers the only multi-layer virtual network security solution that maintains compliance and enables instant migration of complex, layered firewall architectures from the physical network into any virtual data center, without compromises. 
(APPLICATION NOTE) READ ABSTRACT |

The Advantages of Multi-Core Architecture in Unified Threat Management (UTM) Solutions by SonicWALL

April 2008 - (Free Research)
Securing your company's network requires a comprehensive approach that includes intrusion prevention, data leak protection, and content filtering. This white paper examines how UTM solutions provide enhanced security that is efficient and cost-effective. 
(WHITE PAPER) READ ABSTRACT |

Secure, Centralized, Simple: Multi-platform Enterprise Mobility Management by BlackBerry

July 2014 - (Free Research)
This white paper introduces a unified management technology that enables you to manage corporate and BYOD users (of any platform) from a single console. Read on to discover how simple it is to securely, effectively manage corporate data while keeping user information separate and private. 
(WHITE PAPER) READ ABSTRACT |

SuperMassive E10000 Series Next-Generation Firewall by SonicWALL

February 2011 - (Free Research)
The SonicWALL® SuperMassive™ E10000 Series is SonicWALL’s Next-Generation Firewall platform designed for large networks to deliver scalability, reliability and deep security at multi-gigabit speeds. 
(WHITE PAPER) READ ABSTRACT |

IT Download - Orion Network Configuration Manager (NCM) by SolarWinds, Inc.

February 2009 - (Free Research)
Check out this download to see how the Orion Network Configuration Manager aids in managing network configuration files in multi-vendor network environments, monitoring changes to device configurations and ensuring compliance with federal and corporate policies. 
(TRIAL SOFTWARE) READ ABSTRACT |

Presentation Transcript: Cloud Service Delivery Models - Security Risks and Recommendations by SecureWorks

August 2011 - (Free Research)
This presentation transcript examines how different levels of isolation and multi-tenancy in cloud models introduce different risks to organizations leveraging cloud services. We also discuss what organizations can do to address these risks and we recommend ways to deliver an improved security posture to organizations utilizing cloud services. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Cutting Through the Complexity of Multi-Protocol Label Switching (MPLS) Performance by NetScout Systems, Inc.

January 2005 - (Free Research)
This paper outlines the best practices for collecting network and application performance information over MPLS enabled wide area networks by using the nGenius Solution's Site Monitoring feature to monitor traffic flows destined for remote sites. 
(WHITE PAPER) READ ABSTRACT |

Five Steps to Secure Internet Single Sign-On (SSO) by Ping Identity Corporation

June 2009 - (Free Research)
This white paper describes why and how any organization can implement secure Internet single sign-on, which provides for the portability and interoperability of identity information across organizational boundaries. Read this white paper to learn the five steps to secure internet single sign-on. 
(WHITE PAPER) READ ABSTRACT |

CyberFusion Integration Suite (CFI) by Proginet Corporation

CyberFusion Integration Suite (CFI), from Proginet, is the world's most advanced managed file transfer solution. CFI helps organizations overcome the fundamental challenges they face every day as they strive to secure, control, and integrate the data that drives their business. 
(SOFTWARE PRODUCT)

How to Cut Communications Costs By Replacing Leased Lines and VPNs with MPLS by Star

December 2010 - (Free Research)
Replacement of remaining legacy internet connections with more flexible and secure solutions such as Multi Protocol Label Switching (MPLS), which offer guaranteed security and quality of service, can save organisations substantial amounts of money. Read on to learn more about MPLS. 
(WHITE PAPER) READ ABSTRACT |

From Target to Aggressor: How Data Centers are Becoming Unwitting Accomplices in Advanced Cyber Attacks by FireEye

December 2013 - (Free Research)
This guide explores the widening gap between sophisticated cyber-attacks and the weak traditional defensive deployments in most data centers. 
(WHITE PAPER) READ ABSTRACT |

Successfully Managing VDI Services with the BIG-IP System by F5 Networks

November 2011 - (Free Research)
Learn how you can unite all the components required to make a complete and secure VDI services delivery solution in one integrated and consolidated platform. 
(WHITE PAPER) READ ABSTRACT |

Multi-Modal Learning by SkillSoft Corporation

Multi-Modal Learning™, from SkillSoft Corporation, represents a powerful new web-based solution that significantly enhances learning and day-to-day productivity for business professionals in their use of core desktop software technologies. 
(SOFTWARE PRODUCT)

KVM Security in the Cloud: A Choice That Matters by Global Knowledge

May 2013 - (Free Research)
The resource overviews KVM security and its use in virtualized, multi-tenant cloud scenarios. Examine how open source virtualization leverages SE Linux and its tight integration with Linux kernel to provide a secure computing environment for both end-users and service providers. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 464 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts