Security Analysis Case StudiesWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Security Analysis Case Studies returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Managed Security Services
 •   Security Monitoring
 •   Network Security
 •   Security Policies
 •   Application Security
 •   Automated Security Auditing/ Source Code Analysis
 •   Statistical Data Analysis
 •   Endpoint Security
 •   Virtualization

Related Searches
 •   Expert Security Analysis Case
 •   Reviews Security Analysis Case
 •   Security Analysis Case Email
 •   Security Analysis Case Schemas
 •   Security Analysis Case Video
 •   Security Analysis Georgia
 •   Security Analysis Repair
 •   Timeline Security
 •   Training Security Analysis Case
 •   Warehouse Security Analysis
Advertisement

ALL RESULTS
1 - 25 of 437 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

VMware® and Intel® Technology Provide Rock-Solid Platform for SAP Deployment by VMware and Intel

September 28, 2010 - (Free Research)
Southwestern/Great American chose to swap its dual environment (SAP ERP ran off of a legacy IBM AS/400) for a leaner infrastructure based on VMware ESX and IBM blade servers with Intel Xeon processors that could run both SAP ERP and its Windows applications. Read this case study to learn about the combined VMware and Intel solution. 
(CASE STUDY) READ ABSTRACT |

Run Business-Critical Oracle E-Business Suite on VMware® and Intel® Technology by VMware and Intel

September 27, 2010 - (Free Research)
Oracle E-Business Suite is critical to 90-95% of EMC’s business functions. The solution VMware® Infrastructure and Intel® Xeon® processor based servers create a reliable and highly available platform for the Oracle E-Business Suite. Read this case study to learn more about the features and business benefits of EMC's new virtual platform. 
(CASE STUDY) READ ABSTRACT |

Bell Rings in Improved Customer Address Information by DataFlux Corporation

February 28, 2011 - (Free Research)
Canada's largest communications company used Modern Analytics and DataFlux technology to de-duplicate records and gain an accurate view of domestic dwellings. 
(CASE STUDY) READ ABSTRACT |

ArcSight Case Study: Experian by ArcSight, an HP Company

May 11, 2010 - (Free Research)
Experian is committed to ensuring the integrity and safety of its data. The company sought an enterprise solution that would allow it to monitor threats and vulnerabilities in an automated fashion. ArcSight ESM enables Experian to monitor and analyze security event data from all its systems within a single view. Learn more in this case study. 
(CASE STUDY) READ ABSTRACT |

Client Case Study: Bouyges Telecom by IBM

July 28, 2011 - (Free Research)
In this case study, Bouygues Telecom uses an analysis platform to help it proactively uncover online and in-store fraud by consumers, dealers and organized crime groups, and prevent the subsequent loss of products and revenue. 
(WHITE PAPER) READ ABSTRACT |

Case Study: WebEx - Securing Web Collaboration by Qualys

May 18, 2010 - (Free Research)
Read this case study to learn about the vulnerability and compliance risk management program WebEx has implemented to ensure security and confidentiality among their customers. 
(CASE STUDY) READ ABSTRACT |

Case Study: Providence College Captures Previously Undetected Attacks with FireEye Web Malware Protection System by FireEye

May 10, 2011 - (Free Research)
This case study will show how Providence College was able to keep there network secure from advanced malware attacks, and how this security solution could do the same for you. 
(CASE STUDY) READ ABSTRACT |

Case Study: Fortune 100 Insurance Company and Security Weaver by Security Weaver

November 08, 2010 - (Free Research)
For the VP of Financial Systems for a Fortune 100 Insurance Company, the decision to implement an SAP compliance and reporting solution was initiated as a result of SOX. Now that the Security Weaver solution has been in place for about two years, the VP is convinced that the decision to go with this solution was the best choice for his company. 
(CASE STUDY) READ ABSTRACT |

ArcSight Case Study: BMW by ArcSight, an HP Company

November 17, 2009 - (Free Research)
Watch this video case study to learn how ArcSight helped BMW drastically decrease incidence response times. 
(CASE STUDY) READ ABSTRACT |

New Ponemon Study Reveals Disconnects in Building the Business Case for Data Protection by IBM

September 24, 2009 - (Free Research)
In this webcast, newly released research reveals that C-level executives lack confidence in their organization's ability to safeguard sensitive data. This survey, conducted by Ponemon Institute and sponsored by Ounce Labs, an IBM Company, determines what senior executives think about the value proposition of corporate data protection efforts. 
(WEBCAST) READ ABSTRACT |

Oracle Data Mining 11g Release 2 Mining Star Schemas: A Telco Churn Case Study by Oracle Corporation

June 24, 2012 - (Free Research)
This paper, based on the CACS and intended for users of the Oracle Data Miner, highlights the telco churn case study using Oracle Data Miner and explains the case study workflow methodology. Read this now and learn about preparing a database scheme and importing a pre-made Oracle Data Miner workflow. 
(WHITE PAPER) READ ABSTRACT |

Case Study: Nestle Nespresso Values Real-Time Security Intelligence from HP by Hewlett-Packard Limited

August 02, 2013 - (Free Research)
This quick video explores who one of your peers turns to for security and threat intelligence which enables them to better protect their organization's and clients' most valuable assets. 
(VIDEO) READ ABSTRACT |

The Total Economic Impact Of McAfee’s Network Security Platform’s Intrusion Prevention System: Multicompany Analysis by McAfee, Inc.

August 29, 2009 - (Free Research)
This June 2009 study examines the financial impact and potential return on investment (ROI) for McAfee Network Security Platform intrusion prevention system (formerly McAfee IntruShield®), using Adena Health System as a case study. 
(ANALYST REPORT) READ ABSTRACT |

Case Study: West Jefferson Medical Center Rearchitects Its Data Protection Infrastructure with NetApp Syncsort Integrated Backup by Syncsort

May 08, 2012 - (Free Research)
This buyer case study presents a medical center's deployment and use of NetApp Syncsort Integrated Backup. 
(CASE STUDY) READ ABSTRACT |

Real-time Monitoring, Alerts, and Analysis Offer In-Depth Security by Dell SecureWorks UK

March 01, 2012 - (Free Research)
In this case study explore how implementing Dell SecureWorks enabled Pharmaceutical firm, ProStrakan, to enhance its security and compliance posture by providing 24/7 monitoring, instant alerts and in-depth threat analysis. 
(CASE STUDY) READ ABSTRACT |

Telecom Carrier Offers First-of-its-Kind Cloud Security Solution by Cisco Systems, Inc.

July 11, 2012 - (Free Research)
This case study demonstrates how one telecom provider developed an intelligent visual data analysis engine that allowed them to identify voice and data threats in real time. This provided them with a holistic view of their network environment while bolstering overall data security by securing the voice network. 
(CASE STUDY) READ ABSTRACT |

Computer Weekly - 29 November 2011: Read this week’s issue of the UK’s leading technology publication, featuring the latest news, analysis and opinion about UK IT by ComputerWeekly.com

November 28, 2011 - (Free Research)
In this week's Computer Weekly, we go behind the scenes at the datacentre that knows everything about you, at credit checking firm Experian. We analyse the government's new plans to change the way it works with IT suppliers; and kick-off our Buyer's Guide to outsourcing with a look at the latest trends. Download the new issue now. 
(EZINE)

Case Study: How John Lewis Conquered the Web by ComputerWeekly.com

March 17, 2014 - (Free Research)
Bill Goodwin tells the inside story of John Lewis £40m website redevelopment project, assesses the technical and business challenges faced and its impact on the business. 
(BOOK) READ ABSTRACT |

How One School Enhanced Their Educational Experience and Secured Their Campus by Extreme Networks (E-mail this company)

October 31, 2012 - (Free Research)
This case study reveals which leading edge network Price of Wales Island International School used to enhance their educational experience for staff and students and to boost campus security. 
(CASE STUDY) READ ABSTRACT |

Total Economic Impact™ of Trend Micro Enterprise Security by Trend Micro, Inc.

July 01, 2009 - (Free Research)
The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of choosing Trend Micro Enterprise Security for their complete content security protection. 
(ANALYST REPORT) READ ABSTRACT |

Crypto Complete Case Study: Field-Level Encryption Helps Retail Chain Achieve PCI Compliance by Linoma Software

July 2008 - (Free Research)
In this case study, Love's Travel Stops and Country Stores, a retail chain, used Crypto Complete in an effort to meet PCI standards. Love's found that Crypto Complete encrypted credit card numbers in a way that satisfies PCI compliance auditors. 
(CASE STUDY) READ ABSTRACT |

Channel Success Stories: Managed Services Case Study: B Resource by Dell PartnerDirect and Intel

December 2008 - (Free Research)
This Channel Success Story gives you insight into how B Resource has been able to grow its business without growing its staff, and it provides practical advice and guidance from a company that has achieved spectacular results. 
(PODCAST) READ ABSTRACT |

AON Case Study by GlobalScape

January 2008 - (Free Research)
Aon now uses the GlobalSCAPE single Enhanced File Transfer server to handle the needs of 500-600 users daily. 
(CASE STUDY) READ ABSTRACT |

SwissRe_Customer Case Study by IBM

December 2013 - (Free Research)
Access the following case study to gain a firsthand look at how Swiss Re utilized an analytics accelerator to increase reporting and analysis by 70%. Discover key benefits of analytical acceleration as well as what you can do to acquire these benefits as well. 
(WHITE PAPER) READ ABSTRACT |

F5 Storage Cost Savings Calculator by F5 Networks UK

September 2009 - (Free Research)
Use this calculator to determine the potential storage cost savings your company could realize by implementing the F5 ARX solution. Just answer a few simple questions about your environment to get a three-year savings analysis. Make sure you review the Case Studies to learn how other companies have reduced their storage costs by 50% or more. 
(ASSESSMENT TOOL) READ ABSTRACT |

1 - 25 of 437 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts