Security Systems For Data CenterWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Security Systems For Data Center returned the following results.
RSS What is RSS?
Related Categories

 •   Data Center Management
 •   Data Security
 •   Virtualization
 •   Network Security
 •   Security Policies
 •   Security Monitoring
 •   Network Management
 •   Application Security
 •   Networks
 •   Enterprise Data Protection and Privacy

Related Searches
 •   Displays Security Systems
 •   Knowledge Security Systems
 •   Make Security
 •   Orders Security
 •   Organizational Security Systems For
 •   Security Outsource
 •   Security Systems Examples
 •   Security Systems For Asset
 •   Security Systems Nevada
 •   Security Systems Retail
Advertisement

ALL RESULTS
1 - 25 of 472 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

A Foundation for Next-Generation Data Center Security by Citrix

September 28, 2012 - (Free Research)
This white paper introduces an application delivery controller (ADC) that builds enterprise cloud networks using existing datacenter infrastructure. 
(WHITE PAPER) READ ABSTRACT |

Virtual Data Center E-Zine: Volume 39: Managing Virtualization Patches by SearchDataCenter.com

June 05, 2012 - (Free Research)
Keeping all of your patches up-to-date is a tedious but necessary task in order to ensure a fully protected data center. This dedicated e-zine highlights tips and strategies for making patch management easier and less time-consuming. 
(EZINE) READ ABSTRACT |

Software Defined Networking Goes Well Beyond the Data Center by SearchSecurity.com

June 14, 2013 - (Free Research)
Software-defined networking (SDN) applications are quickly moving beyond the data center network. In this expert e-guide from SearchSDN.com, learn what SDN applications mean for network administration, how they're impacting network security, and more. 
(EGUIDE) READ ABSTRACT |

Benefits of Cloud-Based Communications by Interactive Intelligence, Inc.

April 24, 2012 - (Free Research)
This presentation transcript explores the options of moving your contact center applications and Unified Communications strategies to the cloud. Uncover the benefits and opportunities of cloud-based solutions and potential pain points, and get help deciding if the cloud is a good option for your organization. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Security Considerations for Cloud-Ready Data Centers by Juniper Networks, Inc.

September 02, 2011 - (Free Research)
A network-centric approach to providing security in the data center delivers benefits such as scalability, unified security policy definition and enforcement, visibility into application traffic, and reduced operations overhead. 
(WHITE PAPER) READ ABSTRACT |

Unclutter Your Data Center With Consolidated Log Management by VMware, Inc.

June 13, 2013 - (Free Research)
In this white paper, explore a consolidated logging system to avoid the risks that may occur in a complex IT environment, and feel confident in running a reliable and secure virtual data center. 
(WHITE PAPER) READ ABSTRACT |

Tripwire Enterprise and Tripwire Log Center: Integrated for Unparalleled Security by Tripwire, Inc.

February 24, 2011 - (Free Research)
Tools for monitoring and protecting the IT infrastructure have evolved into powerful, yet isolated, islands of defense. Because modern threats can take advantage of this isolation, IT security needs a single, comprehensive view of infrastructure security. 
(DATA SHEET) READ ABSTRACT |

Lumension® Device Control for Microsoft® System Center by Lumension

January 21, 2010 - (Free Research)
Read how through centrally managing, deploying, enforcing and monitoring device/port access, and more, Microsoft SCCM customers can significantly reduce implementation costs and quickly enhance their security policy enforcement. 
(DATA SHEET)

Three Must-Have Security Measures to Empower Data Centre Transformation by Cisco (E-mail this company)

July 31, 2013 - (Free Research)
As more data centres take advantage of virtualisation and the cloud, the time is now for innovative security planning. 
(WHITE PAPER)

Case Study: The Push For Simple, Cost-effective PCI Compliance by Dell SecureWorks UK

July 16, 2012 - (Free Research)
To avoid fines and meet an upcoming compliance deadline, call centre services provider, RESPONSE (Building Rewarding Relationships), needed to improve security. Read this paper to learn how the organisation secured an easily installed and managed security solution that could also be deployed in time to meet the looming deadline. 
(WHITE PAPER) READ ABSTRACT |

Palo Alto Networks in the Data Center: Eliminating Compromise by Palo Alto Networks

April 20, 2012 - (Free Research)
<p>This resource explores best practices for data center network security. Learn how to protect your business without compromising flexibility and application availability.</p> 
(WHITE PAPER) READ ABSTRACT |

A practical guide to keeping your virtual data centre safe by Sophos UK

June 07, 2010 - (Free Research)
This whitepaper will focus on the best practices for the protection of virtual servers running in the data centre. 
(WHITE PAPER) READ ABSTRACT |

An Integrated Security Solution for the Virtual Data Center and Cloud by Juniper Networks, Inc.

February 16, 2012 - (Free Research)
In this paper, explore the implications of virtualized workloads and discover an effective approach to providing pervasive and consistent protection for the entirety of the evolving data center. 
(WHITE PAPER) READ ABSTRACT |

Differentiated Architectures for the Data Center by Juniper Networks, Inc.

September 02, 2011 - (Free Research)
The promise of the cloud for data centers is that it converts all of the compute and storage capacity into pools of resources which can be dynamically allocated and shared. Shared resources are more efficient than resources in silos. With cloud computing, applications can be added quickly and they function more efficiently. 
(WHITE PAPER) READ ABSTRACT |

Securing the Next-Generation Data Center by McAfee, Inc.

August 11, 2011 - (Free Research)
Because today’s data centers must be optimally available, flexible, resilient, and secure, the traditional approach to adding security after the fact compromises their primary intent: robust and uninterrupted service delivery. This brief explores the need to build security in the design phase for maximum flexibility and advanced threat mitigation. 
(WHITE PAPER) READ ABSTRACT |

A Monthly Online Fraud Report from the RSA Anti-Fraud Command Center Phishing Repository by RSA, The Security Division of EMC

February 19, 2009 - (Free Research)
Each month the RSA Anti-Fraud Command Center (AFCC) - a 24x7 war room that detects, monitors, tracks and shuts down phishing, pharming and Trojan attacks worldwide - issues an intelligence report that spotlights a new trend in online fraud and also provides the latest statistics and analyses of global phishing trends. 
(ANALYST REPORT) READ ABSTRACT |

Monitoring Physical Threats in the Data Center by APC by Schneider Electric

February 2009 - (Free Research)
This paper describes the class of threats, suggests approaches to deploying monitoring devices, and provides best practices in leveraging the collected data to reduce downtime. 
(WHITE PAPER) READ ABSTRACT |

Building a Successful Security Operations Center by ArcSight, an HP Company

December 2009 - (Free Research)
Designing, building, and managing an internal security operations center can dramatically improve an organization's ability to rapidly recognize and respond to malicious information security events. This paper outlines industry best practices for building and maturing a security operations center (SOC). 
(WHITE PAPER) READ ABSTRACT |

Fortinet's Data Center Solution: Security From the Edge to the Core by Fortinet, Inc.

December 2013 - (Free Research)
This white paper highlights the features and benefits of a security platform that defends the network core and edge to better protect data centers from today's latest risk factors. 
(WHITE PAPER) READ ABSTRACT |

Secure Agile Development with HP Quality Center and Application Security Center by Hewlett-Packard Company

February 2010 - (Free Research)
This white paper show you how to gain effective, efficient Agile software development with market leading HP quality assurance and Web application security software. Read more for all the details. 
(WHITE PAPER) READ ABSTRACT |

E-Book: New Enterprise Desktop Chapter 3: Windows 7 Security: Strengths and Weaknesses by SearchDataCenter.com

August 2011 - (Free Research)
Each new OS is touted as the “Holy Grail” of features that every IT pro has been waiting for. Windows 7 is no different. This chapter looks at the Windows 7 security features such as BitLocker and Action Center, and separates those that really count from those that sound better on paper. 
(EBOOK) READ ABSTRACT |

3 Quick Tips for a Software-Defined Data Center Strategy by VMware, Inc.

August 2013 - (Free Research)
This e-guide presents three expert tips to creating a software-defined data center strategy. 
(EGUIDE) READ ABSTRACT |

Changing Data Center Requirements and Spending Trends by Cisco Systems, Inc.

October 2012 - (Free Research)
This white paper examines how data center costs fit into overall IT spending. Find out why virtualization and cloud computing call for a holistic approach that unifies management of networking, storage, and security resources. 
(WHITE PAPER) READ ABSTRACT |

Changing Data Center Requirements and Spending Trends by Cisco Systems, Inc.

May 2012 - (Free Research)
This white paper examines how data center costs fit into overall IT spending. Find out why virtualization and cloud computing call for a holistic approach that unifies management of networking, storage, and security resources. 
(WHITE PAPER) READ ABSTRACT |

Key Considerations for Leveraging Virtualization and Keeping Your Applications Available by SunGard Availability Services

January 2012 - (Free Research)
Discover how you can leverage virtualization for more effective disaster recovery in your data center. Virtualized DR enables local availability within a single data center and promises to increase flexibility and responsiveness. However, there are various challenges associated with virtualized DR. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 472 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts