Security View Software ArchitectureWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Security View Software Architecture returned the following results.
RSS What is RSS?
Related Categories

 •   Service Oriented Architecture (SOA)
 •   Storage Security
 •   Application Lifecycle Management(ALM)
 •   Virtualization
 •   Application Security
 •   Security Policies
 •   Enterprise Data Protection and Privacy
 •   Requirements Management
 •   Application Integration
 •   Backup Systems and Services

Related Searches
 •   Cycle Security
 •   Database Security View
 •   Fast Security View
 •   Pricing Security View Software
 •   Scripts Security
 •   Security View Demonstration
 •   Security View Kansas
 •   Security View Software Help
 •   Security View Software License
 •   Webcast Security
Advertisement

ALL RESULTS
1 - 25 of 470 | Next Page

Why Software Architecture Matters (More Than You Think) by Global Knowledge

August 27, 2013 - (Free Research)
The object of this white paper is to convince you that having a competent solutions or software architect on the team is absolutely critical to IT project success. A full-time, dedicated SA will form the glue that will hold your development team together and lead to project success. 
(WHITE PAPER) READ ABSTRACT |

VMware Backup Software and a vSphere Backup Solution Checklist by HP

December 01, 2011 - (Free Research)
Buying backup software for a virtualized environment is way more complicated than buying software for traditional servers. Before you go out and explore the different backup options available, check out the VMware backup software and vSphere backup solution checklist featured in this E-Guide. 
(EGUIDE) READ ABSTRACT |

Secure SOA Infrastructure - Better Control Mission Critial SOA Deployments by Forum Systems

September 13, 2005 - (Free Research)
Industry wide SOA rollouts have seen enterprises deploy critical supporting infrastructure around Web services security and Web services management. Forum Systems and Oracle Corporation "Secure SOA Infrastructure" is a market-leading solution that integrates software and hardware for mission critical SOA deployments. Find out more. 
(WHITE PAPER) READ ABSTRACT |

Webcast: Application Architectures for Cloud Computing Environments by SearchDataCenter.com

October 19, 2011 - (Free Research)
In this webcast, Bernard Golden, CEO of cloud consulting firm HyperStratus, describes the key principles of application architectures in a cloud computing environment. He also discusses the limitations of running applications in the cloud, including application integration issues, software licensing and security. 
(VIDEO) READ ABSTRACT |

Software-Defined Networking: Top Architecture and Security Considerations by SearchSecurity.com

June 07, 2013 - (Free Research)
This e-guide examines the potential of network functions virtualization (NFV) in revolutionizing how networks are built, managed and used to create services as well as reveals the dark side of software-defined networking. 
(EGUIDE) READ ABSTRACT |

IDC Vendor Profile: CommVault Gains Market Share and Continues to Outperform Storage Software Markets by CommVault Systems, Inc.

February 23, 2010 - (Free Research)
Over the past five years, the storage software industry has faced consolidation. Large incumbents have acquired innovative technology from start-ups and emerging companies. CommVault Systems (CVLT) is a data and information management software provider challenging traditional incumbents. 
(ANALYST REPORT)

Create the Optimal Architecture for Your Critical Applications by IBM

January 16, 2009 - (Free Research)
IBM has the vision, expertise, experience and product offerings that enable you to build an optimal architecture for application performance that drives business success. 
(WHITE PAPER) READ ABSTRACT |

Forum Sentry™ - Web Services Security Gateway - Drive Return on Investment by Forum Systems

Forum Sentry™ provides a security infrastructure that drives a return on investment by enabling secure XML and Web services communications for mission critical applications. Forum Systems is the leader in Web Services Security. 
(SOFTWARE PRODUCT)

Information Security Magazine – July/August 2013 by SearchSecurity.com

August 06, 2013 - (Free Research)
This month's issue takes a comprehensive look at new ways information security pros are isolating, monitoring, and controlling traffic within their data centers. We also publish the results of our Enterprise Mobile Security 2013 survey this month and offer expert advice on third-party vendor risk management. 
(EZINE) READ ABSTRACT |

How to use Collaboration Oriented Architectures by ComputerWeekly.com

November 10, 2010 - (Free Research)
Collaboration Oriented Architectures (COA) describes information architectures that comply with the COA framework, which in turn is described in the associated COA Framework paper1. 
(WHITE PAPER) READ ABSTRACT |

Intel® Cloud Builders Guide: Cloud Design and Deployment on Intel® Platforms - Enhanced Cloud Security with HyTrust* and VMware* by Intel

April 11, 2011 - (Free Research)
This reference architecture explains a secure cloud infrastructure deployment and operation. It describes a cloud built with VMware, vSphere*, Intel® Xeon® processor 5600 series-based server platforms, and a HyTrust Appliance* designed to enforce cloud security policies, including those based on platform trust attestation provided by Intel® TXT. 
(WHITE PAPER) READ ABSTRACT |

Security Gateway Buyer's Guide by Intel

February 14, 2011 - (Free Research)
If you’re currently evaluating Security Gateways, this guide will provide the analysis and decision support that will enable you make an informed choice. The following sections of the guide contain tools you can use to identify the right fit for your security architecture based on business requirements, cost, and complexity. 
(WHITE PAPER) READ ABSTRACT |

10 Reasons Your Existing Security Information and Event Management Isn't Good Enough by eIQnetworks

February 02, 2009 - (Free Research)
"Are we secure? Is our data protected?" Enterprises have turned to security information and event management (SIEM) solutions to answer these questions and address forensics or security operations issues. For the most part, SIEMs have failed to do what they promised. Read this paper to see what the problems are, and what solutions are available. 
(WHITE PAPER) READ ABSTRACT |

Design, Deploy, and Manage a DDoS Protection Architecture by F5 Networks

November 30, 2013 - (Free Research)
An increasing number of Distributed Denial-of-service (DDoS) attacks has caused many businesses to redesign their networks and better protect application-layer attacks. In this white paper, learn how a multi-tier DDoS protection architecture can help you protect your network and higher-layer application protocols from the four categories of DDoS. 
(WHITE PAPER) READ ABSTRACT |

Extending SDN Architectures with F5’s L4–7 Application and Gateway Services by F5 Networks

November 13, 2013 - (Free Research)
This exclusive resource discusses a solution that can help you to deliver applications using SDN architectures that are both directly programmable and that can be programmatically configured with open APIs. 
(WHITE PAPER) READ ABSTRACT |

Reference Architecture Brief: Dell Virtual Remote Desktop Featuring VMware View 4 by Dell, Inc.

November 24, 2009 - (Free Research)
To help simplify enterprise desktop management, Dell and VMware have created a flexible, highly scalable desktop virtualization reference architecture based on Dell™ PowerEdge™ servers, Dell EqualLogic™ PS Series iSCSI SAN arrays, and powerful new VMware® View 4 technology. 
(ARTICLE) READ ABSTRACT |

Computer Weekly - 7 February 2012: IT investment priorities by ComputerWeekly.com

February 07, 2012 - (Free Research)
In this week’s Computer Weekly, we examine exclusive research into the investment priorities of UK IT decision-makers, which shows virtualisation, Windows 7 and security as the top areas for spending this year. We analyse the changing nature of database architecture; and the BBC’s Chief Technology Officer talks about IT plans for the broadcaster. 
(EZINE) READ ABSTRACT |

Tap Aggregation and Filtering to Enable Deep Packet Inspection (DPI) by Gigamon

July 01, 2009 - (Free Research)
Read this brief paper to learn how network monitoring using DPI analyzers is a mission critical application that is tailor-made for the Data Access Network (DAN) architecture and saves substantial amounts of money for the telecom carrier. 
(WHITE PAPER) READ ABSTRACT |

Reference Architecture Brief: Dell Virtual Remote Desktop Featuring VMware View 4 by Dell and VMware

November 24, 2009 - (Free Research)
To help simplify enterprise desktop management, Dell and VMware have created a flexible, highly scalable desktop virtualization reference architecture based on Dell PowerEdge servers, Dell EqualLogic PS Series iSCSI SAN arrays, and powerful new VMware View 4 technology. 
(ARTICLE) READ ABSTRACT |

Cloud-Ready Data Center Reference Architecture by Juniper Networks, Inc.

December 31, 2011 - (Free Research)
Without effective data center network architecture and processes in place, your business cannot embrace cloud computing. This white paper examines the current state of the data center and the steps you need to take to adapt to changing trends and enable the cloud. 
(WHITE PAPER) READ ABSTRACT |

The New Face of Intrusion Prevention by Check Point Software Technologies Ltd.

June 12, 2009 - (Free Research)
Check Point IPS Software Blade gives breakthrough performance and protection at a breakthrough price. For more details, check out this paper, which highlights the numerous benefits of Check Point intrusion prevention protection solutions. 
(WHITE PAPER) READ ABSTRACT |

Blackberry Enterprise Solution: Security Technical Overview by BlackBerry

December 2008 - (Free Research)
This document describes the security features of the BlackBerry Enterprise Solution and provides an overview of the BlackBerry security architecture. 
(WHITE PAPER) READ ABSTRACT |

Windows Azure Platform Security Essentials: Module 1 - Security Architecture by Microsoft

December 2010 - (Free Research)
In this video module, Graham Calladine, Security Architect with Microsoft Services partners with the Security Talk Series to describe the security features of the Windows Azure platform, resources available to protect applications and data running on the Microsoft cloud and SQL Azure security and authentication options. 
(WEBCAST) READ ABSTRACT |

Windows Azure Platform Security Essentials for Technical Decision Makers by Microsoft

December 2010 - (Free Research)
In this video, Graham Calladine, Security Architect with Microsoft Services, answers the most common security concerns CxOs and other technical decision-makers have regarding the security of their data in Windows Azure cloud platform. 
(WEBCAST) READ ABSTRACT |

Enterprise Security Architecture – an outsourcer's view by ComputerWeekly.com

March 2013 - (Free Research)
Alan Jenkins, chief security officer of outsourcing specialist, T Systems, explains the company's approach to enterprise security architecture. 
(PRESENTATION) READ ABSTRACT |

1 - 25 of 470 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts