Security Building AdministrationWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Security Building Administration returned the following results.
RSS What is RSS?
Related Categories

 •   Database Administration
 •   Databases
 •   Storage Management
 •   Data Security
 •   Virtualization
 •   Enterprise Systems Management
 •   Network Security
 •   Database Planning and Implementation
 •   Storage Area Network (SAN)/ Network Attached Storage (NAS)
 •   Storage Security

Related Searches
 •   Security Building Demand
 •   Security Building Imports
 •   Security Find
 •   Security Rfi
 •   Security Spreadsheets
 •   Server Security Building
 •   Solutions Security
 •   Storage Security
Advertisement

ALL RESULTS
1 - 25 of 479 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

E-Guide: Improving software with the building security in maturity model by IBM

May 26, 2011 - (Free Research)
This expert tip introduces a model that utilizes a framework to organize software security tasks and help organizations determine where their security practices stand and how to advance them over time. 
(EGUIDE) READ ABSTRACT |

ROC Maestro for Open Systems by ROC Software

ROC Maestro for Open Systems, a key component of the ROC Enterprise Suite™, provides a very easy method for scheduling and managing workloads, processes, dependencies and events across complex, heterogeneous IT environments. 
(SOFTWARE PRODUCT)

Create the Optimal Architecture for Your Critical Applications by IBM

January 16, 2009 - (Free Research)
IBM has the vision, expertise, experience and product offerings that enable you to build an optimal architecture for application performance that drives business success. 
(WHITE PAPER) READ ABSTRACT |

Implementing Database Security and Auditing - Authentication and Password Security by IBM

May 17, 2011 - (Free Research)
In order to secure your database, you need an authentication process to identify users before allowing any activities. In this chapter, explore the authentication process and learn best practices for authentication and user account management. 
(EBOOK) READ ABSTRACT |

How can Identity and Access Management Improve IT Security and Reduce Risk to Help Drive my Business? by CA Technologies.

September 01, 2010 - (Free Research)
IAM builds a foundation for effective security by helping ensure all users have only the appropriate level of access rights to all protected resources, and that those rights are enforced appropriately. Read this executive brief to learn more about taking control of IT operations and information security with Content-Aware IAM. 
(WHITE PAPER) READ ABSTRACT |

The Education Edge: School Administration Software by Blackbaud

This complete solution was developed exclusively for school administrators to help effectively manage every aspect of school administration and student information. 
(SOFTWARE PRODUCT)

Beyond UTM -- The Value of a Purpose-built Network Security Platform by Fortinet, Inc.

August 2007 - (Free Research)
It is only with a purpose-built network security platform -- as defined by this paper -- that organizations will be assured of maximum security effectiveness, minimum cost of ownership, and the greatest degree of. 
(WHITE PAPER) READ ABSTRACT |

Five Steps to Building Visibility and Security Into Your Network by Ixia

December 2013 - (Free Research)
Discover five steps you need to take to not only build visibility and security into your network, but also get the most out of your current monitoring investments. 
(WHITE PAPER) READ ABSTRACT |

Simplify and Consolidate Data Protection for Better Business Results by IBM

September 2013 - (Free Research)
This informative resource examines a tool that provides advanced visualization, built-in analytics and integrated workflow automation features that dramatically simplify backup administration to streamline problem resolution and simplify data protection. 
(WHITE PAPER) READ ABSTRACT |

The Next Generation Intelligent Network Infrastructure: How the Enterasys S-Series provides critical capabilities for a future-proofed Local Area Network by Enterasys

March 2010 - (Free Research)
This paper discusses three components of the Enterasys S-Series family of next generation intelligent switch routers: Intelligent traffic classification and bandwidth management; Network survivability during times of oversubscription; and Identity and context-based connectivity provisioning. 
(ARTICLE) READ ABSTRACT |

Enhancing Microsoft SharePoint Security by TITUS

February 2012 - (Free Research)
This white paper covers three key areas to address in order to secure the SharePoint document repository, and provides recommendations for how SharePoint administrations can enhance SharePoint security and apply security automatically and consistently across the SharePoint repository. 
(WHITE PAPER) READ ABSTRACT |

Network Security 2.0: A Systems Approach to Threat Mitigation Augments Defense in Depth by Cisco Systems, Inc.

May 2008 - (Free Research)
In the first edition of a six part series on Network Security sponsored by Cisco Systems, security architecture is the focus. Specifically covered is a systems approach that builds on IT security investment using System Management for policy, reputation and identity. 
(WHITE PAPER) READ ABSTRACT |

Buyer’s Guide for Enterprise Single Sign-On by Oracle Corporation

April 2009 - (Free Research)
This whitepaper offers a thorough checklist that should enable potential ESSO implementers to deploy the right ESSO solution which should help eliminate sign-on problems, reduce helpdesk costs, maximize user productivity, strengthen security, simplify administration and accelerate regulatory compliance. 
(WHITE PAPER) READ ABSTRACT |

Simplify and Consolidate Data Protection for Better Business Results by IBM

June 2013 - (Free Research)
This white paper explores how IBM introduced a next-generation graphical user interface to provide advanced visualization, built-in analytics and integrated workflow automation features that leapfrog traditional backup user interfaces, and dramatically simplify backup administration. 
(WHITE PAPER) READ ABSTRACT |

Red Hat Network Satellite: Management And Automation Of Your Red Hat® Enterprise Linux® Environment by Red Hat and JBoss

July 2009 - (Free Research)
Red Hat Network (RHN) Satellite server is an easy-to-use, advanced systems management platform for your Linux infrastructure. Learn the business benefits gained through increased productivity, reduced system life cycle costs, greater administration consistency, and enhanced security. This overview details the many features of each module... 
(PRODUCT OVERVIEW) READ ABSTRACT |

Oracle Solaris and Oracle SPARC T4 Servers— Engineered Together for Enterprise Cloud Deployments by Oracle Corporation

June 2012 - (Free Research)
Read this paper to learn how Oracle Solaris and the SPARC T4 processor can help you manage your costs for existing infrastructures or for new enterprise cloud infrastructure design. Discover how Solaris works cohesively with SPARC T4 systems and other Oracle software to enable a handful of cloud-ready solutions. 
(WHITE PAPER) READ ABSTRACT |

SQL Anywhere: Industry-leading database management and data movement technologies built for frontline environments by Sybase, an SAP company

June 2010 - (Free Research)
SQL Anywhere® is a comprehensive package providing data management and data movement technologies that enable the rapid development and deployment of database-powered applications. SQL Anywhere offers enterprise caliber databases that scale from 64-bit servers with thousands of users down to small handheld devices. 
(DATA SHEET) READ ABSTRACT |

E-Guide: Best Practices for Building a Cost-effective Oracle Database on SANs by Dell, Inc.

May 2011 - (Free Research)
This SearchStorage.com E-Guide outlines best practices for building a cost-effective database infrastructure on SANs and how to ensure uptime in these Oracle, SAN environments. Read on to learn what it takes to deploy a scalable, efficient and cost-controlled database infrastructure. 
(EGUIDE) READ ABSTRACT |

Dell EqualLogic PS6510E by Dell, Inc.

November 2009 - (Free Research)
The Dell™ EqualLogic™ PS6510E is a virtualized iSCSI SAN that combines intelligence and automation with fault tolerance to provide simplified administration, rapid deployment, enterprise performance and reliability, and seamless scalability. Read this data sheet to learn more! 
(DATA SHEET) READ ABSTRACT |

Top Five Reasons Why Customers Deploy Microsoft SQL Server on EMC VNX Unified Storage by EMC Corporation

May 2012 - (Free Research)
<p>Top five reasons why customers deploy Microsoft SQL Server on EMC VNX Unified Storage.</p> 
(WHITE PAPER) READ ABSTRACT |

Sustainability and the Cloud: The Global Environmental Benefits of IT Hosting and Cloud Technology by Rackspace Hosting

April 2011 - (Free Research)
Through this year-long series of whitepapers and webinars, independent analyst Ben Kepes will be building a cloud computing curriculum designed for technologists and non-technical users alike. 
(WHITE PAPER) READ ABSTRACT |

Legacy Tools: Not Built for Today's Helpdesk by LogMeIn, Inc.

January 2012 - (Free Research)
Explore the challenges of a remote and mobile workforce and find out information to choosing new helpdesk support tools to meet the needs of all your employees. 
(WHITE PAPER) READ ABSTRACT |

Resin Application Server Java EE 6 Web Profile by Caucho Technology

March 2010 - (Free Research)
Caucho Technology aims to certify the Resin 4 application server on the newly finalized Java EE 6 Web Profile. This white paper discusses the Java EE 6 Web Profile and how it fits with the development philosophy of Resin as well as the details of our implementation including Resin extensions to the Java EE 6 Web Profile. 
(WHITE PAPER) READ ABSTRACT |

Twynham School Relies on DocAve® to Protect Valuable SharePoint Data by AvePoint, Inc.

February 2010 - (Free Research)
Southwest England's Twynham Comprehensive School used AvePoint's DocAve Backup and Restore to provide reliable, granular, and full-fidelity backup and recovery capabilities to protect their over 50GB of data and hundreds of sites stored on its MOSS environment. 
(CASE STUDY) READ ABSTRACT |

Symantec™ NetBackup Appliances: Financial Analysis by Symantec Corporation

December 2013 - (Free Research)
Did you know you can actually gain more benefits through this vendor's backup appliance than through a traditional build-your-own media server? Explore this informational resource to find out how the industry's only integrated and purpose-built recovery and backup appliance by addressing challenges organizations face. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 479 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts