Security CompareWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Security Compare returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Storage Security
 •   Virtualization
 •   Storage Management
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Security Policies
 •   Application Servers
 •   Enterprise Systems Management
 •   Security Monitoring
 •   Operating Systems and Subsystems

Related Searches
 •   Features Security
 •   Manufacturers Security
 •   Organizational Security Compare
 •   Research About Security Compare
 •   Security Compare Guideline
 •   Security Compare Maine
 •   Security Compare New Hampshire
 •   Security Compare Timeline
 •   Security Production
 •   Storage Security
Advertisement

ALL RESULTS
1 - 25 of 465 | Next Page

The Business Case for Data Security by Imperva

March 10, 2011 - (Free Research)
This paper examines the drivers for adopting a strategic approach to data security, compares and contrasts current approaches, and presents the Return on Security Investment (ROSI) of viable data security solutions. 
(WHITE PAPER) READ ABSTRACT |

Windows 2003/2000/XP Security Architecture Overview by Global Knowledge Network, Inc.

June 2005 - (Free Research)
Windows 2003 Server, its workstation cousin Windows XP, and its predecessor, Windows 2000, all bring substantial advances in both reliability and security compared to Windows NT 4.0. This briefing lays out the main security features of the Windows 2003 operating system family, and put them together into a "big picture" context. 
(WHITE PAPER) READ ABSTRACT |

The Business Case for Data Security by Imperva

November 2010 - (Free Research)
This paper examines the drivers for adopting a strategic approach to data security, compares and contrasts current approaches, and presents the Return on Security Investment (ROSI) of viable data security solutions. 
(WHITE PAPER) READ ABSTRACT |

802.11n: The End of Ethernet? by Aruba Networks

September 2009 - (Free Research)
This report compares 802.11n to Gigabit Ethernet for use in local area network (LAN) access applications. More specifically, the report compares both technologies in six dimensions: mobility, performance, security, management, staffing, and cost. 
(ANALYST REPORT) READ ABSTRACT |

Buyer's Guide to Log Management: Comparing On-Premise and On-Demand Solutions by Alert Logic

March 2007 - (Free Research)
This white paper examines and compares two solutions to log management - traditional on-premise log management managed in-house by the infrastructure team and a Software-as-a-Service (SaaS). 
(WHITE PAPER) READ ABSTRACT |

OLTP performance test comparing Dell PowerVault MD3000i iSCSI SAN Array and HP StorageWorks 2000i Modular Smart Array by Dell, Inc.

November 2008 - (Free Research)
Dell, Inc. commissioned Principle Technologies to compare performance for online transaction processing (OLTP) of two entry-level storage arean network (SAN) solutions - the Dell PowerVault MD3000i iSCSI SAN Array and HP StorageWorks 2000i Modular Smart. Read this paper for a detailed comparative analysis. 
(WHITE PAPER) READ ABSTRACT |

Comparing HP-UX 11i v3 and Linux for Hosting Critical Workloads by HP & Intel®

February 2011 - (Free Research)
This white paper presents a technical comparison of HP-UX 11i v3, Red Hat Enterprise Linux 5 (RHEL 5), and SUSE Linux Enterprise Server 11 (SLES 11) operating systems, focusing on their functional capabilities in terms of scalability, virtualization, reliability, and security. 
(WHITE PAPER) READ ABSTRACT |

Comparing Email Archiving Software with General Archiving Software by Symantec Corporation

November 2012 - (Free Research)
Compare email-specific archiving solutions to general archiving products in this expert E-Guide featuring Brien Posey, backup expert. Read on to learn how these techs differ, which is better for eDiscovery and check out the pros and cons of all-in-one packages vs. individual apps for each task. 
(EGUIDE) READ ABSTRACT |

Comparing the TCO of Physical PCs, VDI, and Cloud-hosted Desktops as a Service (Daas) by Desktone

February 2011 - (Free Research)
This white paper compares the total cost of ownership (TCO) of physical PCs, virtual desktops, and cloud-hosted desktops as a service (DaaS). 
(WHITE PAPER) READ ABSTRACT |

Virtual Data Center E-Zine:Volume 32: Public vs. Private: Comparing Cloud Architectures by Thawte Inc.

February 2012 - (Free Research)
In this e-zine, compare the trade-offs of private and public cloud computing. Find out how you can measure, monitor and optimize the performance of applications in the cloud. Plus, learn how you can develop a solid plan for virtualizing your applications. 
(EZINE)

Comparing health care data security compliance to other industries by Hewlett-Packard Company

April 2012 - (Free Research)
<p>This e-guide discusses the challenges health care companies run into meeting state and federal data security compliance regulations and how health care organizations compare to other industries such as financial services.</p> 
(EGUIDE) READ ABSTRACT |

IBM WebSphere® Application Server V8.5 vs. JBoss® Enterprise Application Platform V6 TCO Analysis by IBM

December 2012 - (Free Research)
In the application server market, open source technology has grown in popularity and is becoming an increasingly viable solution for many companies. With their latest release, Red Hat claims that JBoss (open-source) is now equivalent to the mainstream Java Enterprise Application Servers. How true is this? 
(WHITE PAPER) READ ABSTRACT |

Next Generation Data Protection Solutions by EMC Backup and Recovery Solutions

January 2010 - (Free Research)
This paper compares traditional data protection options and provides an overview of the impact data deduplication is having on the storage industry. Deduplication is quickly gaining momentum in the growing disk-to-disk backup market and offers several significant improvements over traditional data protection methods. 
(WHITE PAPER) READ ABSTRACT |

Improving Windows Client Performance and Security: An Impact Comparison of AC and Traditional AV by Lumension

May 2013 - (Free Research)
This Tolly Test report compares the effectiveness of both anti-virus and application control solutions to help you decide which would work best for your enterprise. View now to uncover which approach provides greater performance across diverse workloads and protects against more threats to keep your endpoints safe and secure. 
(WHITE PAPER) READ ABSTRACT |

Corporate Device Ownership and Top Security Concerns by BlackBerry

November 2013 - (Free Research)
This e-guide from the experts at SearchConsumerization.com compares the bring your own device (BYOD) and the corporate-owned, personally enabled (COPE) models of enterprise mobility. Also inside, uncover the perceptions and realities of BYOD security. 
(EGUIDE) READ ABSTRACT |

How to Build a Massively Scalable Next-Generation Firewall by Dell Software

August 2013 - (Free Research)
Learn how to build a massively scalable next-generation firewall (NGFW) in this comprehensive white paper. It also outlines the kind of technical innovations needed to produce a massively scalable NGFW, and results from a benchmark test comparing the four leading next-generation firewalls. 
(WHITE PAPER) READ ABSTRACT |

What to Look for When Evaluating Next-Generation Firewalls by Dell Software

December 2012 - (Free Research)
This paper summarizes the results of three independent tests conducted by Network World, ICSA Labs and NSS Labs comparing next-generation firewall performance, cost and functionality. 
(WHITE PAPER) READ ABSTRACT |

Comparing Data Center Power Distribution Architectures by Schneider Electric

October 2013 - (Free Research)
This white paper compares 5 common data center power distribution methods. 
(WHITE PAPER) READ ABSTRACT |

Hardware and Software Authentication: Choosing the Right Approach by SafeNet, Inc.

July 2010 - (Free Research)
This paper compares the strengths and weaknesses of hardware and software-based authentication approaches, and offers five key considerations for evaluating which approach is right for the specific needs of your organization. 
(WHITE PAPER) READ ABSTRACT |

Approaches to Distributed Denial of Service (DDoS) Protection: A Cost Analysis by VeriSign, Inc

June 2010 - (Free Research)
Do you know what a Distributed Denial of Service (DDoS) attack might cost your organization? This white paper defines DDoS, examines the elements that make up a DDoS protection solution, and compares three different approaches to DDoS protection. Read this paper to learn how to ramp up protection and reduce costs. 
(WHITE PAPER) READ ABSTRACT |

Operational Efficiencies of Proactive Vulnerability Management by McAfee, Inc.

August 2011 - (Free Research)
View this paper to explore the operational and economic efficiencies associated with the implementation of proactive, integrated, and automated vulnerability management compared to the inefficiencies of a reactive, manual, and fragmented security operation. 
(WHITE PAPER) READ ABSTRACT |

IDS vs. IPS by Sourcefire

April 2011 - (Free Research)
When it comes to intrusion detection systems (IDS) and intrusion prevention systems (IPS) it’s not always easy for organizations to determine what functions each can be used for. This expert tip compares the features and capabilities of IDS and IPS technologies and highlights popular use cases for each system. 
(EGUIDE) READ ABSTRACT |

Web application security: automated scanning versus manual penetration testing by IBM

January 2008 - (Free Research)
There are two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis. The purpose of this paper is to compare these two methods. 
(WHITE PAPER) READ ABSTRACT |

Mobile Security: Rewards Outweigh Risks by GeoTrust, Inc.

July 2013 - (Free Research)
This expert guide examines the impact that enterprise mobility can have on your organization, comparing the pros and cons, and explains why the benefits outweigh the risks. 
(EGUIDE) READ ABSTRACT |

KVM: Hypervisor Security You Can Depend On by Red Hat & IBM

February 2012 - (Free Research)
Implementing secure virtual and cloud environments is a major concern for businesses. Discover how KVM hypervisors provide the security businesses need with features such mandatory access control and hardware-based isolation, and compare its performance against other general-purpose x86 hypervisors. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 465 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts