Security Comparison Of ApplicationWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Security Comparison Of Application returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Databases
 •   Endpoint Security
 •   Enterprise Systems Management
 •   Disk-based Backup & Storage/ RAID
 •   Application Management and Maintenance
 •   Application Security
 •   Database Planning and Implementation
 •   Storage Management
 •   Security Monitoring

Related Searches
 •   Access Security
 •   Check Security Comparison Of
 •   Decision Security Comparison
 •   Demo Security Comparison Of
 •   Distribution Security
 •   It Security Comparison Of
 •   Security Activities
 •   Security Comparison Parts
 •   Security Consultants
 •   Security Notes
Advertisement

ALL RESULTS
1 - 25 of 482 | Next Page

10 Questions to Ask Before You Buy an Anti‐Spam Solution by WatchGuard Technologies, Inc.

October 20, 2010 - (Free Research)
With so many anti-spam products on the market, how can you be sure you're getting the best solution for your business network? With these ten critical questions as your guide, you can cut through the marketing hype and zero in on the key features and benefits that should guide your decision. 
(WHITE PAPER) READ ABSTRACT |

Postgres Plus 8.4 vs. MySQL 5.5: Feature Comparison and Commentary by EnterpriseDB Corporation

September 01, 2010 - (Free Research)
This paper compares Postgres Plus Standard Server and Postgres Plus Advanced Server 8.4 against MySQL 5.5. The comparison is broken down into a number of sections with a short commentary following each section. Read on to learn how the Postgres Plus 8.4 stacks up against MySQL 5.5 on all the above topics and learn which one comes out on top. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly - 21 February 2012: Preparing for IPv6 by ComputerWeekly.com

February 21, 2012 - (Free Research)
This week's digital magazine examines the challenges of migrating to IPv6 now the internet has run out of IPv4 addresses - a process every IT manager now faces. We also look into the IT issues facing smart meters and ask what will the beta launch of Gov.uk hold in store for public services? 
(EZINE) READ ABSTRACT |

Intel® SOA Expressway Performance Comparison to IBM* DataPower XI50 by Intel

March 25, 2011 - (Free Research)
Intel® SOA Expressway (SOAE) provides superior performance for service mediation and governance use cases outpacing IBM® DataPower in a direct "apples-to-apples" comparison by 1.5X to 8X at half the cost. This paper presents benchmark test scenarios, cost analysis, and SOAE's multi-core optimized software architectural elements. 
(WHITE PAPER) READ ABSTRACT |

Choosing an Enterprise-Class Wireless Operating System: A Comparison of Android, BlackBerry, iPhone, and Windows Mobile by BlackBerry

November 03, 2011 - (Free Research)
When selecting a mobile computing platform, organizations have to keep security and manageability at the forefront of their considerations. Access this comprehensive resource to explore the key criteria in selecting, deploying and managing a mobile operating system. 
(WHITE PAPER) READ ABSTRACT |

Improving Windows Client Performance and Security: An Impact Comparison of AC and Traditional AV by Lumension

May 03, 2013 - (Free Research)
This Tolly Test report compares the effectiveness of both anti-virus and application control solutions to help you decide which would work best for your enterprise. View now to uncover which approach provides greater performance across diverse workloads and protects against more threats to keep your endpoints safe and secure. 
(WHITE PAPER) READ ABSTRACT |

Magic Quadrant for Security Information and Event Management by LogRhythm, Inc.

July 19, 2012 - (Free Research)
Access this white paper for a comprehensive comparison of the leading security information and event management (SIEM) providers. Read on for an overview of the SIEM market and the vendor landscape to help you evaluate your options. 
(WHITE PAPER) READ ABSTRACT |

Internet-Scale Identity Systems: An Overview and Comparison by Ping Identity Corporation

August 03, 2009 - (Free Research)
This white paper provides an overview of the key initiatives for Internet-scale identity systems and explores the similarities, differences, and synergies between them. 
(WHITE PAPER) READ ABSTRACT |

Security for Wireless Networks: A Comparison among SSL, IPSec and Mobile VPNs by NetMotion Wireless

June 2008 - (Free Research)
This paper outlines common threats and issues regarding wireless security in the context of typical uses of mobile devices over wireless networks and evaluates secure remote access solutions in comparison with NetMotion Mobility XE. 
(WHITE PAPER) READ ABSTRACT |

Intel Laptop Processor Comparison Tool by Intel

December 2012 - (Free Research)
See how you can use this handy comparison tool to evaluate the performance, security, and manageability features and benefits of different laptop processors. Strategically choose the solution that best matches your business needs -- click through now to get started! 
(ASSESSMENT TOOL) READ ABSTRACT |

Complex Managed Hosting: Market Survey and Vendor Feature Comparison by Connectria Hosting

August 2010 - (Free Research)
In its most sophisticated form, complex managed hosting, companies can outsource high-level IT functions such as OS management, virtualization, load balancing, performance monitoring, security and more. Read this market survey to get a comparison of the different features offered by complex managed hosting companies. 
(WHITE PAPER) READ ABSTRACT |

A Quantitative Comparison of High Efficiency AC vs. DC Power Distribution for Data Centers by Schneider Electric

June 2013 - (Free Research)
This resource presents detailed quantitative efficiency comparison between DC and AC power distribution methods, including an analysis of the effects of power distribution efficiency on the cooling power requirement and on total electrical consumption. 
(WHITE PAPER) READ ABSTRACT |

Web Application Security - How to Minimise Prevalent Risk of Attacks by Qualys

March 2009 - (Free Research)
Read this white paper to understand how to minimise vulnerabilities in web applications. A guide to web application security outlines typical web application vulnerabilities and provides a comparison of web application vulnerability detection options. 
(WHITE PAPER) READ ABSTRACT |

PostgreSQL vs. MySQL: A Comparison of Enterprise Suitability by EnterpriseDB Corporation

August 2009 - (Free Research)
This paper presents a comparison between PostgreSQL and MySQL. Fundamental and more sophisticated features and performance that characterize enterprise capable databases are contrasted between PostgreSQL and MySQL. This comparison can be very useful to those who have little or no experience when it comes to MySQL in deployment. 
(WHITE PAPER) READ ABSTRACT |

State of Software Security Report by Veracode, Inc.

February 2011 - (Free Research)
The State of Software Security is a semi-annual report that draws on continuously updated information in Veracode’s cloud-based application risk management services platform. Unlike a survey, the data comes from actual code-level analysis of billions of lines of code and thousands of applications. 
(WHITE PAPER) READ ABSTRACT |

Magic Quadrant for Application Security Testing by Hewlett-Packard Company

July 2013 - (Free Research)
Access this in-depth analyst report from Gartner on the top vendors in application security testing (AST) to find out which category of testing your organization needs to protect against intensifying targeted attacks. 
(ANALYST REPORT) READ ABSTRACT |

Feature Comparison: JBoss Enterprise Application Platform and IBM WebSphere Liberty Profile by Red Hat

April 2013 - (Free Research)
How similar are the IBM WebSphere Liberty Profile component of the WebSphere Application Server and Red Hat® JBoss® Enterprise Application Platform 6? Get a closer look at a feature comparison of the Liberty Profile and the JBoss Application Platform in this webcast, so you can see for yourself just how distinct these two tools actually are. 
(WEBCAST) READ ABSTRACT |

Gartner Magic Quadrant for Application Delivery Controllers by Citrix

November 2010 - (Free Research)
See Who's in the Leader's Quadrant for Application Delivery Controllers. In this in-depth report, Gartner summarizes its view on Application Delivery Controllers, evaluates the strengths and weaknesses of solutions, and provides Magic Quadrant reporting for a quick comparison across all vendors. Get the full report compliments of Citrix. 
(ANALYST REPORT) READ ABSTRACT |

Best practices for implementing 2048-bit SSL by Citrix

January 2012 - (Free Research)
Ready for 2048-bit SSL? Not with the competition. Shift to Citrix NetScaler for 2x faster 2048-bit SSL performance. Download the 2048-bit Performance Kit. 
(WHITE PAPER) READ ABSTRACT |

Faster Application Development via Improved Database Change Management by Embarcadero Technologies, Inc.

March 2009 - (Free Research)
Embarcadero® Change Manager™ puts the power of change tracking, schema comparison, software-generated synchronization scripts, and flexible reporting into the hands of the development team. 
(WHITE PAPER) READ ABSTRACT |

BPM Technology Review: Vendor Comparison Report by Oracle Corporation

July 2013 - (Free Research)
Access this report today for an overview of the state of the BPM technology market today, an expert approach to assessing BPM technology offerings, and a high-level comparison of the offerings from six top vendors. 
(WHITE PAPER) READ ABSTRACT |

Price Comparison: JBoss Enterprise Application Platform and IBM WebSphere Liberty Profile by Red Hat

November 2012 - (Free Research)
While the IBM WebSphere Liberty Profile component of the WebSphere Application Server and Red Hat® JBoss® Enterprise Application Platform 6 may appear to have many similarities, that's not the whole truth. These two tools actually have quite a few differences -- especially when it comes to costs. 
(WEBCAST) READ ABSTRACT |

Price Comparison: JBoss Enterprise Application Platform and Oracle WebLogic Server by Red Hat

November 2012 - (Free Research)
Red Hat and Oracle both offer application platforms on the Java EE v6, which means these tools share many capabilities and features -- but what about when it comes to price? See how the two technologies stack up when it comes to acquisition and support costs, and find out how much money you could potentially save by choosing one over the other. 
(WEBCAST) READ ABSTRACT |

Presentation Transcript: State of the Threat by Websense, Inc.

July 2009 - (Free Research)
The monetizing of economic crime in Web 2.0 makes Web security a top priority for security pros. Traditional defenses are obsolete, so read this presentation transcript, taken from the video cast of the same name, and learn best practices for creating a new approach to Web security. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Performing Effective MTBF Comparisons for Data Center Infrastructure by APC by Schneider Electric

January 2010 - (Free Research)
Mean Time Between Failure (MTBF) is often proposed as a key decision making criterion when comparing data center infrastructure systems. This paper explains how MTBF can be effectively used as one of several factors for specification and selection of systems, by making the assumptions explicit. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 482 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts