Security ComputerizedWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Security Computerized returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Virtualization
 •   Enterprise Data Protection and Privacy
 •   Network Management
 •   Desktop Management
 •   Operating Systems and Subsystems
 •   Wireless Technologies and Mobile Computing
 •   Fraud Detection & Prevention
 •   Content Delivery Networks/ Web Application Acceleration
 •   Unified Communications / Voice & Data Convergence

Related Searches
 •   Asp Security Computerized
 •   Charts Security Computerized
 •   Demos Security Computerized
 •   Implementation Security Computerized
 •   Issues Security Computerized
 •   Printable Security
 •   Security Computerized Budgets
 •   Security Computerized Screen
 •   Security Computerized White Papers
 •   Security Matrix
Advertisement

ALL RESULTS
1 - 25 of 500 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..
The Path to Enterprise Desktops: From Personal Computer to Personalized Computing by AMD and VMware, Inc..
This IDC white paper considers the concept of desktop virtualization, specifically as made available by VMware's VDI and ACE. The document also considers the benefits more...
>> Discover more offerings from AMD and VMware, Inc..

Best Practices: Single Sign-On Drives Productivity, Security and Adoption When Used with EHR at The Johns Hopkins Hospital by Imprivata

December 31, 2012 - (Free Research)
In this case study, learn how Johns Hopkins Hospital was able to smoothly implement electronic health records (EHR) and computerized physician order entry (CPOE) without negatively impacting other processes or security. Click now for 5 essential guides for implementation success. 
(WHITE PAPER) READ ABSTRACT |

Top 10 Steps to Protecting Your Organization’s Privacy Data by McAfee, Inc.

March 09, 2010 - (Free Research)
Over the last few years, the challenge of protecting privacy data has been compounded by increasing compliance regulations that can mean fines - or even jail time - if privacy data is mishandled. This white paper presents the top ten regulatory compliance requirements to consider when selecting a privacy data protection solution. 
(WHITE PAPER) READ ABSTRACT |

3 Steps to Faster EMR Adoption with Desktop Virtualization and SSO by VMware, Inc.

January 11, 2012 - (Free Research)
This white paper outlines three key steps that your organization can take to accelerate EHR and CPOE adoption. Read on to discover out how to make it faster and easier to deploy new clinical applications while optimizing the clinician experience, protecting patient data, and reducing cost and complexity. 
(WHITE PAPER) READ ABSTRACT |

Using Desktop Virtualization to Drive Quality and Cost Savings in Clinical Computing by Dell, Inc.

August 04, 2011 - (Free Research)
Incentives created by the American Recovery and Reinvestment Act are expected to increase EHR adoption and point-of-care computing -- meaning demands on availability and performance are high, while the budgets to manage devices are small. Find out how desktop virtualization can assist with these healthcare challenges. 
(WHITE PAPER) READ ABSTRACT |

Life-Critical Networks For 21st Century Health Care by Brocade

March 24, 2010 - (Free Research)
Network convergence has turned hospitals into dense networks of sophisticated, computerized medical gear. Take the network away and you’d be left with a lot of dumb devices that cannot perform the lifesaving functions for which they were designed. 
(EBOOK) READ ABSTRACT |

E-Guide: Pros and Cons of the iPad in Health Care Settings by Kensington

October 05, 2011 - (Free Research)
Can the iPad be incorporated into health care networks without breaking security requirements? In this exclusive resource, get answers to some of the most common questions about using iPads in health care facilities. 
(EGUIDE) READ ABSTRACT |

Leverage Technology at the Point of Care with Services from CDW Healthcare : Your Point-of-Care Services Solution Overview by CDW Healthcare

October 17, 2011 - (Free Research)
Choosing the right PoC technology can improve your hospital’s ability to deliver quality patient care. This means you need to adopt PoC solutions that are readily compatible with existing systems, accommodate your budget and can comply with government criteria. Learn about services available to ensure a smooth transition to PoC. 
(WHITE PAPER) READ ABSTRACT |

The Age of Electronic Ticketing by Hexaware Technologies

May 2008 - (Free Research)
Electronic ticketing or e-ticketing is a recent development in the transport industry designed to eliminate the need for paper based ticketing and to facilitate the check-in procedures at airports and train stations. 
(WHITE PAPER) READ ABSTRACT |

Life-Critical Networks for 21st Century Health Care by SearchCIO.com and SearchNetworking.com

December 2009 - (Free Research)
This e-book presents healthcare specific networking issues such as the importance of networks within a hospital, wireless networking for life-critical networks, the future of health care networks, and more. 
(EBOOK) READ ABSTRACT |

Global lessons in eHealth implementation by ComputerWeekly.com

April 2012 - (Free Research)
This report from KPMG, packed with case studies, looks at the drivers for innovation in e-health. 
(JOURNAL ARTICLE) READ ABSTRACT |

Security Leadership Series: Security Strategies for Success by Citrix

May 2014 - (Free Research)
This white paper offers best practices for 3 key initiatives that can improve security given the increase in mobility and cloud trends. 
(WHITE PAPER) READ ABSTRACT |

Top 10 Reasons to Strengthen Information Security with Desktop Virtualization by Citrix

June 2013 - (Free Research)
Read this white paper to learn more about how deploying desktop virtualization can ensure your information is secure, allowing you to embrace workshifting and emerging technology. 
(WHITE PAPER) READ ABSTRACT |

The 10 “must-haves” for secure enterprise mobility by Citrix

February 2013 - (Free Research)
This whitepaper provides a security framework and evaluator's checklist you can use to make sure you are securing mobile devices and data properly, including the 10 "must haves" for secure enterprise mobility. 
(WHITE PAPER) READ ABSTRACT |

Delivering enterprise information securely on Android, Apple iOS and Microsoft Windows tablets and smartphones by Citrix

August 2012 - (Free Research)
A recent report found that almost two-thirds of organizations were able to increase productivity because of flexibility with mobile devices in the workplace. But utilizing mobile devices can also make the enterprise more vulnerable to attacks. Access this exclusive resource to learn how to mitigate some of the risks associated with BYOD adoption. 
(WHITE PAPER) READ ABSTRACT |

Security Primer: Top Tips for Protecting Your System i by Bytware, Inc.

March 2008 - (Free Research)
This E-Guide from TechTarget's Search400.com explores the many components of System i security. 
(WHITE PAPER) READ ABSTRACT |

An Objective Approach to Security by Bytware, Inc.

May 2007 - (Free Research)
i5/OS may be famous for security, but it doesn't go far enough in protecting your data. Supplementing with third-party Transaction security is popular, but cumbersome. Find out why Object-based security provides a better way in this... 
(WHITE PAPER) READ ABSTRACT |

A Survey of Zero-day Attacks in 2013 and What They Say About the Traditional Security Model by FireEye

June 2014 - (Free Research)
This informative survey explores zero-day attacks in 2013 and what they say about the traditional security model. 
(WHITE PAPER) READ ABSTRACT |

6 Ways to Enhance Security in AWS by SafeNet, Inc.

February 2014 - (Free Research)
In this white paper, learn why Amazon Web Services (AWS) is a leading cloud service, with a strong partnership with a security provider that provides 6 additional security enhancements to better protect data. 
(WHITE PAPER) READ ABSTRACT |

Build Your Identity And Access Management Strategy by Symplified

March 2012 - (Free Research)
This Forrester Research, Inc., paper explores the current and future states of identity and access management and describes steps your organization should take to create an IAM strategy and successfully put it into use. 
(WHITE PAPER) READ ABSTRACT |

PCI Compliance for IBM System i (AS/400) by PowerTech

November 2007 - (Free Research)
This whitepaper examines how the standard relates to the System i (AS/400). When applicable, specific operating systems commands and configuration settings are provided. 
(WHITE PAPER) READ ABSTRACT |

Configuring and Using IBM i's Auditing Functions by PowerTech

March 2010 - (Free Research)
Did you know that IBM i includes powerful auditing features? In fact, our own class-leading audit reporting solution leverages the information captured by this facility. Join this webinar-based on content presented at the 2009 COMMON conference-to learn about activating and configuring IBM i's built-in auditing capabilities. 
(WEBCAST) READ ABSTRACT |

IBM Eye: Security Detective for Hire by PowerTech

September 2009 - (Free Research)
This article will give step-by-step overview of how to deal with some of the most pervasive security threats currently facing IBM Power Systems. It'll help organizations that are struggling to get started with security and act as a 'wake-up call' for those who think that “powering the server on” is all the security they need. 
(TECHNICAL ARTICLE) READ ABSTRACT |

LogRhythm and PCI Compliance by LogRhythm, Inc.

September 2009 - (Free Research)
LogRhythm has extensive experience in helping organizations improve their overall security and compliance posture while reducing costs. This paper illustrates and discusses the 6 domains of PCI DSS requirements as well as uses tables to outline how LogRhythm supports PCI compliance. 
(WHITE PAPER) READ ABSTRACT |

Topographies for the Simply Connected Campus: Juniper's Simply Connected Campus Network Platform Architectures by Juniper Networks, Inc.

May 2012 - (Free Research)
Uncover a set of solutions that can help you satisfy all the requirements of a campus network, conquer the environment's inherent challenges, and provide a wired-like experience to your end users, no matter what device they are using. 
(WHITE PAPER) READ ABSTRACT |

Mobile Device Security: Emerging Threats, Essential Strategies by Juniper Networks, Inc.

February 2012 - (Free Research)
In this resource, explore the emerging threats organizations face with the rise of mobile computing. View now to discover key strategies for securing mobile devices, including the essential requirements for an effective solution. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 500 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts