Security Distance NeuralWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Security Distance Neural returned the following results.
RSS What is RSS?
Related Categories

 •   Virtualization
 •   Network Management
 •   Data Center Management
 •   Enterprise Systems Management
 •   Networks
 •   Collaborative Tools
 •   WAN/ LAN Solutions
 •   Data Security
 •   Application Management and Maintenance
 •   Storage Management

Related Searches
 •   Concerns Security Distance Neural
 •   Configuration Security Distance
 •   Designs Security Distance
 •   Devices Security Distance
 •   Firms Security Distance
 •   Layout Security
 •   Security Distance Neural Email
 •   Security Distance Neural Financial
 •   Security Distance Neural Provider
 •   Security Hardware Provider
Advertisement

ALL RESULTS
1 - 25 of 497 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Mobile Virtualization and Remote Access on Windows Mobile Smartphones by Celio Corp / REDFLY Mobile Companion

August 2008 - (Free Research)
Remote access and virtualization on the smartphone is a secure and efficient way to provide the mobile workforce access to robust applications and desktop features. 
(WHITE PAPER) READ ABSTRACT |

May Issue of Information Security Magazine: Data Protection: Going the Distance by Information Security Magazine

May 2011 - (Free Research)
This month’s Information Security cover story explores the practical ways you can avoid mishaps by building on the technical specifications of compliance requirements like PCI DSS. Learn to focus your efforts on not only satisfying these compliance mandates, but also create a robust, comprehensive information security program at the same time. 
(EZINE)

  Delivering Comprehensive Business Monitoring and Protection by ArcSight, an HP Company

March 2010 - (Free Research)
ArcSight ESM is a sophisticated solution for compliance requirements and protection against external and internal security breaches. Read more to find out. 
(WHITE PAPER) READ ABSTRACT |

IP Integrated Access Service by Verizon and Adtran

August 2007 - (Free Research)
IP Integrated Access is specifically designed for small-and medium-sized businesses that are looking for a cost-effective way to carry voice and data over the same connection. 
(DATA SHEET) READ ABSTRACT |

Rapid Architectural Consolidation Engine - The Enterprise Solution for Disparate Data Models by Innovative Routines International, Inc.

March 2008 - (Free Research)
RapidACE is a software platform that enables data architects to integrate disparate data models automatically. It delivers high speed, automated data model consolidation. 
(WHITE PAPER) READ ABSTRACT |

Intel® Cloud Builders Guide: Secure Cloud On-Boarding over Distance for Mission-Critical Applications by Intel

September 2011 - (Free Research)
This white paper provides detailed insights on what cloud on-boarding and cloud bursting operations are and introduces technologies you can leverage to simplify both. Discover how easy it can be to securely migrate application workloads between your cloud environments when you have the right strategy in place. 
(WHITE PAPER)

Remote Collaboration: How the World Defies Distance by Polycom, Inc.

May 2014 - (Free Research)
This survey outlines the top 10 remote collaboration challenges – which were determined by 5000 business professionals from around the globe. 
(WHITE PAPER) READ ABSTRACT |

Collapsing time and distance barriers by Jive Software

June 2013 - (Free Research)
Check out this case study to learn how CSC, a Fortune 200 IT service provider, leveraged a social business software to deliver web 2.0 capabilities to their collaborative strategy, and how their deployment approach enabled better connection between people, content, and communities. 
(CASE STUDY) READ ABSTRACT |

Evolution to the Cloud by Ciena

May 2012 - (Free Research)
Learn – in less than six minutes – about a cloud approach that can be labelled a “data centre without walls,” enabling a virtual capacity that is both distance-independent and dynamically scalable. View now to learn the cost- and productivity benefits this approach can offer your organisation. 
(WEBCAST) READ ABSTRACT |

Media Conversion in Video Security and Surveillance Systems by Transition Networks, Inc.

September 2008 - (Free Research)
This whitepaper discusses what can be the weakest link in many video applications – cabling infrastructure. Learn how media conversion can be an economical and effective means to convert to the cabling medium of your choice. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 26 February 2013: European Commission targets data security by ComputerWeekly.com

February 2013 - (Free Research)
In this week's Computer Weekly, we look at the new IT security proposals from the European Commission and ask whether the benefits will be worth it. We reveal the challenges of managing big data, with help from some industry analysts, and hear from the Open University CIO on IT tools that support learning. Read the issue now. 
(EZINE) READ ABSTRACT |

Accellion raises the bar in secure cloud-based file sharing by Accellion, Inc.

December 2012 - (Free Research)
The vendor featured in this whitepaper recently released new tools for collaboration functionality and is eager to prove itself as a strong competitor in the enterprise collaboration market. Read on to learn how they can help your organization adopt truly secure cloud-based file sharing. 
(WHITE PAPER) READ ABSTRACT |

How to tackle trust management by ComputerWeekly.com

November 2010 - (Free Research)
Trust, or the placing of it, is one of the key activities at the core of our human endeavours. The process of placing trust is simpler when the process is physical and proximal - that is when you can see, feel and touch that which you are about to trust. 
(WHITE PAPER) READ ABSTRACT |

The CIO's New Guide to Design of Global IT Infrastructure by Riverbed Technology, Inc.

June 2010 - (Free Research)
Is it possible to eliminate the impact of distance?  This paper explores the 5 key principles successful CIOs are using to redesign IT infrastructure of any size.  Learn how to be prepared to adapt your environment in a way that supports distributed employees, anytime anywhere collaboration and the need for business continuity during a disaster. 
(WHITE PAPER) READ ABSTRACT |

Keys to Microsoft Application Acceleration: Advances in Delivery Systems by Citrix

September 2008 - (Free Research)
Read this paper to learn how you can ensure significantly faster access to the Microsoft applications your users depend on. Download this complimentary guide to discover how an integrated advanced delivery solution can help you. 
(WHITE PAPER) READ ABSTRACT |

Webcast - Remote Data Replication: Combat Disasters and Optimize Business Operations by Silver Peak

October 2013 - (Free Research)
Watch this presentation to hear a discussion of up-and-coming data replication technologies and strategies with experts from Dell Compellent, Silver Peak, and Alaska USA Federal Credit Union. 
(WEBCAST) READ ABSTRACT |

When worlds combine-the convergence of storage and data networking by The 451 Group (E-mail this company)

October 2012 - (Free Research)
Independent worlds of storage and data networking are converging. Greater needs for flexibility and scale are pushing organizations to combine traffic to increase efficiency and reduce operating expenses. 
(WHITE PAPER) READ ABSTRACT |

Keys to SAP Application Acceleration: Advances in Delivery Systems by Citrix

September 2008 - (Free Research)
It is essential that SAP applications and network infrastructures be considered together as a "application infrastructure" that supports strategic business objectives. This paper examines the challenges associated with SAP application delivery 
(WHITE PAPER) READ ABSTRACT |

Avaya Unified Communications Can Reduce Cell Phone Expenses by Avaya Inc.

July 2008 - (Free Research)
By converging real-time, near-real-time, and non-real-time business communication applications, Avaya Intelligent Communications can dramatically reduce cell phone expenses, taking Unified Communications to the next level. 
(WHITE PAPER) READ ABSTRACT |

Dell EqualLogic PS Series with VMware vCenter Site Recovery Manager by Dell, Inc.

February 2010 - (Free Research)
VMware vCenter Site Recovery Manager (SRM) is a VMware vSphere 4.0 based solution that is tightly integrated with Dell EqualLogic PS Series storage to offer centralized disaster recovery management, automation, and testing for a virtualized datacenter. Read this solution brief to learn more about the features and benefits of this solution. 
(ARTICLE) READ ABSTRACT |

Five Tips for Better Virtual Meetings by Citrix Online Go To Meeting

October 2011 - (Free Research)
Virtual meetings are becoming the standard communication platform for businesses but they require careful consideration and planning to offset issues that result from the distance.  Take a look at this brief resource to discover five easy tips to enhance your virtual meeting. 
(WHITE PAPER) READ ABSTRACT |

Deploying F5 Networks BIG-IP Local Traffic Manager with WebAccelerator for Microsoft Office SharePoint Server 2007 by F5 Networks

November 2007 - (Free Research)
One approach to improving overall system performance is the use of a class of Traffic Management Device commonly referred to as a WAN Accelerator. This paper details the results of using one such solution. 
(WHITE PAPER) READ ABSTRACT |

Virtualization Technologies and Their Impact On Disaster Recovery Planning by Double-Take Software

March 2009 - (Free Research)
The need to protect these virtualized systems is paramount and in situations where companies are looking to reduce the costs associated with disaster recovery planning, virtualization can enable easier recovery without a great deal of additional cost. Read this white paper for more information from Double-Take Software. 
(WHITE PAPER) READ ABSTRACT |

IBM FlashSystem Database Mirroring Best Practices by IBM

April 2013 - (Free Research)
This technical paper explores the best practices of database mirroring, which allows for a failover or recovery strategy as an economical approach to availability. 
(WHITE PAPER) READ ABSTRACT |

Report – Benchmarks for UC TCO by ShoreTel

January 2012 - (Free Research)
Total cost of ownership is a key metric for assessing costs, benefits and risks of a UC solution – enabling organizations to properly evaluate competing solutions. It aligns their final decision with business needs, while understanding the effects of future requirements and functionalities. 
(ANALYST REPORT) READ ABSTRACT |

1 - 25 of 497 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts