Security GeorgiaWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Security Georgia returned the following results.
RSS What is RSS?
Related Categories

 •   Virtualization
 •   Storage Management
 •   Disk-based Backup & Storage/ RAID
 •   Anti-Virus Solutions
 •   Backup Systems and Services
 •   Storage Area Network (SAN)/ Network Attached Storage (NAS)
 •   Vulnerability Assessment
 •   Data Security
 •   Fraud Detection & Prevention
 •   Mobile Device Management

Related Searches
 •   Demonstration Security
 •   Example Of Security
 •   Fast Security Georgia
 •   Manage Security Georgia
 •   Need Security Georgia
 •   Security Illinois
 •   Security Remote
 •   Security Roi
 •   Security Supply
 •   Security User
Advertisement

ALL RESULTS
1 - 25 of 500 | Next Page

University of Northern Georgia case study: Life made easier for thousands of students and teachers by Dell, Inc.

September 30, 2013 - (Free Research)
This informative paper explores how a university easily and affordably virtualized its network, data center and storage systems. Read on to learn the benefits they now enjoy. 
(CASE STUDY) READ ABSTRACT |

University of Georgia Gets Lesson: NetVault™ Makes the Grade in Power, Ease of Use by BakBone

April 2008 - (Free Research)
UGA evaluated several companies backup/restore software, before choosing BakBone Software NetVault. This case study examines why UGA opted for BakBone software. 
(CASE STUDY) READ ABSTRACT |

This Month in the Threat Webscape -- August 2009 by Websense, Inc.

September 2009 - (Free Research)
The Websense Security Labs Team provides a review of threats occurring during the month of August 2009. Highlighted is the massive DDoS (Distributed Denial of Service) attack on Twitter, Google Blogger, LiveJournal, and Facebook centered around 1 person: Cyxymu, a pro-Georgia blogger who is an active critic of Moscow's politics. 
(VIDEO) READ ABSTRACT |

Virtual Criminology Report 2009 -- Virtually Here: The Age of Cyber Warfare by McAfee, Inc.

December 2009 - (Free Research)
Is the “Age of Cyber War” at hand? Since our 2007 report, there have been increasing reports of cyber attacks and network infiltrations that appear to be linked to nation-states and political goals. We decided it was time to further examine whether cyber warfare is now a part of human conflict that we should get used to seeing more often. 
(WHITE PAPER) READ ABSTRACT |

Information Security – May 2014 by SearchSecurity.com

April 2014 - (Free Research)
The online authentication protocols proposed by the Fast Identity Online Alliance face a reality check. As FIDO-ready products ship, what are the implications for enterprises? 
(EZINE) READ ABSTRACT |

Application Virtualization Delivers Cost-saving IT Solution for Georgia’s K-12 Peach County Education District by InstallFree Inc.

January 2010 - (Free Research)
As the systems and hardware continue to be replaced and upgraded, the incremental effort is minimal, even when moving to new versions of the operating system. The wireless system readily manages remote desktops using InstallFree, which links both the PC and the User to the virtual application. 
(CASE STUDY) READ ABSTRACT |

Mobile ERP and Financials: Customers Tell All by Workday

September 2013 - (Free Research)
In this brief video, hear from real-world users -- including CareFusion, Chiquita Brands, and Community Health Services of Georgia -- of a mobile enterprise resource planning (ERP), financials, and human capital management (HCM) technology to explore the benefits they experience from mobile apps. 
(VIDEO) READ ABSTRACT |

Gwinnett Medical Center Relies on HP to Help Meet Care Goals: Leverages HP Storage and Server Solutions to Manage Growth and Costs by Hewlett-Packard Company

January 2009 - (Free Research)
In this case study you will learn the approach of Gwinnett to team with HP and other business technology leaders to develop and deploy innovative new solutions that promote quality care, cost efficiencies and service continuity. 
(CASE STUDY) READ ABSTRACT |

Enterprise Security and your Technology by Hewlett-Packard Company

June 2014 - (Free Research)
This informative resource outlines a top-tier security tool and explains how it can help secure your enterprise. 
(WEBCAST) READ ABSTRACT |

TELUS leverages HP ArcSight and TippingPoint by Hewlett-Packard Company

September 2013 - (Free Research)
This informative whitepaper explores how managed security service providers are utilizing effective intelligent analysis for their SIEM solutions. 
(WHITE PAPER) READ ABSTRACT |

Overcoming Today's Compliance and Security Data-Related Challenges by Hexis Cyber Solutions Inc

May 2014 - (Free Research)
This informative whitepaper explores a unique strategy for overcoming today's compliance and security data-related challenges. 
(WHITE PAPER) READ ABSTRACT |

Building a Better Network Security Strategy by Hewlett-Packard Company

January 2014 - (Free Research)
This informative resource discusses what features a network security strategy should cover in order to ensure success in today's business world. 
(WHITE PAPER) READ ABSTRACT |

E-Book: Definitive Guide to Exchange 2010 Migration Chapter 4: Load Testing and Security Exchange 2010 by SearchDataCenter.com

October 2011 - (Free Research)
This chapter explains how to test Exchange 2010 with native and third-party management tools and how best to protect your investment. 
(EBOOK) READ ABSTRACT |

Using Big Data Security Analytics to Catch APTs by Hewlett-Packard Company

November 2013 - (Free Research)
In this informative white paper, unveil 3 ways that big data security analytics can help you gain actionable intelligence to thwart advanced persistent threats (APTs) and achieve visibility into IT infrastructures for top defense. 
(WHITE PAPER) READ ABSTRACT |

Extending Next Generation Firewalls – Security Leaders must Address Threats from Rising SSL Traffic by Fortinet, Inc.

March 2014 - (Free Research)
This exclusive paper discusses the next generation firewall, examining its market drivers, critical requirements and how it is extending to respond to the ever-changing needs of the modern enterprise. 
(WHITE PAPER) READ ABSTRACT |

Security Considerations When Undergoing a Network Refresh by Hewlett-Packard Company

June 2014 - (Free Research)
This informative paper discusses crucial considerations you need to keep in mind when undergoing a network refresh, outlining the impact that emerging technologies will have on network and security management, along with what you can do to ensure that your network is high-performance and secure. 
(WHITE PAPER) READ ABSTRACT |

Case Study: Lake Health Enhances Patient Experience with HP ArcSight by Hewlett-Packard Company

January 2013 - (Free Research)
Uncover the SIEM a healthcare provider put in place which helped them take a proactive approach to information security, mitigate anomalies, increase visibility, ensure regulatory compliance, and more! 
(CASE STUDY) READ ABSTRACT |

It’s All About the App: Mobile Security That Helps Enable the Business by CA Technologies.

November 2013 - (Free Research)
With mobility strategies quickly becoming a priority for the majority of organizations, this informative guide provides information on mobile security strategies that every business needs to learn more about. 
(WHITE PAPER) READ ABSTRACT |

On the Safe Side: Managing Security in Mobile Apps by TechTarget

February 2014 - (Free Research)
Software development projects aren't always on top of the security management list, but when it comes to enterprise mobility applications, there's no question about its precedence. Take this survey to gain access to an e-book that highlights 7 tips to protect enterprise data and how to avoid the perpetual cycle of insecurity. 
(RESOURCE)

Identity and Access Management (IAM) Across Cloud and On-Premise Environments Best Practices for Maintaining Security and Control by CA Technologies.

July 2013 - (Free Research)
This informative white paper provides some best practices for maintaining security and control throughout hybrid cloud environments. 
(WHITE PAPER) READ ABSTRACT |

Expert ways to maximize security in Exchange by SearchDataCenter.com

May 2012 - (Free Research)
This expert e-guide provides tips for maximizing Exchange security, including how to leverage the enhanced capabilities in Forefront Protection 2010. In addition, it reviews the 6 most commonly overlooked Exchange security vulnerabilities. 
(EGUIDE) READ ABSTRACT |

Endpoint Management - IT handbook by SearchDataCenter.com

September 2012 - (Free Research)
Access this expert IT handbook for an in-depth look at the at endpoint management techniques and technologies that your organization should consider. 
(EBOOK) READ ABSTRACT |

A Community Approach to your Enterprise Security by Hexis Cyber Solutions Inc

May 2014 - (Free Research)
This informative resource explores one company's solution and its unique community based approach to your enterprise security. 
(WEBCAST) READ ABSTRACT |

Identity-Centric Security: Enabling and Protecting the Business by CA Technologies.

May 2013 - (Free Research)
Discover why the enterprise perimeter as we know it is dissolving and how your users are taking its place – creating numerous security issues for your IT department. In addition, learn how identity-centric security can help you protect data and maintain compliance in this new enterprise model. 
(WHITE PAPER) READ ABSTRACT |

Securing Identities and Data Across Mobile Apps by CA Technologies.

December 2013 - (Free Research)
This white paper highlights the 3 major challenges in protecting user identities through mobile applications. Read on to discover a mobile gateway solution that offers secure access and user protection. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 500 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts