Security ImprovingWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Security Improving returned the following results.
RSS What is RSS?
Related Categories

 •   Desktop Management
 •   Virtualization
 •   Enterprise Systems Management
 •   Desktops/ Workstations
 •   Operating Systems and Subsystems
 •   Endpoint Security
 •   Employee Performance (EPM)/ Talent Management
 •   Wireless Security
 •   Enterprise Data Protection and Privacy
 •   Intrusion Prevention Solutions

Related Searches
 •   Demo Security Improving
 •   Designers Security Improving
 •   Implement Security Improving
 •   Markets Security Improving
 •   Security Improving Capture
 •   Security Improving Samples
 •   Security Improving Utility
 •   Security Maintain
 •   Security Roi
Advertisement

ALL RESULTS
1 - 25 of 474 | Next Page

Featured Sponsors

The Path to Enterprise Desktops: From Personal Computer to Personalized Computing by AMD and VMware, Inc..
This IDC white paper considers the concept of desktop virtualization, specifically as made available by VMware's VDI and ACE. The document also considers the benefits more...
>> Discover more offerings from AMD and VMware, Inc..
Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

How Web Security Improves Productivity and Compliance by Webroot

December 31, 2012 - (Free Research)
This resource describes how the value of secure web gateways doesn't need to be limited to web protection. Inside, learn how your organization can strategically use this security technology to improve productivity, reduce costs, increase compliance, and more. 
(WHITE PAPER) READ ABSTRACT |

How Web Security Improves Productivity and Compliance by Webroot

December 31, 2012 - (Free Research)
This resource describes how the value of secure web gateways doesn't need to be limited to web protection. Inside, learn how your organization can strategically use this security technology to improve productivity, reduce costs, increase compliance, and more. 
(WHITE PAPER) READ ABSTRACT |

Dell Cuts IT Work, Tightens Security, Improves Performance with New Software by Dell, Inc. and Intel®

November 25, 2009 - (Free Research)
Dell is planning to upgrade its 100,000 desktop and portable computers to the Windows® 7 operating system to reduce desktop management costs and enhance data security. Read this case study to learn more about Dell's business needs as well as the features and benefits achieved from Microsoft's solutions. 
(CASE STUDY) READ ABSTRACT |

Consolidated security management for mainframe clouds by IBM

February 29, 2012 - (Free Research)
This white paper explores how leveraging a mainframe as a security hub for cloud computing can provide benefits such as, increased security, improved reliability and consolidated workloads throughout your cloud infrastructure. 
(WHITE PAPER) READ ABSTRACT |

Introducing the Next Generation of SPARC Servers E-Book by Oracle Corporation

April 11, 2012 - (Free Research)
Discover the benefits of Oracle's new SPARC T4 servers and how they deliver world record performance for a wide range of enterprise applications, and offer enhanced reliability and security, improved virtualization tools, and reduced costs. View this e-book packed with valuable information, customer success stories, and a 3D demo. 
(EBOOK)

The Benefits Of Virtualizing Citrix XenApp with Citrix XenServer by Citrix

August 2008 - (Free Research)
Virtualization is now generally recognized as one of the key enablers of these objectives. As organizations explore virtualization solutions, the challenge is to select the right strategic vendor with the best solution set for their business. 
(PODCAST) READ ABSTRACT |

Windows 7: Tips and Best Practices for Simplified Migration by Dell, Inc. and Microsoft Windows 7

December 2009 - (Free Research)
Migration to Windows 7 is a future reality for most. Regardless of the starting point, a migration to Windows 7 is a path that holds as many questions and challenges as it does potential rewards. Planning now can ensure a smooth transition in 2010. 
(WHITE PAPER) READ ABSTRACT |

Windows 7: Tips and Best Practices for Simplified Migration by Dell KACE

July 2011 - (Free Research)
Migration to Windows 7 is a future reality for most. Regardless of the starting point, a migration to Windows 7 is a path that holds as many questions and challenges as it does potential rewards. Planning now can ensure a smooth transition in the future. 
(WHITE PAPER) READ ABSTRACT |

Customer Spotlight - Learn How SSO and Authentication Helped Mackenzie Health Strike a Balance between Access and Security by Imprivata

February 2014 - (Free Research)
This case study feature Mackenzie Health's experience transitioning to an automated access management system with single sign-on (SSO) capabilities to ensure security, improve workflows, and reduce helpdesk calls and costs. 
(WHITE PAPER) READ ABSTRACT |

As data grows, so do the risks: How to improve data and app sec by IBM

September 2012 - (Free Research)
Access this resource for a cloud solution that uses a combination of hardware, software, and services with advanced technologies to ensure data and application security, while allowing you to focus on business priorities. 
(WHITE PAPER) READ ABSTRACT |

Five Tips to Improve a Threat and Vulnerability Management Program by SearchSecurity.com

September 2012 - (Free Research)
Access this e-guide for 5 expert tips to improve the effectiveness of an enterprise threat and vulnerability management program. 
(EGUIDE) READ ABSTRACT |

Businesses are ready for a new approach to IT by IBM

April 2012 - (Free Research)
Integrated systems are based on "patterns of expertise," which can dramatically improve the responsiveness of the business. This paper details two types of integrated systems - platform and infrastructure - the benefits of each, such as agility, efficiency, simplicity and control, and so much more. 
(WHITE PAPER) READ ABSTRACT |

Leveraging the Cloud to Improve Endpoint Protection – Sept 6th at 10:00am (PDT) live date by Webroot

September 2012 - (Free Research)
Find the answers to all of your challenging endpoint protection and web security questions by viewing this informative Webcast. Go beyond the concepts on performance effectiveness and learn the critical aspects of threat protection. 
(WEBCAST) READ ABSTRACT |

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc.

The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. 
(HARDWARE PRODUCT)

A “How-To” Guide on Using Cloud Services for Security-Rich Data Backup by IBM

September 2012 - (Free Research)
Access this resource for a cloud solution that uses a collaboration of hardware, software, and services with advanced technologies to ensure data and application security, while allowing you to focus on business priorities. 
(WHITE PAPER) READ ABSTRACT |

The Total Economic Impact of Lumension Security's Sanctuary by Lumension

September 2007 - (Free Research)
Lumension&#39s Sanctuary Application and Device Control is an IT-driven solution that automatically enforces endpoint security policies. The financial impact of moving from a &#34voluntary&#34 compliance solution to an &#34automatic&#34 one is illustrated 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly - 3 April 2012: Data security best practice by ComputerWeekly.com

April 2012 - (Free Research)
This week’s Computer Weekly kicks off our Buyer's Guide to data security by looking at the changing role of the IT security chief. We also examine why flexible working is proving so slow to roll out and we talk to the UK's air traffic control operator about its ambitious desktop virtualisation project. 
(EZINE)

Unsung Heroes - How Routing & Switching Keep the Business Going by Cisco Systems, Inc.

February 2009 - (Free Research)
Routers and switches are the building blocks for all business communications from data to voice and video to wireless access. 
(WHITE PAPER) READ ABSTRACT |

HP Storage Solutions Protect and Help Bring Order to Missouri Court Information by Hewlett-Packard Company

January 2009 - (Free Research)
Read how the Missouri court system consolidated database servers from 40 circuit courts onto five HP ProLiant servers, providing numerous benefits including improved flexibility, enhanced disaster recovery, and significantly increased savings. 
(CASE STUDY) READ ABSTRACT |

7 Ideas to Improve Network Security in Healthcare by Palo Alto Networks

September 2013 - (Free Research)
View this webcast to reveal 7 critical steps to improve healthcare IT security despite increasing network complexities. 
(WEBCAST) READ ABSTRACT |

Elliptic curve cryptography in transport ticketing by ComputerWeekly.com

May 2014 - (Free Research)
This article in our Royal Holloway Security Series looks at how elliptic curve cryptography on transport payment cards improves transaction times. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Fast Track to Archived Data Access by Iron Mountain

March 2012 - (Free Research)
Read this paper for best practices and keys to help you prepare for a compliance or audit request. Learn how an offsite partner can help improve your data protection, accessibility and recoverability, and receive 7 keys to help improve your security and backup policies. Also receive checklist of 4 keys to help you better access your information. 
(WHITE PAPER) READ ABSTRACT |

Globalscape® EFT Platform: Complete Visibility Over File Transfer by GlobalScape

May 2014 - (Free Research)
This resource highlights a file transfer platform that offers complete visibility to help improve security and audit management. 
(WHITE PAPER) READ ABSTRACT |

Improving Tools and Techniques to Combat Malware Evolution by Webroot

October 2012 - (Free Research)
Some researchers are working hard to create tools that strengthen malware analysis and improve security. Read this expert guide to learn more about what look look for in malware and the threat actors behind the scenes. 
(WHITE PAPER) READ ABSTRACT |

User-ID Linked with Next-Generation Firewalls Improves Network Visibility and Controls by Palo Alto Networks

November 2012 - (Free Research)
This white paper highlights a security solution that integrates existing enterprise directory services with next-generation firewalls so application activity and policies are linked directly with users or groups. Read on to learn how user-based analysis, reporting, and forensics can improve visibility and protection. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 474 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts