Security IndiaWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Security India returned the following results.
RSS What is RSS?
Related Categories

 •   Virtualization
 •   Data Security
 •   Technology Outsourcing
 •   Data Center Management
 •   Application Security
 •   Application Servers
 •   Storage Management
 •   Business Intelligence Solutions
 •   Enterprise Systems Management
 •   Wireless Technologies and Mobile Computing

Related Searches
 •   Commercial Security India
 •   Reporting Security India
 •   Requirement Security
 •   Security Accounting
 •   Security Devices
 •   Security Disk
 •   Security Firms
 •   Security Framework
 •   Security India Budgeting
 •   Security User
Advertisement

ALL RESULTS
1 - 25 of 474 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Computer Weekly - 15 May 2012: Overhauling banking IT by ComputerWeekly.com

May 15, 2012 - (Free Research)
This week’s Computer Weekly contains an exclusive interview with JP Morgan COO India Gary-Martin about juggling multiple legacy IT systems while keeping the merchant bank compliant. We also look at how near-field communications technology promises to revolutionise consumer spending and we ask whether 2012 could be the year that APM becomes vital? 
(EZINE) READ ABSTRACT |

CW Special report on Wipro by ComputerWeekly.com

November 23, 2012 - (Free Research)
This 5 page special report from Computer Weekly gives you the facts on Wipro, its strategy, products and services and financial performance. 
(ESSENTIAL GUIDE) READ ABSTRACT |

KPMG 2012 Global Technology Innovation Survey by ComputerWeekly.com

June 27, 2012 - (Free Research)
China and the US are the countries most likely to come up with disruptive technology breakthroughs over the next four years, but Europe is lagging, this report from KPMG reveals. 
(IT BRIEFING) READ ABSTRACT |

CW Special Report on TCS by ComputerWeekly.com

November 23, 2012 - (Free Research)
This 5 page special report from Computer Weekly gives you the facts on TCS, its strategy, products and services and financial performance. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Technical Guide on Mobile Security by SearchSecurity.com

November 01, 2011 - (Free Research)
Techtarget's Security Media Group presents a comprehensive guide to mobile device security. Our technical editors from the U.S., Europe, India and Asia provide their respective regions’ perspective on the issue. 
(EGUIDE) READ ABSTRACT |

E-Book: Technical Guide on PCI by SearchSecurity.com

October 10, 2011 - (Free Research)
TechTarget’s Security Media Group presents a global look at PCI, and how it is impacted by today’s evolving business needs. Our technical editors from the U.S., Europe, India and Asia provide their respective regions’ perspective on PCI compliance. 
(EBOOK)

Technical Guide on Application Security by SearchSecurity.com

December 31, 2012 - (Free Research)
This expert Tech Guide from SearchSecurity.com offers insight on today's application security threat environment, as well as key recommendations and challenges with implementing the latest defense tools. 
(EZINE) READ ABSTRACT |

UK IT priorities 2012 by ComputerWeekly.com

August 24, 2012 - (Free Research)
This exclusive Computer Weekly research reveals how UK IT departments are prioritising their budgets in 2012, which technologies they are investing in, and the impact of cloud computing, mobile and other disruptive technology on their IT strategies. 
(IT BRIEFING) READ ABSTRACT |

Five Steps to Secure Outsourced Application Development by Veracode, Inc.

May 10, 2010 - (Free Research)
Application security has become a top concern for security professionals striving to control their company’s overall risk profile. Meanwhile, companies are also saving money by outsourcing more and more custom code creation. This white paper outlines five best practices that enterprises can use to secure their outsourced application development. 
(WHITE PAPER) READ ABSTRACT |

Quest Software Finds Increased Security, Disaster Preparedness, and Cost Savings through Virtual Desktop Infrastructure by Dell Software

June 26, 2009 - (Free Research)
After evaluating a number of VDI solutions, Quest was most impressed with vWorkspace, one of its own applications that had been integrated into its product portfolio from its 2007 acquisition of Provision Networks. This case study will show how using VDI resulted in significant time and cost savings for Quest. 
(CASE STUDY) READ ABSTRACT |

CW+: Executive breifing - The Indian Sub-Continent Mobile Market by ComputerWeekly.com

January 07, 2011 - (Free Research)
Juniper  Research defines the Indian Sub  Continent as encompassing the following five countries: Bangladesh; India; Nepal; Pakistan; and Sri Lanka.Despite comprising just five countries, the region  – with more than 1.6 billion inhabitants  – includes nearly a quarter of the global population. 
(WHITE PAPER) READ ABSTRACT |

IAM Evaluation And Deployment Guidelines by OpenIAM

January 10, 2014 - (Free Research)
Read this expert e-guide by SearchSecurity.com to get a tutorial on identity and access management (IAM) services and the benefits they offer outside of compliance mandates. Click now for steps to achieving security and business success. 
(EGUIDE) READ ABSTRACT |

How to Select the Correct RAID for an EqualLogic SAN by Dell India

September 29, 2009 - (Free Research)
One of the most important decisions that you have to make when deploying a new storage solution is what RAID type(s) to use. Read this white paper for a discussion on how to select the right RAID policy for your Dell EqualLogic™ storage area network (SAN) arrays. 
(WHITE PAPER) READ ABSTRACT |

BranchCache in Windows 7 and Windows Server 2008 R2 Overview by Microsoft Corporation India Pvt Ltd

April 14, 2009 - (Free Research)
This document provides an overview of BranchCache, explains the different modes in which BranchCache operates, and describes how BranchCache is configured. The paper also explains how BranchCache works with Web servers and file servers and the steps BranchCache takes to determine that the content is up-to-date. 
(WHITE PAPER) READ ABSTRACT |

Inside India: Indians View Their Automotive Future by IBM Line of Business

June 2008 - (Free Research)
A study of the Indian auto industry from University of Michigan Transportation Research Institute's Automotive Analysis Division and the IBM Institute for Business Value. 
(WHITE PAPER)

Protecting Sensitive Data and Resources Throughout the Organization by CA (India) Technologies Pvt. Ltd

March 2009 - (Free Research)
CA Data & Resource Protection is a family of solutions that provides a proactive approach to securing sensitive information and critical systems without impacting normal business and IT activities. Read this white paper to learn more! 
(WHITE PAPER) READ ABSTRACT |

IDC White Paper: Effective Information Security by CA (India) Technologies Pvt. Ltd

September 2009 - (Free Research)
Securing personally identifiable information (PII) and IP has become a high priority for enterprise management and IT. In this white paper, IDC provides an overview of information security and its impact on enterprises, discusses IT operation challenges, and describes CA's answer to helping enterprise IT organizations attain increased visibility... 
(ANALYST REPORT) READ ABSTRACT |

Airport Insecurity: The Case of Lost Laptops by Dell India

June 2008 - (Free Research)
This paper contains the findings of a study to understand the current risks posed to sensitive and confidential data contained in the laptops of business travelers. 
(WHITE PAPER) READ ABSTRACT |

SearchSoftwareQuality.com Expert Tip Guide: Best practices for embedded software development and CI by IBM India Pvt. Ltd

September 2011 - (Free Research)
Read this Tip Guide to discover workable, profitable best practices for embedded software development. 
(EGUIDE) READ ABSTRACT |

Enhancing CygNet OTNMS* performance with Red Hat Enterprise Linux* & Intel® Xeon® Processor-based Servers by Red Hat and Intel

December 2013 - (Free Research)
This case study examines how Red Hat Enterprise Linux combined with Intel Xeon helped India-based company NMSWorks achieve faster and more efficient data processing. 
(CASE STUDY) READ ABSTRACT |

Financial services firm cuts costs and improves agility with Red Hat and Intel by Red Hat and Intel

December 2013 - (Free Research)
This whitepaper follows Credit Information Bureau (India) Limited (CIBIL), a large financial services company, as they made their move towards server consolidation through virtualization 
(CASE STUDY) READ ABSTRACT |

Meeting the Demands of the Smarter Consumer by IBM

August 2010 - (Free Research)
IBM surveyed more than 30,000 consumers in the United States, Canada, United Kingdom, Brazil, India and China for this report on shopping preferences. Read this report to learn why technology makes consumers smarter, more connected and more certain about what they want. 
(WHITE PAPER) READ ABSTRACT |

Briefing: Handheld PCs, smart phones and mobile payments. by ComputerWeekly.com

April 2012 - (Free Research)
The latest trends, market research and analysis, on handheld PCs, smartphones, and the mobile payment market from KPMG. 
(IT BRIEFING) READ ABSTRACT |

The Outsourcing Surge by SolovatSoft

August 2008 - (Free Research)
Outsourcing is the quest to offload either commodity or very specialized activities, so that staff can focus on work that truly adds value to the business. 
(WHITE PAPER) READ ABSTRACT |

Email Archiving: Common Myths and Misconceptions by Dell India

January 2009 - (Free Research)
This white paper explores 5 common myths about email archiving, and provides guidance and solutions to solving email management and archiving issues. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 474 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts