Security Lecture White PapersWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Security Lecture White Papers returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Enterprise Data Protection and Privacy
 •   Network Security
 •   Storage Security
 •   Security Monitoring
 •   Storage Area Network (SAN)/ Network Attached Storage (NAS)
 •   Endpoint Security
 •   Storage Management
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Disaster Recovery

Related Searches
 •   Concerns Security Lecture White
 •   Marketing Security Lecture White
 •   Review Security
 •   Security International
 •   Security Lecture Flowchart
 •   Security Lecture Monitor
 •   Security Lecture White Buys
 •   Security Lecture White Requirements
 •   Site Security Lecture
 •   Supply Security Lecture White
Advertisement

ALL RESULTS
1 - 25 of 480 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..
E-mail Recovery, Restoration, Search & Analysis by Ontrack® PowerControls™ by Kroll Ontrack.
Ontrack® PowerControls™ is a simple yet powerful tool for copying, searching, recovering and analyzing mailbox items directly from Microsoft Exchange Server more...
>> Discover more offerings from Ontrack® PowerControls™ by Kroll Ontrack.

Case Study: Compellent SAN earns an A+ in ROI for the University of North Texas by Dell Compellent

June 29, 2011 - (Free Research)
UNT needed to deploy a new SAN that could meet the performance, ease-of-management, and cost requirements. In the search for the right solution, they went through an extensive cost of ownership analysis of the competing vendors. Read this Case Study to learn more about the solution they found. 
(CASE STUDY) READ ABSTRACT |

Rational Team Concert Distance Learning by IBM

August 19, 2013 - (Free Research)
Register to access this exclusive, instructor-led workshop delivered in five half-day sessions via a virtual classroom, so you can learn to use IBM Rational Team Concert in a z/OS enterprise environment. 
(VIRTUAL SEMINAR) READ ABSTRACT |

Supercomputers: prestige objects or crucial tools for science and industry ? by ComputerWeekly.com

April 19, 2012 - (Free Research)
Professor Hans Werner Meuer, co-founder of the Top500 supercomputer list, presents a critical assessment of high performance computing technology and applications. 
(PRESENTATION) READ ABSTRACT |

Learning Computing: Why object orientated programming works. by ComputerWeekly.com

January 05, 2012 - (Free Research)
Programming is a journey between the real world and a computer. This article explains why object orientation is currently the best way we have of making the journey. 
(JOURNAL ARTICLE) READ ABSTRACT |

Own the Air: Testing Aruba Networks’ Adaptive Radio Management (ARM) in a High-Density Client Environment by Aruba Networks

July 01, 2010 - (Free Research)
Aruba commissioned Network Test to evaluate the efficiency of Adaptive Radio Management (ARM) features. Using a massive over-the-air test bed1, Network Test assessed ARM features both individually and in concert, in the latter case using strict adherence to service-level agreements as one of the key metrics. 
(WHITE PAPER) READ ABSTRACT |

White Paper: Is Online Backup Right for your Business? 8 Reasons to Consider Protecting Your Data in the Cloud by Symantec Corporation

December 31, 2011 - (Free Research)
Without an effective backup strategy in place you could be at risk for financial loss, legal liability and damage to your reputation. This white paper discusses 8 compelling reasons to consider a cloud-based, online approach to backup. Read now to learn more. 
(WHITE PAPER) READ ABSTRACT |

White Paper: Closing the Data Privacy Gap: Protecting Sensitive Data in Non-production Environments by IBM

March 24, 2010 - (Free Research)
By downloading this complimentary White Paper, you'll gain insight into the requirements for protecting privacy in non-production environments and what to look for in an effective data privacy solution. 
(WHITE PAPER) READ ABSTRACT |

IDC White Paper: Effective Information Security by CA (India) Technologies Pvt. Ltd

September 25, 2009 - (Free Research)
Securing personally identifiable information (PII) and IP has become a high priority for enterprise management and IT. In this white paper, IDC provides an overview of information security and its impact on enterprises, discusses IT operation challenges, and describes CA's answer to helping enterprise IT organizations attain increased visibility... 
(ANALYST REPORT) READ ABSTRACT |

Improving Regulatory Compliance with Encryption by Utimaco Safeware

February 01, 2007 - (Free Research)
This white paper examines the role that encryption plays in minimizing your company's risk and helps IT directors, security officers, and executives meet confidentiality mandates and satisfy legal requirements within particular geographic regions. 
(WHITE PAPER) READ ABSTRACT |

Authentication in the Enterprise: Current and Changing Requirements by PistolStar, Inc.

August 25, 2009 - (Free Research)
This white paper discusses the current state of authentication and trends that Osterman Research sees as shaping the future of authentication. 
(WHITE PAPER) READ ABSTRACT |

IDC White Paper: Imprivata’s Cortext HIPAA Compliant Texting for Clinicians by Imprivata

December 31, 2012 - (Free Research)
Access this white paper to explore a HIPAA compliant text messaging application that supports encrypted protected health information (PHI) to enable clinicians with rapid communications means, and explore best practices for implementation. 
(WHITE PAPER) READ ABSTRACT |

The Economics of Networking White Paper by Cisco Systems, Inc.

February 06, 2012 - (Free Research)
Access this white paper to learn about a next-generation network architecture that paves the way for true business innovation with architectural benefits that empower IT to say “yes” to new business opportunities and the ever-changing work environment. 
(WHITE PAPER) READ ABSTRACT |

A Guide to Understanding Hosted and Managed Messaging - An Osterman Research White Paper by ZANTAZ

January 2008 - (Free Research)
Email messaging is a mission-critical function for virtually all organizations and it is becoming more so. Learn how you can manage email to meet regulation requirements, increase messaging security and reliability, and streamline storage... 
(WHITE PAPER) READ ABSTRACT |

Disk Assisted Back-Up White Paper: Backup to Disk and How to Implement It with HP Data Protector by Hewlett-Packard Company

September 2006 - (Free Research)
Advancements in technology and price reductions have recently made it possible to use disk together with tape to improve data protection. This white paper discusses the benefits of this technology. 
(WHITE PAPER) READ ABSTRACT |

Navigating Backup and Recovery in VMware Environments - Technical White Paper by HP

July 2011 - (Free Research)
This white paper explores the problems faced by IT administrators when managing the physical and VMware virtual infrastructure, and shows how HP Data Protector simplifies backup and recovery. 
(WHITE PAPER) READ ABSTRACT |

Top Ten Ways You Can Improve Communications with Video Conferencing by LifeSize

September 2012 - (Free Research)
This resource explores the top ten benefits of using video conferencing to bring your globally dispersed team together anytime, anywhere to collaborate efficiently and effectively. 
(WHITE PAPER) READ ABSTRACT |

White Paper: Cloud, Appliance, or Software: Which Backup Solution Is Best for Your Small or Midsize Organization? by Symantec Corporation

December 2011 - (Free Research)
Cloud backup is an alternative to an on-premise software application where both the backup application and information storage reside off-site. This allows you to replace expensive upfront investments in backup hardware, software, and personnel with an affordable monthly or yearly subscription-based service. Read now to learn more. 
(WHITE PAPER) READ ABSTRACT |

Anatomy of an Archiving Project White Paper by IBM

August 2011 - (Free Research)
Companies worldwide are affirming the value of archiving as a best practice for managing data growth, completing faster application upgrades and much more. Inside this white paper, learn how archiving can help support data retention compliance initiatives and mitigate risk for audits and electronic discovery requests. 
(WHITE PAPER) READ ABSTRACT |

Citrix GoToMyPCCorporate - Security White Paper by Citrix Online - GotoMyPC

June 2008 - (Free Research)
In this white paper you will learn how Citrix® GoToMyPC® Corporate provides industry-leading security, end-point management and centralized control. 
(WHITE PAPER) READ ABSTRACT |

Optimization Applications in Finance, Securities, Banking and Insurance - IBM ILOG Optimization White Paper by IBM

December 2010 - (Free Research)
This white paper shows how mathematical optimization provide tools that deliver significant competitive advantage for solving the most challenging problems encountered in finance, including risk management, operational cost, and product innovation. 
(WHITE PAPER) READ ABSTRACT |

ESG: Lowering the Cost of Information Retention with Effective Disk-based Archives by ProStor Systems

December 2007 - (Free Research)
Managing data growth is more challenging than ever, especially with recent compliance mandates. Read this white paper how to solve these challenges with an integrated archiving solution, with features that also address compliance requirements. 
(WHITE PAPER) READ ABSTRACT |

Find the Needle in the Haystack – Audit and Compliance Reporting for AIX by Safestone Technologies

November 2011 - (Free Research)
This white paper discusses how organizations can address the challenge of meeting audit and compliance regulations, whilst driving down costs and reducing risk. It outlines how Safestone’s Compliance Center for AIX solution efficiently collects raw data and refines it into easy-to-understand, actionable information. 
(WHITE PAPER) READ ABSTRACT |

Protecting Your Enterprise Network by Infoblox

August 2013 - (Free Research)
This comprehensive white paper provides deeper insight into enterprise IT security threats and the implementation of modern tools that are available to build more robust domain name server (DNS) infrastructures, including DNS firewalls to close security gaps. 
(WHITE PAPER) READ ABSTRACT |

Kazeon Data Privacy & Security Solution by Kazeon

November 2006 - (Free Research)
This white paper examines an Information Classification Management (ICM) solution that helps classify and secure your company's sensitive information and overcome the challenges of securing data while complying with federal guidelines. 
(WHITE PAPER)

Choosing a Network Access Control (NAC) Solution that is Right for Your Network by ForeScout Technologies, Inc.

March 2011 - (Free Research)
This white paper provides a comprehensive overview between a number of available deployment, device interrogation and policy enforcement methods to help you determine which Network Access Control (NAC) solution is right for your company's network. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 480 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts