Security North DakotaWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Security North Dakota returned the following results.
RSS What is RSS?
Related Categories

 •   Wireless Technologies and Mobile Computing
 •   Data Security
 •   Virtualization
 •   Mobile Device Management
 •   Data Center Management
 •   Network Security
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Application Security
 •   Business Intelligence Solutions
 •   Network Management

Related Searches
 •   Decisions Security
 •   File Security North Dakota
 •   Guideline Security North Dakota
 •   Project Security
 •   Security North Arkansas
 •   Security North Equipment
 •   Security North Making
 •   Security North Test
 •   Security Risk
 •   Web Security North Dakota
Advertisement

ALL RESULTS
1 - 25 of 499 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Achieving North American Electric Reliability Corporation (NERC) Cyber Security Standards by Lumension

March 02, 2009 - (Free Research)
Learn about NERC compliance challenges and how to ensure audit-readiness by delivering end-to-end vulnerability management, endpoint protection and data protection solutions. 
(WHITE PAPER) READ ABSTRACT |

WAVE SYSTEMS CASE STUDY - Mazda North American Operations by Wave Systems Corp.

September 27, 2010 - (Free Research)
THE CHALLENGE: Protect customer personal identifiable information and confidential business information on employee laptops scattered across North America without overburdening in-house IT resources. Read on to learn how they did it. 
(CASE STUDY) READ ABSTRACT |

Case Study: North York General Hospital Doubles Storage Performance: Cutting Costs and Simplifying Management by Standardizing on IBM XIV by IBM

August 22, 2011 - (Free Research)
This case study details how North York General Hospital's implementaiton of the IBM XIV Storage Systemen helped them reduce rackspace requirements and cut data center hosting costs. They now have a fast, resilient and flexible storage architecture that will support their mission-critical IT systems for years to come. 
(CASE STUDY) READ ABSTRACT |

Basingstoke and North Hampshire NHS Foundation Trust unites the ‘clinical five’ by IBM

August 05, 2011 - (Free Research)
Check out this case study to learn how leading health care provider Basingstoke and North Hampshire NHS Foundation Trust was able to integrate and consolidate data between locations for significant cost savings, as well as increases in efficiency and productivity. 
(CASE STUDY) READ ABSTRACT |

Prairie North Health Region - Case Study by VMware, Inc.

January 09, 2012 - (Free Research)
Access this case study to learn how the Prairie North Health Region consolidated its server environment, reducing its hardware and power costs, and is leveraging a desktop virtualization solution to lower costs while improving the performance and availability of its desktop computing services — as well as those of neighboring regions. 
(CASE STUDY) READ ABSTRACT |

LogRhythm and NERC by LogRhythm, Inc.

February 24, 2012 - (Free Research)
The NERC CIP Cyber Security Standards is intended to ensure the protection of the Critical Cyber Assets that control or effect the reliability of North America’s bulk electric systems. View this paper to explore how LogRhythm's NERC CIP Compliance package provides out-of-the box assistance in addressing numerous NERC CIP requirements. 
(WHITE PAPER) READ ABSTRACT |

E-Book: NERC Compliance by SearchSecurity.com

September 24, 2010 - (Free Research)
SearchSecurity.com presents a comprehensive guide to NERC compliance. Our experts cover all the angles in order to help your efforts in meeting compliance with the information security standards established by the North American Electric Reliability Corporation. 
(EBOOK) READ ABSTRACT |

Automation Suite for NERC CIP Compliance by LogRhythm, Inc.

March 29, 2013 - (Free Research)
Uncover how a particular NERC CIP compliance suite provides the tools and out-of-the-box assistance you need to address numerous NERC CIP requirements, including Electronic Security Perimeter, Incident Reporting and Planning, Vulnerability Detection, and many more. 
(WHITE PAPER) READ ABSTRACT |

North Carolina Center for Automotive Research uses borderless network to keep engineers connected to data and services anywhere, anytime by Cisco Systems, Inc.

October 10, 2011 - (Free Research)
This case study demonstrates how one organization used borderless network technology to help them grow substantially in a short amount of time. 
(CASE STUDY) READ ABSTRACT |

New York Stock Exchange Chooses Juniper for Next-Generation Datacenters by Juniper Networks, Inc.

July 11, 2009 - (Free Research)
This IDC Buyer Case Study examines the decision of NYSE Euronext to choose Juniper Networks as the primary supplier for the company's datacenter, Ethernet switching, and routing needs. Read on to learn more about how Juniper Networks is bringing the New York Stock Exchange into the twenty-first century. 
(CASE STUDY) READ ABSTRACT |

Economic Impact of a BlackBerry Solution in North American Enterprises by BlackBerry

February 19, 2010 - (Free Research)
In this analyst report, Forrester Consulting examines the total economic impact and potential return on investment (ROI) enterprises can realize by deploying mobility solutions using BlackBerry® smartphones and BlackBerry® Enterprise Server software. 
(ANALYST REPORT) READ ABSTRACT |

NERC: What You Need to Know by SearchSecurity.com & SearchCompliance.com

October 16, 2009 - (Free Research)
The North American Electric Reliability Corporation's regulations aim to protect the nation's vulnerable critical infrastructure. Read this E-Book to find out what responsible entities need to do to comply with the NERC. 
(EBOOK) READ ABSTRACT |

North Carolina State University - Matches research assets to potential partners with analytics by IBM

April 30, 2013 - (Free Research)
North Carolina State University needed a way to match its technologies to potential partners, licenese or both. T university needed to reduce the effort required to find potential partners, while also improving the return on its research and development investment. Consult this white paper to find out how they overcame this challenge. 
(WHITE PAPER) READ ABSTRACT |

North Shore Medical Center Provides Better Support with AMD Processor-based Solutions by HP, Vmware and AMD

July 01, 2008 - (Free Research)
Thanks to VMware, North Shore Medical Center provides better support for physicians and healthcare professionals while improving data center management with Advanced Micro Devices processor-based solutions. 
(CASE STUDY) READ ABSTRACT |

Case Study: Compellent SAN earns an A+ in ROI for the University of North Texas by Dell Compellent

June 29, 2011 - (Free Research)
UNT needed to deploy a new SAN that could meet the performance, ease-of-management, and cost requirements. In the search for the right solution, they went through an extensive cost of ownership analysis of the competing vendors. Read this Case Study to learn more about the solution they found. 
(CASE STUDY) READ ABSTRACT |

Email and Web Security SaaS by Webroot

April 14, 2009 - (Free Research)
Read this paper to learn about the many offerings of Webroot's Software as a Service (SaaS)-delivered e-mail and Web security suites, including anti-spam, anti-spyware, anti-virus, and email archiving and encryption. 
(WHITE PAPER) READ ABSTRACT |

Databases at Risk: Current State of Database Security (Enterprise Strategy Group) by IBM

September 25, 2009 - (Free Research)
This ESG Research Brief analyzes the current state of database security and categorizes databases as a “dangerous and growing security gap”. Read this brief which offers steps to improve database security across the enterprise. 
(ANALYST BRIEF) READ ABSTRACT |

UK IT priorities 2012 by ComputerWeekly.com

August 24, 2012 - (Free Research)
This exclusive Computer Weekly research reveals how UK IT departments are prioritising their budgets in 2012, which technologies they are investing in, and the impact of cloud computing, mobile and other disruptive technology on their IT strategies. 
(IT BRIEFING) READ ABSTRACT |

CW+ Gartner Research: The impact of cloud computing on suppliers in banking by ComputerWeekly.com

July 05, 2010 - (Free Research)
Despite well-publicised concerns regarding security, compliance and data integration issues, banking institutions have begun embracing cloud computing across the services spectrum. 
(WHITE PAPER) READ ABSTRACT |

The iPad Invasion: Leveraging SharePoint for Mobile Enterprise Security by Colligo Networks Inc.

June 28, 2012 - (Free Research)
In order to leverage SharePoint and provide data access across a variety of technologies and locations, businesses everywhere are looking to integrate tablets into the enterprise, particularly the iPad. Check out this webcast to hear more on how iPads are changing the IT landscape and common challenges for iPads in the enterprise. 
(WEBCAST) READ ABSTRACT |

The iPad Invasion: Leveraging SharePoint for Mobile Enterprise Security by Colligo Networks Inc.

June 28, 2012 - (Free Research)
In order to leverage SharePoint and provide data access across a variety of technologies and locations, businesses everywhere are looking to integrate tablets into the enterprise, particularly the iPad. Check out this webcast to hear more on how iPads are changing the IT landscape and common challenges for iPads in the enterprise. 
(WEBCAST) READ ABSTRACT |

Instant Messaging Tough Enough for Business: No Server Required by WebEx Communications, Inc.

September 01, 2006 - (Free Research)
This white paper discusses the important benefits that business Instant Messaging (IM) can provide and the security factors that must be addressed as organizations plan their upgrade to an enterprise-grade IM capability. 
(WHITE PAPER) READ ABSTRACT |

Mobile Device Management Checklist by BlackBerry

December 22, 2011 - (Free Research)
This expert E-Guide highlights a mobile device management checklist to consider when developing your own mobile device management strategy. 
(EGUIDE) READ ABSTRACT |

Investing in IP Phones: How to Control Costs, Now and Later by Cisco Systems, Inc.

January 20, 2011 - (Free Research)
Businesses that use voice over IP (VoIP) service and IP phones gain many advantages. No wonder desktop IP phones are used by more than a third of small and medium-sized businesses surveyed in Europe and North America. Continue reading to learn more and discover how to make the best investment through seven key questions. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly - 31 January 2012: The importance of IT strategy by ComputerWeekly.com

January 31, 2012 - (Free Research)
In this week’s Computer Weekly, we look at the importance of IT strategy when budgets are under pressure. The first part of our Buyer’s Guide to virtualisation examines the barriers preventing many organisations from adopting the technology; and Transport for London’s CIO talks about how IT helps avoid Olympic travel chaos. Download the issue now. 
(EZINE)

1 - 25 of 499 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts