Security On ConsultingWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Security On Consulting returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Security Policies
 •   Virtualization
 •   Enterprise Data Protection and Privacy
 •   Network Security
 •   Application Security
 •   Security Monitoring
 •   Endpoint Security
 •   Managed Security Services
 •   Wireless Security

Related Searches
 •   Company Security
 •   Conversions Security On Consulting
 •   Diagram Security On Consulting
 •   Papers Security
 •   Planner Security On
 •   Rfi Security
 •   Security On Consulting Email
 •   Security On Consulting Reseller
 •   Security On Supplier
 •   Small Security
Advertisement

ALL RESULTS
1 - 25 of 494 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

The Total Economic Impact of CA Identity Manager by CA Technologies.

February 19, 2010 - (Free Research)
In January 2010, CA commissioned Forrester Consulting to examine the total economic impact and potential return on investment (ROI) enterprises may realize by deploying CA Identity Manager (CA IM). Read this paper to learn what they found. 
(WHITE PAPER) READ ABSTRACT |

Forrester Consulting Study - The Total Economic Impact of IBM’s Real-Time Compression Solution by IBM

October 21, 2011 - (Free Research)
In October 2010, IBM commissioned Forrester Consulting to examine the total economic impact and potential return on investment enterprises may realise by deploying IBM’s Real-time Compression solution. Read this case study to learn the results. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 18 February 2014: Swapping notepads for iPads – creating a digital police force by ComputerWeekly.com

February 18, 2014 - (Free Research)
In this week's Computer Weekly, we examine the new digital strategy at the Metropolitan Police, as the London force puts technology at the heart of crime fighting. IBM is spending $1.2bn developing cloud datacentres – we assess the plans. And we ask how the NSA web surveillance revelations are affecting IT security strategies. Read the issue now. 
(EZINE) READ ABSTRACT |

EMA Analyst Report on the Mobile Device Management Marketspace by IBM

August 24, 2012 - (Free Research)
Consult this informative white paper to gain better understanding of mobile device management with traditional desktop management capabilities. Use a consolidated endpoint management experience that can meet all enterprise challenges. 
(WHITE PAPER) READ ABSTRACT |

Your Enterprise Database Security Strategy (Forrester Consulting Report) by IBM

September 28, 2009 - (Free Research)
Database security is the last line of defense, so it deserves greater focus on the protection of private data from both internal and external attacks than IT pros have traditionally given it. Read this paper to learn what steps you can take to improve database security in your organization. 
(WHITE PAPER) READ ABSTRACT |

The Total Economic Impact of Lumension Security's Sanctuary by Lumension

September 2007 - (Free Research)
Lumension&#39s Sanctuary Application and Device Control is an IT-driven solution that automatically enforces endpoint security policies. The financial impact of moving from a &#34voluntary&#34 compliance solution to an &#34automatic&#34 one is illustrated 
(WHITE PAPER) READ ABSTRACT |

The trust advantage: How to win at big data by ComputerWeekly.com

November 2013 - (Free Research)
Without consumer trust, most of the trillions of dollars of social and economic value promised from big data will go to waste, this report from The Boston Consulting Group reveals. 
(ANALYST REPORT) READ ABSTRACT |

CW+: PA Consulting: Securing data in the cloud by ComputerWeekly.com

August 2010 - (Free Research)
Economies of scale, flexibility and costreduction – cloud advocates have made sure that we are familiar with these potential benefits, even if we have yet to agree on an exact definition of cloud computing. But doubters argue that none of these benefits will actually be available unless some fundamental security issues can be overcome. 
(WHITE PAPER) READ ABSTRACT |

ITS Group Consulting Offers "More 9's" and Killer RTO/RPO with Replay AppImage by AppAssure Software, Inc.

March 2009 - (Free Research)
Replay AppImage's ability to restore messages and systems quickly and with little effort allowed ITS Group to grow its customer base while keeping overhead low. 
(CASE STUDY) READ ABSTRACT |

Deloitte Consulting Presents: Risk and TCO in Single and Multivendor Networks by Cisco Systems, Inc.

March 2012 - (Free Research)
Can a multivendor network infrastructure actually reduce your overall costs, as some claim? To answer this question, Deloitte Consulting conducted in-depth research looking at enterprises' total cost of ownership (TCO), including capital outlays, operating expenses, and analyzed risks associated with the network. 
(WHITE PAPER)

Cisco Spam & Virus Blocker Frees Up Hours and Inboxes for Small Businesses by Cisco Systems, Inc.

February 2009 - (Free Research)
Spam email continues to be a big problem, even for small businesses. LUNAR, a product development consulting firm, had a major spam problem despite having just 50 employees. They found relief with Cisco's Spam and Virus Blocker. This case study details how LUNAR and other small businesses implemented and then benefited from this Cisco software. 
(CASE STUDY) READ ABSTRACT |

Total Cost Comparison of Backup Technologies: IT Decision-Maker Perspectives on NetApp SnapVault Disk-to-Disk versus Traditional Tape-Based Backup Solutions by NetApp

January 2009 - (Free Research)
Download this exclusive article to gain insight on why a NetApp SnapVault backup system is 54% less expensive than a similar tape-based backup solution over a typical backup product lifecycle. 
(WHITE PAPER) READ ABSTRACT |

Webroot Secure Anywhere Business Value Assessment by Webroot

August 2012 - (Free Research)
Consult this helpful resource to get financial justification for endpoint protection. Though you can't slap a price tag on a fully secured business enterprise, these eight simple questions can help you rest easy knowing you made the right choice! 
(WHITE PAPER) READ ABSTRACT |

Cisco Continuous Data Protection for Files by Cisco Systems, Inc.

March 2009 - (Free Research)
Most analysts, including Enterprise Strategy Group, agree that performing only a periodic backup leaves data at risk, and they find that this is a major concern among the IT professionals they survey. The answer to this concern is Cisco Small Business Network Storage Systems (NSS) and Cisco Continuous Data Protection (CDP) for Files software. 
(WHITE PAPER) READ ABSTRACT |

Mobility, Virtualization and the Next-Generation Workplace by Cisco Systems, Inc.

June 2012 - (Free Research)
By reading this report from Forrester Consulting, you’ll gain an understanding of the benefits, challenges and timelines for implementing workspace initiatives such as BYOD programs as well as collaboration, desktop virtualization, app virtualization and security solutions. 
(WHITE PAPER) READ ABSTRACT |

Log Management and SIEM: Build a Solid Foundation for Compliance by McAfee, Inc.

November 2012 - (Free Research)
This expert e-guide explores how enterprise log management and SIEM tools can be used to build a foundation for ensured compliance in your organizations and offers key tips for choosing the tools that meet your organization's compliance needs – click through to learn more. 
(EGUIDE) READ ABSTRACT |

The EMA All-Stars in Enterprise Systems Management for 2008 by CA Technologies.

March 2008 - (Free Research)
Analyst firm EMA has released the results of their first ever All-Stars in Enterprise Systems Management for 2008 report, covering 18 different systems management disciplines. 
(WHITE PAPER) READ ABSTRACT |

SharePoint Security in Action: Best Practices Drive Secure Collaboration by CA Technologies.

September 2012 - (Free Research)
Microsoft SharePoint is a widely deployed enterprise content management (ECM) and collaboration system because it delivers a functional user experience. However, it also presents some security concerns. Consult this informative white paper to learn more about some of the challenges and how to remedy these obstacles. 
(WHITE PAPER) READ ABSTRACT |

JBoss Enterprise Middleware Cloud Services: Ensuring Optimal Deployments of JBoss Solutions in the Cloud by Red Hat and JBoss

February 2011 - (Free Research)
Delivered by the Red Hat’s Consulting middleware practice, this paper provides strategic recommendations and on-site technical expertise to set up middleware as a service in your cloud environment. 
(WHITE PAPER) READ ABSTRACT |

Recovery Manager for Active Directory by Dell Software

Quest Recovery Manager for Active Directory offers an easy-to-use solution for fast, granular, online recovery of Active Directory (AD) in the event of inadvertent modification of AD due to software failure or human error. 
(ASP & SOFTWARE PRODUCT)

The Total Economic Impact™ of Oracle Enterprise Manager Configuration Management Pack, and Provisioning and Patch Automation Pack by Oracle Corporation

March 2009 - (Free Research)
Learn how Oracle's comprehensive industry leading configuration management and provisioning automation solutions help you reduce application management costs while delivering greater control and compliance. 
(WHITE PAPER) READ ABSTRACT |

Accenture Technology Vision 2012 by ComputerWeekly.com

January 2012 - (Free Research)
Download this report from Accenture to discover the 6 IT technology trends that will impact CIOs in 2012. 
(IT BRIEFING) READ ABSTRACT |

The Total Economic Impact Of Silver Tail Systems by RSA, The Security Division of EMC

August 2012 - (Free Research)
In this in-depth white paper, Forrester Consulting examines the total economic impact that enterprises may realize by deploying Silver Tail Systems Forensics software. 
(WHITE PAPER) READ ABSTRACT |

Prevent Data Leakage and Keep Business Users Happy by BlackBerry

April 2014 - (Free Research)
Consult the following informative white paper to explore how device containerization solutions can improve productivity and reduce security risks without compromising user experience. Learn how to correctly select containerization solutions that best meet your unique requirements and much more. 
(WHITE PAPER) READ ABSTRACT |

Rethinking your Enterprise Security: Critical Priorities to Consider by Hewlett-Packard Limited

May 2012 - (Free Research)
In this white paper, explore a sustainable approach to security designed to address the latest generation of vulnerabilities spawned from today's IT trends. Read on to access four keys to establish end-to-end security and five critical security priorities you must be aware of. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 494 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts