Security OperateWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Security Operate returned the following results.
RSS What is RSS?
Related Categories

 •   Operating Systems and Subsystems
 •   Virtualization
 •   Network Security
 •   Endpoint Security
 •   Application Security
 •   Data Security
 •   Security Monitoring
 •   Desktop Management
 •   Security Policies
 •   Data Center Management

Related Searches
 •   Erp Security Operate
 •   Industry Security
 •   Security Download
 •   Security Operate Comparisons
 •   Security Operate History
 •   Security Operate Indian
 •   Security Operate Monitor
 •   Security Operate Policy
 •   Security Operate Web
 •   Solution Security Operate
Advertisement

ALL RESULTS
1 - 25 of 463 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..
The Path to Enterprise Desktops: From Personal Computer to Personalized Computing by AMD and VMware, Inc..
This IDC white paper considers the concept of desktop virtualization, specifically as made available by VMware's VDI and ACE. The document also considers the benefits more...
>> Discover more offerings from AMD and VMware, Inc..

Windows 7 Migrations Provide the Ideal Time to Lock Down Endpoints by Viewfinity

December 30, 2011 - (Free Research)
Rather than deploying yet another desktop operating system without addressing endpoint security problems, the smarter choice may be to deal with the issue once and for all during your Windows 7 system migrations. In this resource, explore 6 frequently asked questions to help you on your way. 
(WHITE PAPER) READ ABSTRACT |

An Introductory Breakdown of Trusted Computing by Intel

December 01, 2008 - (Free Research)
This technical article provides an introduction to Trusted computing and its components, and is an comprehensive primer to IT departments evaluating security at the platform level. 
(TECHNICAL ARTICLE)

Mobile Device Security Overview by BlackBerry

September 29, 2011 - (Free Research)
This expert E-Guide highlights the 3 components for solid mobile device security, top mobile operating systems and more. 
(EGUIDE) READ ABSTRACT |

Sun™ xVM Virtualization Portfolio: Enabling Dynamic IT from the Desktop to the Datacenter by Sun Microsystems, Inc.

September 2008 - (Free Research)
The Sun™ xVM virtualization portfolio enables you to simplify the management of your heterogeneous environment across the entire stack, from the desktop to the datacenter. 
(WHITE PAPER) READ ABSTRACT |

Solution Brief: Top 10 Ways Shavlik Simplifies Patch Management by Shavlik Technologies

November 2010 - (Free Research)
Security vulnerabilities are uncovered on a daily basis, and managing the security patches that address them can be an endless and often complicated task for every network administrator. Without the right automated solutions, patch management can be a tedious and herculean task. Read this white paper from Shavlik to learn more. 
(WHITE PAPER) READ ABSTRACT |

Back to the Future: The New IT Infrastructure Opportunity by Avocent

June 2011 - (Free Research)
Access this exclusive resources to discover new technology and solutions to address security and operating expense (OPEX) issues related to distributed computing such as thin client, fast client, diskless workstations, SaaS, and VDI. 
(WHITE PAPER) READ ABSTRACT |

Leverage Technology at the Point of Care with Services from CDW Healthcare : Your Point-of-Care Services Solution Overview by CDW Healthcare

October 2011 - (Free Research)
Choosing the right PoC technology can improve your hospital’s ability to deliver quality patient care. This means you need to adopt PoC solutions that are readily compatible with existing systems, accommodate your budget and can comply with government criteria. Learn about services available to ensure a smooth transition to PoC. 
(WHITE PAPER) READ ABSTRACT |

Server Consolidation Handbook by AMD

March 2011 - (Free Research)
Server consolidation can save your organization money by increasing utilization rates and reducing power and cooling costs. Learn how capacity planning and virtualization technologies can help you meet your server consolidation goals. 
(IT BRIEFING) READ ABSTRACT |

Windows Server 2012 Security from End to Edge and Beyond by ComputerWeekly.com

September 2013 - (Free Research)
This extract from the book Windows Server 2012 Security from End to Edge and Beyond shows you how to plan your platform security requirements and gives you the critical questions to ask. 
(BOOK) READ ABSTRACT |

It’s Time for Enterprises to Secure Mac Computers by Symantec Corporation

December 2013 - (Free Research)
This guide explores the importance of protecting your Macs with endpoint security software and outlines how malware and advanced persistent threats look to infiltrate your operating systems. 
(WHITE PAPER) READ ABSTRACT |

Detecting Zero-Day Exploits in the Wild by Websense

March 2014 - (Free Research)
This report outlines the methodology used to research Windows Error Reporting (WER) – and explains its potential implications for your organization's cyber security. 
(WHITE PAPER) READ ABSTRACT |

Choosing an Enterprise-Class Wireless Operating System: A Comparison of Android, BlackBerry, iPhone, and Windows Mobile by BlackBerry

November 2011 - (Free Research)
When selecting a mobile computing platform, organizations have to keep security and manageability at the forefront of their considerations. Access this comprehensive resource to explore the key criteria in selecting, deploying and managing a mobile operating system. 
(WHITE PAPER) READ ABSTRACT |

Securing the Foundation of Information Technology (IT) Systems by Trusted Computer Solutions

January 2010 - (Free Research)
This paper explains how there is no one process to make any organization 100% secure, but establishing a company-wide security policy based on industry-standard best practices is a good place to start. Many of these best practices can be implemented as part of the operating system assessment and lock down process. 
(WHITE PAPER) READ ABSTRACT |

When Desktops Go Virtual: Addressing security challenges in your virtual desktop infrastructure by Trend Micro, Inc.

July 2010 - (Free Research)
Virtual desktop infrastructure carries the potential for significant savings. However, given the dynamic nature of desktop computing, virtualizing endpoints will raise significant challenges. The temptation will be to treat virtual desktops like datacenter servers when it comes to protection. Read this paper to find out more. 
(WHITE PAPER) READ ABSTRACT |

Solaris 10 Operating System Innovation Matters-Increase Business Efficiency and Lower Costs by Sun Microsystems, Inc.

December 2008 - (Free Research)
The Solaris OS is the strategic platform for today's demanding enterprise and is the only open operating system that has delivered proven results, running everything from mission-critical enterprise databases to high performance Web farms. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 15 April 2014: Spies in the VPN by ComputerWeekly.com

April 2014 - (Free Research)
In this week's Computer Weekly, the NSA/GCHQ snooping scandal has added to concerns about security of virtual private networks (VPNs) – we find out how IT chiefs should respond. Windows XP support has now ended – we look at what it means for the remaining users. And we examine the benefits of data visualisation tools. Read the issue now. 
(EZINE) READ ABSTRACT |

Bring Distributed Environments Under Control with Desktop Virtualization by Dell, Inc.

November 2013 - (Free Research)
This resource highlights the fact that IT departments are no longer dealing with one set of PCs all using the same operating system. It also shows how desktop virtualization can be implemented to improve efficiency and security. 
(WHITE PAPER) READ ABSTRACT |

Deep Defender Blogs by Intel

October 2012 - (Free Research)
Find out why protecting your operating system no longer serves as enough security to keep your business safe. By downloading this software, you can see the results of stopping stealth attacks with endpoint security that goes beyond the operating system. 
(DOWNLOAD) READ ABSTRACT |

Jumpstart Your Windows Vista Migration With Enteo Client Lifecycle Management From FrontRange Solutions by Centennial-Software

July 2008 - (Free Research)
This whitepaper serves as a guideline for Vista migration projects, highlights the key challenges and cautions and outlines an ideal approach to successfully migrate to Windows Vista. 
(WHITE PAPER) READ ABSTRACT |

Ericom Desktop Virtualization Solutions by Ericom Software

Ericom virtualization solutions enable you to administer virtual desktops from a centralized location, reducing the cost and complexity of virtual desktop deployment and upkeep. Supported virtualization servers include VMware, Microsoft and others. 
(SOFTWARE PRODUCT)

A Closer Look at Windows Vista by National Instruments

February 2008 - (Free Research)
One of the stated goals of the Microsoft Windows Vista release is to greatly improve the overall security of the Windows operating system and curb the impact of malware. To this end, Microsoft redesigned both the least user and administrative... 
(WHITE PAPER) READ ABSTRACT |

Lumension Endpoint Management and Security Suite by Lumension

September 2010 - (Free Research)
A new wave of vulnerabilities is threatening our endpoints and browsers at a much greater rate than operating systems and servers, which is why the SANS Institute has ranked “patching client-side software” as the number one security priority. 
(TRIAL SOFTWARE)

Planning for the Security Features of Windows 7 Professional by Dell, Inc. and Microsoft Windows 7

October 2009 - (Free Research)
With Windows 7 Professional, Microsoft has added and extended many security capabilities in its flagship Windows operating system (OS). Deciding which features to activate as well as testing will impact the planning for every Windows 7 rollout. This analyst report will analyze the major security capabilities of Windows 7 in order of importance. 
(ANALYST REPORT) READ ABSTRACT |

McAfee Deep Defender: Hidden Malware Protection by Intel

January 2013 - (Free Research)
This webcast explores a security solution that operates beyond the OS, exposing and eliminating hidden malware and stealthy threats that traditional security solutions miss. Discover how this strategy can overcome the limitations of traditional security solutions by watching now to learn more. 
(WEBCAST) READ ABSTRACT |

SUSE Linux Enterprise Point of Service Data Sheet by SUSE

June 2012 - (Free Research)
This white paper outlines an enterprise-class Linux operating system that increases the flexibility and reliability of your IT environment. Inside, discover the top benefits of this system that is tailored specifically to meet your needs. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 463 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts