Security Public Case StudiesWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Security Public Case Studies returned the following results.
RSS What is RSS?
Related Categories

 •   Virtualization
 •   Data Security
 •   Data Center Management
 •   Storage Management
 •   Network Security
 •   Enterprise Systems Management
 •   Disaster Recovery
 •   Storage Security
 •   Application Security
 •   Security Policies

Related Searches
 •   Conversion Security
 •   Guidelines Security
 •   Manage Security Public Case
 •   Price Security
 •   Security Programming
 •   Security Public Alabama
 •   Security Public Case Batch
 •   Security Public Case It
 •   Security Public Case Solution
 •   Security Public Measurement
Advertisement

ALL RESULTS
1 - 25 of 450 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..
E-mail Recovery, Restoration, Search & Analysis by Ontrack® PowerControls™ by Kroll Ontrack.
Ontrack® PowerControls™ is a simple yet powerful tool for copying, searching, recovering and analyzing mailbox items directly from Microsoft Exchange Server more...
>> Discover more offerings from Ontrack® PowerControls™ by Kroll Ontrack.

Presentation Transcript: State of New York Government Case Study by McAfee, Inc.

October 14, 2009 - (Free Research)
Read this presentation transcript to see how the State of New York saved millions of dollars, reduced management time, and improved compliance by standardizing on McAfee for complete system protection. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

The Total Economic Impact Of McAfee’s Network Security Platform’s Intrusion Prevention System: Multicompany Analysis by McAfee, Inc.

August 29, 2009 - (Free Research)
This June 2009 study examines the financial impact and potential return on investment (ROI) for McAfee Network Security Platform intrusion prevention system (formerly McAfee IntruShield®), using Adena Health System as a case study. 
(ANALYST REPORT) READ ABSTRACT |

HP Cloud Service Automation by HP & Intel®

September 08, 2011 - (Free Research)
In this white paper learn why HP Cloud Service Automation is uniquely positioned to help your company get ahead in a business landscape increasingly dominated by cloud computing. 
(WHITE PAPER) READ ABSTRACT |

10 Security Concerns for Cloud Computing by Global Knowledge

March 17, 2010 - (Free Research)
Read this paper to learn the many benefits of cloud computing as well as the 10 security concerns that need to be addressed when considering moving critical applications and sensitive data to public and shared cloud environments. 
(WHITE PAPER) READ ABSTRACT |

Swedish Social Insurance Agency DoesBYOD Right by McAfee, Inc.

August 02, 2013 - (Free Research)
This informative case study details how a Swedish government insurance agency was able to deliver a BYOD solution that maintains strict security criteria, is clientless and is simple to manage, enabling the flexibility users demand without sacrificing security. 
(CASE STUDY) READ ABSTRACT |

Cloud computing: A reality check and guide to risk mitigation by BlueCoat

December 01, 2009 - (Free Research)
This white paper provides a reality check on cloud computing from the perspective of an IT organisation. 
(WHITE PAPER) READ ABSTRACT |

Assuaging Concerns about Public Cloud Services And APM: Expert Roadmap by XO Communications

January 21, 2014 - (Free Research)
In this e-guide, cloud networking expert Amy Larsen DiCarlo shares her insight on the public cloud, with emphasis on use cases, common concerns, and how to choose the right provider. Click through to also find 5 FAQs about network-based application performance management (APM) to ensure your business stays up-to-speed. 
(EGUIDE) READ ABSTRACT |

Is your security as good as the cloud’s? by Trend Micro, Inc.

October 04, 2011 - (Free Research)
This paper examines the relative merits of Software-as-a-Service and Infrastructure-as-a-Service, as well as issues and risks to consider. View now to determine whether these models are likely to provide better or worse security than your current in-house security. 
(WHITE PAPER) READ ABSTRACT |

Security in the Cloud - Solutions Brief by Intel

February 22, 2012 - (Free Research)
This solution brief poses key questions concerning cloud security and explores new tools you can leverage to ensure the privacy of data at rest and in motion, provide verification of compliance, and more. 
(PRODUCT OVERVIEW) READ ABSTRACT |

Securing Your Private Keys as Best Practice for Code Signing Certificates by Thawte Inc.

September 30, 2013 - (Free Research)
This paper describes recent security breaches and why they may have happened. It discusses best practices, especially for the Windows platform, which can help to safeguard the private keys associated with code signing certificates. 
(WHITE PAPER) READ ABSTRACT |

22 November 2011: Read the latest issue of the UK’s leading technology publication, where we analyse the latest technology news and what it means for IT managers. by ComputerWeekly.com

December 12, 2011 - (Free Research)
In this week’s Computer Weekly, we talk to the British Library about the enormous storage challenges of digitising its printed archive; we examine the state of the UK IT jobs market and the skills that are most in demand by employers; and we look at case studies of the best virtualisation projects. Download the new issue now. 
(EZINE) READ ABSTRACT |

VMworld Europe Case Study:  Bull SAS by ComputerWeekly.com

November 16, 2012 - (Free Research)
Bull SAS collaborated with suppliers to build a private cloud platform capable of keeping sensitive data secure. 
(CASE STUDY) READ ABSTRACT |

Charlotte County Public Schools: Accelerating Web Applications, Streaming Media, and SSL by BlueCoat

September 21, 2011 - (Free Research)
View this case study to discover how Blue Coat SG appliances helped Charlotte County Public Schools radically reduce bandwidth consumption, ensure quality streaming media to large number of students, speed SSL encrypted traffic, provide overall security and control, and more. 
(CASE STUDY) READ ABSTRACT |

Case Study: State of New Mexico Chooses HyTrust to Secure Virtualized Infrastructure by HyTrust

July 01, 2011 - (Free Research)
To meet the growing needs of the public, raise efficiency and streamline government processes, the New Mexico Human Services Department adopted a full-scale virtualization deployment. Take a look at this resource, a case study of New Mexico's implementation of the HyTrust Appliance for a new level of security in the virtualized environment. 
(CASE STUDY) READ ABSTRACT |

Success Story: Company Delivers Dynamic IT with Public and Private Clouds on Proven Storage by NetApp

December 31, 2012 - (Free Research)
This short case study examines how one organization easily and affordably deployed a storage system designed to deliver superior availability and proven performance to satisfy the most demanding workloads. 
(CASE STUDY) READ ABSTRACT |

IT Handbook: How to Choose a Hybrid Cloud Approach by SearchCloudComputing.com

March 25, 2013 - (Free Research)
Explore this IT handbook to help you determine a best-suit hybrid cloud strategy. Gain expert advice for managing your hybrid cloud once you've deployed and review the top five security challenges to keep in mind when implementing this cloud model. 
(EBOOK) READ ABSTRACT |

Computer Weekly datacentre case studies by ComputerWeekly.com

February 24, 2014 - (Free Research)
Jim Mortleman takes a look at what made the winning entries stand out from the crowd in the Computer Weekly European User Awards. 
(CASE STUDY) READ ABSTRACT |

Computer Weekly - 6 March 2012: Windows 8 - tablet meets desktop by ComputerWeekly.com

March 06, 2012 - (Free Research)
This week’s Computer Weekly delves into the new world of Windows 8. We also talk to some top CIOs about how the downturn has shaped their priorities. You'll also find the third and final part of our Buyer's Guide to IPv6 migration, all inside this digital magazine. 
(EZINE)

Case Study: Reducing Backup and Recovery Costs by 80% by Iron Mountain

January 28, 2011 - (Free Research)
Read this Case Study to learn how the Eighteenth Judicial Circuit of Florida protected their data and prepared for unforeseen natural disasters. 
(CASE STUDY) READ ABSTRACT |

Fast-Growing Municipality in Southeast USA Secures IT Operations and Services with AVG Anti-Virus Network Edition by AVG Technologies USA, Inc.

March 31, 2010 - (Free Research)
The city of Brentwood’s IT environment is made up of 450 computers and counting. Increased population growth brings greater IT infrastructure needs. Brentwood’s old security provider couldn’t keep up. Read this brief case study to find out how Brentwood managed to meet their growing IT security needs. 
(CASE STUDY) READ ABSTRACT |

Computer Weekly – 20 March 2012: The open data revolution by ComputerWeekly.com

March 20, 2012 - (Free Research)
In this week’s Computer Weekly, Cabinet Office minister Francis Maude talks about releasing government datasets to the public and why open data will drive the next industrial revolution. We also review the latest test version of Windows 8 and see how it shapes up for tablet computers and business users and much more. 
(EZINE)

Case Study: Capita Group PLC by Druva Software

December 02, 2010 - (Free Research)
Office and remote laptop users at Capita were unable to securely backup their critical data. A secure and scalable backup solution featuring low impact on system performance was crucial to fulfilling their backup needs. Find out why Capita selected Druva inSync for their backup solutions. 
(CASE STUDY) READ ABSTRACT |

Computer Weekly - 1 May 2012: The technology behind the England football team by ComputerWeekly.com

May 01, 2012 - (Free Research)
This week's Computer Weekly examines how the Football Association's IT director is using technology to help improve the prospects for the England national team. Our Buyer's Guide to government IT looks at the future of open source in the public sector and we report from Infosec 2012 on the rising number of cyber attacks. Read the issue now. 
(EZINE)

Analyst Insight: The Role of Content Analytics in Public Safety by IBM

January 20, 2014 - (Free Research)
Access the following case study to reveal how the public safety sector utilized a content management platform to help distribute their assets appropriately as well as give the officers and other officials the timely intelligence they need to keep us safe. 
(CASE STUDY) READ ABSTRACT |

Computer Weekly - 29 November 2011: Read this week’s issue of the UK’s leading technology publication, featuring the latest news, analysis and opinion about UK IT by ComputerWeekly.com

November 28, 2011 - (Free Research)
In this week's Computer Weekly, we go behind the scenes at the datacentre that knows everything about you, at credit checking firm Experian. We analyse the government's new plans to change the way it works with IT suppliers; and kick-off our Buyer's Guide to outsourcing with a look at the latest trends. Download the new issue now. 
(EZINE)

1 - 25 of 450 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts