Security Telecom EDMWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Security Telecom EDM returned the following results.
RSS What is RSS?
Related Categories

 •   Network Management
 •   Network Security
 •   Data Security
 •   Application Security
 •   Business Process Management (BPM)
 •   Security Policies
 •   Help Desk and Call Management
 •   Index Servers
 •   Security Monitoring
 •   Telecom Auditing and Expense Management

Related Searches
 •   Audit Security
 •   Definition Of Security Telecom
 •   Planning Security Telecom EDM
 •   Record Security
 •   Regional Security Telecom
 •   Sample Security Telecom
 •   Security Telecom Budgets
 •   Security Telecom Program
 •   Security Telecom Retail
 •   Webcast Security
Advertisement

ALL RESULTS
1 - 25 of 496 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

EDM: A Systematic Approach to Smarter Decisions by FICO

March 2008 - (Free Research)
This white paper details the benefits associated with Enterprise Decision Management (EDM). Discover how to automate, improve and connect critical decisions for enhanced business performance. 
(WHITE PAPER) READ ABSTRACT |

Telecom Carrier Offers First-of-its-Kind Cloud Security Solution by Cisco Systems, Inc.

July 2012 - (Free Research)
This case study demonstrates how one telecom provider developed an intelligent visual data analysis engine that allowed them to identify voice and data threats in real time. This provided them with a holistic view of their network environment while bolstering overall data security by securing the voice network. 
(CASE STUDY) READ ABSTRACT |

Common Telecom Challenges and How to Overcome Them by Unimax

September 2013 - (Free Research)
This white paper details the day-to-day challenges telecom and IT departments face and how leveraging advanced technology together with an innovative approach to solving those telecom challenges simplifies moves, ads and changes (MACs) for help desk agents to understand and execute. 
(WHITE PAPER) READ ABSTRACT |

Burning Dollars: Three Myths of Telecom Savings by Dimension Data

December 2013 - (Free Research)
In this white paper, explore 3 telecom savings myths debunked, and how organizations must achieve greater visibility in their networks to differentiate perceived and realized value of their mobile investments. 
(WHITE PAPER) READ ABSTRACT |

eBook: Best Practices for DB2 on z/OS Performance by BMC Software, Inc.

April 2009 - (Free Research)
This book contains general information about improving performance for DB2 on z/OS and specific information about how BMC products help improve performance. 
(EBOOK) READ ABSTRACT |

Tap Aggregation and Filtering to Enable Deep Packet Inspection (DPI) by Gigamon

July 2009 - (Free Research)
Read this brief paper to learn how network monitoring using DPI analyzers is a mission critical application that is tailor-made for the Data Access Network (DAN) architecture and saves substantial amounts of money for the telecom carrier. 
(WHITE PAPER) READ ABSTRACT |

Client Case Study: Bouyges Telecom by IBM

July 2011 - (Free Research)
In this case study, Bouygues Telecom uses an analysis platform to help it proactively uncover online and in-store fraud by consumers, dealers and organized crime groups, and prevent the subsequent loss of products and revenue. 
(WHITE PAPER) READ ABSTRACT |

Whitepaper: Multicasting, TAP and Data Aggregation for Telecom by Gigamon

July 2009 - (Free Research)
SoIP providers can no longer ignore the harsh business reality of providing a fixed-income service while accommodating ever-growing monitoring demands. Read this paper to learn how Data Access Network (DAN) has emerged as the "Best Practice" data access and network monitoring architecture for cost-effective DPI monitoring. 
(WHITE PAPER) READ ABSTRACT |

Treating Data as an Enterprise Asset to Achieve Business Value by IBM

July 2011 - (Free Research)
This paper explores how Telecoms who apply information governance to solve business problems and service significant events in a similar manner can recognize significant return. Learn how information governance can help Telecom's improve the quality and reliability of data to increase profitability, reduce unnecessary costs and risks. 
(WHITE PAPER) READ ABSTRACT |

Controlling Wireless Costs with any Connection Reporting: Supporting Three Dimensions of Mobile Intelligence by Fiberlink Communications

March 2010 - (Free Research)
In this white paper we will provide a general overview of Any Connection Reporting. We will then look at specific applications of this technology and see how organizations can use it to solve problems 3G, connectivity plans and so much more. 
(WHITE PAPER) READ ABSTRACT |

Provergent Suite - Telecom Order & Inventory Software by Digital Fairway, Inc.

The Provergent Communication Asset Management Suite helps to manage the planning, procuring, provisioning, auditing & delivering of communications services. Provergent allows you to build accurate & easy to manage centralized inventories, backed up by automated provisioning processes to manage all moves, adds, changes & deletes in the inventory. 
(SOFTWARE PRODUCT)

ECI Telecom 1Net Wireless Backhaul Solution: Finding YOUR Right Path for Optimized Packet-based Backhaul by ECI Telecom

August 2010 - (Free Research)
ECI's 1Net wireless backhaul solution provides you with a comprehensive, end-to-end solution for backhaul optimization, and options for multi-stage migration from TDM to packet at your preferred pace. Read this paper to find more. 
(WHITE PAPER) READ ABSTRACT |

Telecommunications: Future Services and Business Models by Comarch Telecommunications

June 2008 - (Free Research)
With the onset of converged communications that integrate voice, video, text and data, Telecommunication Service providers needs have exploded. This paper examines the many challenges providers and operators face, as well as potential solutions. 
(WHITE PAPER) READ ABSTRACT |

Hitachi Success Story - Hitachi Telecom Partners Host Software as a Service by Hitachi Data Systems

February 2013 - (Free Research)
Check out this paper to explore a combined cloud offer that enables you to quickly deploy a cloud infrastructure. Read on to discover how this technology provides managed hosting, on-demand virtual servers, clustering and network services and much more. 
(CASE STUDY) READ ABSTRACT |

Emerging Best Practices for Carrier IP Transformation by Alcatel-Lucent

July 1967 - (Free Research)
This whitepaper identifies emerging best practices for planning, implementation, migration and operations based on hands-on experience with IP Transformation initiatives across the globe. 
(WHITE PAPER) READ ABSTRACT |

Get Personal: Capitalize on Your Subscriber Data with a Unified User Profile by Hewlett-Packard Company

November 2008 - (Free Research)
This IDC white paper discusses the role of user profile management in the telecom industry. Service providers' (SPs) efforts to manage, capitalize on, and provision user information across multiple databases are critical to fuel applications-led services. 
(WHITE PAPER) READ ABSTRACT |

Session Border Controllers: Addressing Tomorrow's Requirements by Metaswitch Networks

September 2011 - (Free Research)
This white paper discusses how IP-based service innovation will impact and shape the future of session border controllers. 
(WHITE PAPER) READ ABSTRACT |

UPS Selector by Eaton Corporation

January 2014 - (Free Research)
Use this multi-pathway UPS selector tool to choose the correct UPS for your application. Differentiate between UPS devices applicable for servers, PCs, or datacenters. 
(ASSESSMENT TOOL) READ ABSTRACT |

Presentation Transcript: Configuring and Using IBM i's Auditing Functions by PowerTech

April 2010 - (Free Research)
Did you know that IBM i includes powerful auditing features? In fact, our own class-leading audit reporting solution leverages the information captured by this facility. Read this presentation transcipt - based on content presented at the 2009 COMMON conference - to learn about activating and configuring IBM i's built-in auditing capabilities. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

KineticD Security by KineticD

August 2010 - (Free Research)
The purpose of this white paper is to demonstrate how KineticD meets and exceeds its clients' demands and expectations for the security of its online backup SaaS offering. 
(WHITE PAPER) READ ABSTRACT |

eGuide: Top Defense Strategies and Security Considerations for Unified Communications (UC) by IPC Systems, Inc.

August 2009 - (Free Research)
Organizations turn to unified communications as a cost-effective alternative to traditional communication systems. But security professionals often struggle with the problem of securing VoIP and unified communications. Read this expert E-Guide and discover unified communications infrastructure threats and basic techniques for addressing them. 
(E-LEARNING TUTORIAL) READ ABSTRACT |

Generating New Revenue Streams and Increasing Network Security: Dynamic Application Awareness and Intrusion Prevention System by Juniper Networks, Inc.

December 2009 - (Free Research)
This paper examines ways in which dynamic application awareness and intrusion prevention system (IPS) software solutions enable service providers to increase revenue while expanding service flexibility, richness, and reach. The paper then describes the technologies behind these advanced solutions. Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

Better Active Directory Auditing...Less Overhead, More Power by Netwrix Corporation

July 2010 - (Free Research)
Today’s stringent legislative and industry requirements Windows server auditing simpler, more reliable, and better able to meet their business requirements. organizations – faced with stricter internal security policies as well as– continue to struggle to make. 
(WHITE PAPER) READ ABSTRACT |

NetWrix Active Directory Change Reporter - Free! by Netwrix Corporation

July 2010 - (Free Research)
Active Directory change auditing is an important procedure for tracking unauthorized changes and errors to AD configurations. NetWrix AD Change Reporter automates the auditing process to promote both security and compliance. 
(DOWNLOAD) READ ABSTRACT |

Neusoft Telecom BSS Virtualized Application Performance on the Intel® Xeon® Processor 7500 Series using VMware vSphere 4 by Intel

May 2010 - (Free Research)
This paper discusses how Intel and Neusoft took advantage of the performance and scalability of Intel® Xeon® processor 7500 series-based servers to address some of the critical challenges in the telecom industry. 
(DATA SHEET)

1 - 25 of 496 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts