Security Travel AndWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Security Travel And returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Network Security
 •   Wireless Technologies and Mobile Computing
 •   Network Management
 •   Networks
 •   WAN/ LAN Solutions
 •   Endpoint Security
 •   Virtualization
 •   Mobile Device Management
 •   Enterprise Data Protection and Privacy

Related Searches
 •   Customer Security Travel And
 •   Faq Security Travel
 •   Licenses Security Travel
 •   Schedule Security Travel
 •   Security Buy
 •   Security Regional
 •   Security Researching
 •   Security Travel And Forms
 •   Security Travel Time
 •   System Security Travel And
Advertisement

ALL RESULTS
1 - 25 of 498 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Six Tips for Reducing Downtime in Travel and Transport by Marathon Technologies

February 23, 2010 - (Free Research)
Whether it's a security system, baggage handling application, order or vessel tracking downtime to applications supporting travel and transportation can throw off precisely timed schedules for travelers and shipments alike. This paper outlines six key tips for keeping travel and transportation logistics applications running without interruption. 
(WHITE PAPER) READ ABSTRACT |

Crypto Complete Case Study: Field-Level Encryption Helps Retail Chain Achieve PCI Compliance by Linoma Software

July 2008 - (Free Research)
In this case study, Love's Travel Stops and Country Stores, a retail chain, used Crypto Complete in an effort to meet PCI standards. Love's found that Crypto Complete encrypted credit card numbers in a way that satisfies PCI compliance auditors. 
(CASE STUDY) READ ABSTRACT |

Mobile NFC in Transport by ComputerWeekly.com

November 2012 - (Free Research)
This in-depth report from the GSMA explains the opportunities for NFC Mobile communications in transport. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Airport Insecurity: The Case of Lost Laptops by Dell India

June 2008 - (Free Research)
This paper contains the findings of a study to understand the current risks posed to sensitive and confidential data contained in the laptops of business travelers. 
(WHITE PAPER) READ ABSTRACT |

Pizza Company Slices Travel Costs by Citrix Online

February 2008 - (Free Research)
Learn how the world's third largest pizza company, Papa John's International, cuts travel costs by using GoToMeeting Corporate to meet with staff members and train franchisees in 49 states and 22 countries. 
(CASE STUDY) READ ABSTRACT |

CDP and Virtualization: Time Travel Recovery for Virtual Servers by DataCore Software Corporation

February 2008 - (Free Research)
DataCore has achieved in Traveller what no other solution can provide, it has introduced Timeshifting as a new, required functionality for data protection and parallel workflow optimization. 
(WHITE PAPER) READ ABSTRACT |

10 Reasons Large CompaniesUse Automated Travel andExpense Management Solutions by Concur Technologies (E-mail this company)

September 2013 - (Free Research)
This resources gives the most frequent reasons organizations adopt an automated travel and expense management solution. These reasons included improved security, compliance, and reduced costs. 
(WHITE PAPER) READ ABSTRACT |

Adaptive Security for the Health/Pharma Vertical by Juniper Networks, Inc.

April 2011 - (Free Research)
Healthcare and pharmaceutical organizations are more sophisticated than ever before; but with that sophistication, they also face new challenges. 
(WHITE PAPER) READ ABSTRACT |

Protecting Confidential Documents in the Extended Enterprise: Common Misconceptions and Best-Practice Strategies by Brainloop Inc.

February 2008 - (Free Research)
This white paper discusses the enormous cost of data breaches, the rising importance of data security, and common misconceptions that exacerbate the problem of protecting your company's most important and confidential information. 
(WHITE PAPER) READ ABSTRACT |

Layered Security: Protecting Your Data in Today's Threat Landscape by Tripwire, Inc.

November 2011 - (Free Research)
In this white paper, learn how threats have evolved over time, shortcomings of the perimeter-centric approach to security, steps to implementing a layered security approach to security, and much more. 
(WHITE PAPER) READ ABSTRACT |

Mobility - Aironet 1100 Series by Cisco Systems

The Cisco Aironet® 1100 Series delivers an affordable and upgradable 802.11b wireless LAN (WLAN) solution, setting the enterprise standard for high performance, secure, manageable, and reliable WLANs. 
(HARDWARE PRODUCT)

Protect Sensitive Data on Laptops - Even for Disconnected Users by Citrix Systems, Inc. (E-mail this company)

August 2012 - (Free Research)
Securing corporate data is a top IT imperative and with more employees working from alternative locations, the mobile security challenge has become a critical focus for IT.  Read this white paper to understand how local virtual desktops based on Citrix XenClient should be a part of your security strategy. 
(WHITE PAPER) READ ABSTRACT |

Ten Steps to Protecting Your Sensitive Data by McAfee.

December 2010 - (Free Research)
Data loss prevention has become a major focus for companies of all sizes. One reasonis for this is mobile employees carry an increasingly large collection of sensitive data. How can you protect your organization's sensitive data from loss or theft? Read these ten steps. 
(ANALYST BRIEF) READ ABSTRACT |

Planning for a Pandemic: Turning Office Workers into Mobile Workers for Business Continuity by Fiberlink Communications

July 2009 - (Free Research)
This white paper looks at some of the key issues facing enterprises that might need to turn office workers into mobile workers, rapidly and in large numbers. 
(WHITE PAPER) READ ABSTRACT |

3PAR Utility Storage Pays Off Big For Travel Giant Priceline.com by 3PAR

October 2008 - (Free Research)
Priceline.com purchased and deployed six 3PAR InServ S400 tiered storage arrays across multiple locations to consolidate and protect all mission-critical and SAN-resident data, including core demand collection and offer processing Oracle® databases. 
(CASE STUDY) READ ABSTRACT |

AT&T Network-based IP VPN Remote Access (ANIRA) by AT&T Corp

October 2011 - (Free Research)
AT&T Network-based IP VPN Remote Access (ANIRA) offers remote users and traveling users access to corporate information & productivity applications on the fly, whether away from or within the office. 
(WHITE PAPER) READ ABSTRACT |

HP Storage Solutions Protect and Help Bring Order to Missouri Court Information by Hewlett-Packard Company

January 2009 - (Free Research)
Read how the Missouri court system consolidated database servers from 40 circuit courts onto five HP ProLiant servers, providing numerous benefits including improved flexibility, enhanced disaster recovery, and significantly increased savings. 
(CASE STUDY) READ ABSTRACT |

Ten Steps to an Enterprise Mobility Strategy by iPass Inc. (E-mail this company)

January 2012 - (Free Research)
Ensure traveling employees are productive while you control costs and security, with an enterprise mobility strategy. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly - 31 January 2012: The importance of IT strategy by ComputerWeekly.com

January 2012 - (Free Research)
In this week’s Computer Weekly, we look at the importance of IT strategy when budgets are under pressure. The first part of our Buyer’s Guide to virtualisation examines the barriers preventing many organisations from adopting the technology; and Transport for London’s CIO talks about how IT helps avoid Olympic travel chaos. Download the issue now. 
(EZINE)

Building Mobility into Your Network by NETGEAR Inc.

October 2010 - (Free Research)
Business environments have become increasingly dynamic and have created the demand for unprecedented levels of workforce mobility. These demands for business mobility require networks and data to be securely accessible anytime and anywhere − throughout the office, as well as from remote locations. Read this white paper to find out more. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Addressing Data Protection Challenges by Dell Software

October 2011 - (Free Research)
This presentation transcript discusses the data protection challenges faced by CIOs and IT organisations in an ever-changing, dynamic, data-growth-driven industry. Watch to explore how you can simplify data protection across physical or virtual environments and applications, get faster return on investment, and reduce the TCO for data protection. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

The Lowdown on Compliant Data Storage by Iron Mountain

March 2012 - (Free Research)
Check out this white paper for 10 keys to staying compliant. Learn about the importance of access and authorization controls, discover the benefits of encryption for backups, learn how to safeguard traveling media and more. 
(WHITE PAPER) READ ABSTRACT |

Ideal Enterprise Solutions: Sharing Real World Success Tips by BlackBerry

December 2011 - (Free Research)
View this webcast to learn ideal enterprise solutions. Listen in as Mark Howden from Research In Motion shares real-world success tips from customers, clients, and RIM themselves. 
(WEBCAST) READ ABSTRACT |

Optimizing Video Performance Across the Distributed Enterprise by BlueCoat

October 2010 - (Free Research)
Do more with less: that’s the message echoing through corporate cultures today. One clear target is to contain costs, especially travel-related costs, which can be large enough to have a serious impact on bottom lines. Read this paper to find out more. 
(WHITE PAPER) READ ABSTRACT |

IBM SmartCloud Virtualized Server Recovery by IBM

February 2012 - (Free Research)
This short video explores a disaster recovery solution that can help you improve recovery times for apps running on both virtualized and traditional servers. 
(VIDEO) READ ABSTRACT |

1 - 25 of 498 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts