Selecting An SecureWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Selecting An Secure returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Network Security
 •   Security Monitoring
 •   Endpoint Security
 •   Security Policies
 •   Enterprise Data Protection and Privacy
 •   Storage Security
 •   Application Security
 •   Business Intelligence Solutions
 •   Backup Systems and Services

Related Searches
 •   Automate Selecting
 •   B2B Selecting An Secure
 •   Controls Selecting An
 •   Download Selecting An
 •   Imports Selecting An Secure
 •   Manufacturing Selecting An Secure
 •   Marketing Selecting An Secure
 •   Samples Selecting An Secure
 •   Selecting Package
Advertisement

ALL RESULTS
1 - 25 of 473 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Magic Quadrant for Secure Web Gateway by BlueCoat

September 17, 2010 - (Free Research)
Web application control and data loss prevention are important considerations for future-proofing investments; however, these features are not very mature or widespread. Read on to learn about a critical tool for protecting endpoints from various forms of malware and other security risks. 
(WHITE PAPER) READ ABSTRACT |

How to select cloud formations for secure business collaboration by ComputerWeekly.com

November 09, 2010 - (Free Research)
Cloud computing offers massive scalability -  in virtual computing power, storage, and applications resources - all at almost immediate availability and low cost, and business managers are demanding their IT operations assess the benefits this new computing model can represent. 
(WHITE PAPER) READ ABSTRACT |

Select the Right Solution for Endpoint Management by IBM

May 31, 2013 - (Free Research)
This guide explores how you can improve your overall security with endpoint management – ensuring greater visibility with a more unified approach. 
(WHITE PAPER) READ ABSTRACT |

How Red Hat Delivers a Secure Enterprise Platform for Next-Generation DataCenters by Red Hat

November 20, 2013 - (Free Research)
This whitepaper shows you how Red Hat Enterprise Linux delivers an exceptionally secure, open source server platform via an extensive set of processes and practices. 
(WHITE PAPER) READ ABSTRACT |

TicketNetwork Selects SecureSphere to Secure Transactions by Imperva

December 31, 2011 - (Free Research)
This white paper highlights a quick-to-deploy Web application firewall that offers the scalability needed to handle a large number of online transactions, as well as a malicious IP address blocking feature to ensure data access and security. 
(CASE STUDY) READ ABSTRACT |

The Web Security Challenge: a Competitive Guide to Selecting Secure Web Gateways by Websense, Inc.

February 11, 2009 - (Free Research)
Enterprise IT managers should carefully evaluate both the ease of management, as well as the effectiveness, of gateway-based Web security solutions against a constantly evolving threat landscape. 
(WHITE PAPER) READ ABSTRACT |

Migrating to Windows 7: How to Select a Provider for PC Online Backup and Recovery by Iron Mountain

January 26, 2011 - (Free Research)
In addition to implementing strategic initiatives, IT has the basic function of keeping workers productive. With many enterprises migrating to Microsoft Windows 7, it is important to consider a backup provider that supports Microsoft’s latest platform. Read this white paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

The Need to Secure All Business Communications: A competitive Overview of Major Players in the Market by Webroot

December 01, 2010 - (Free Research)
This Bloor Research paper offers an overview of the major players in the market for hosted email and web security services. View now to evaluate these services and explore key recommendations for selecting the right vendor for your organisations' needs. 
(WHITE PAPER) READ ABSTRACT |

Secure Wireless Made Easy -- Selecting a Next-Generation Solution for Pervasive WLAN Implementations by SonicWALL

July 06, 2009 - (Free Research)
This paper examines the characteristics of a next-generation solution that helps alleviate the prevailing issues and challenges associated with today's WLAN implementations. The emergence of products that conform to related criteria holds the key to enabling enterprises to fully realize the important benefits that wireless technology has to offer. 
(WHITE PAPER) READ ABSTRACT |

GoAnywhere: Mutual Bank Finds Secure Data Transfer Solution with Fast Implementation by Linoma Software

July 2008 - (Free Research)
In this case study Think a mutual bank, implemented GoAnywhere software. They chose this product because of the database conversion, the database push, the secure FTP, and the support staff at Linoma. 
(CASE STUDY) READ ABSTRACT |

Choosing a Cloud Provider with Confidence by GeoTrust, Inc.

February 2011 - (Free Research)
The goal of this paper is to help enterprises make decisions about where and when to use cloud solutions by outlining issues that enterprises should raise with hosting providers before selecting a vendor, and by highlighting ways in which SSL from a trusted certificate authority can help enterprises conduct business in the cloud with confidence. 
(WHITE PAPER) READ ABSTRACT |

Case Study: Capita Group PLC by Druva Software

December 2010 - (Free Research)
Office and remote laptop users at Capita were unable to securely backup their critical data. A secure and scalable backup solution featuring low impact on system performance was crucial to fulfilling their backup needs. Find out why Capita selected Druva inSync for their backup solutions. 
(CASE STUDY) READ ABSTRACT |

Implementing Database Security and Auditing - Authentication and Password Security by IBM

May 2011 - (Free Research)
In order to secure your database, you need an authentication process to identify users before allowing any activities. In this chapter, explore the authentication process and learn best practices for authentication and user account management. 
(EBOOK) READ ABSTRACT |

The Shortcut Guide to Eliminating Insecure and Unreliable File Transfer Methods by Attachmate Corporation

December 2012 - (Free Research)
This informative resource details the limits of traditional file transfer solutions and offers advice on how to select and migrate from your legacy system to a reliable, secure enterprise-grade approach. 
(WHITE PAPER) READ ABSTRACT |

Select the Right Solution for Endpoint Management by IBM

May 2013 - (Free Research)
This white paper details the need for a centralized endpoint management system that helps maximize business performance through quicker software deployment and maintaining compliance. 
(WHITE PAPER) READ ABSTRACT |

Strong Authentication: Securing Identities and Enabling Business by Aladdin Knowledge Systems

April 2008 - (Free Research)
This white paper examines the ways that strong authentication solutions can protect sensitive company data and help companies achieve compliance, bring in more business, and reduce costs. 
(WHITE PAPER) READ ABSTRACT |

SAP Outsourcing for Mid-Market Companies: A Comparison of Three Leading Providers by itelligence, Inc.

March 2011 - (Free Research)
Running a business on SAP requires that the application be available 7x24, data be secure, and that the application can grow with an organization. The decision to select an outsourcer goes far beyond finding a data center. Read this paper and learn what questions to ask in order to select an outstanding SAP outsourcing provider. 
(WHITE PAPER) READ ABSTRACT |

Leverage Security Intelligence for Retail by IBM

October 2013 - (Free Research)
This informative solution brief highlights the challenges and potential solutions that can be implemented to help embrace mobile customers, protect payment and personal data and deliver a secure shopping experience. 
(WHITE PAPER) READ ABSTRACT |

Leverage Security Intelligence for Retail by IBM

October 2013 - (Free Research)
This informative solution brief highlights the challenges and potential solutions that can be implemented to help embrace mobile customers, protect payment and personal data and deliver a secure shopping experience. 
(WHITE PAPER) READ ABSTRACT |

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc.

The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. 
(HARDWARE PRODUCT)

Implementing a "Smart IPS": IANS Working Knowledge Series™ by Sourcefire

June 2008 - (Free Research)
The LA Times faced challenges securing its internal network and complying with PCI to address both issues they decided to implement an IPS they develop selection criteria, investigated several solutions, and ultimately selected Sourcefire. 
(CASE STUDY) READ ABSTRACT |

2010 Application Delivery Networking Challenge: Accelerating, Securing, Optimizing & Monitoring Applications by BlueCoat

November 2010 - (Free Research)
Application delivery is one of the few technologies that both improves the end-user experience and lowers the cost of enterprise networks. It improves response time, reduces bandwidth, optimizes server performance, provides enhanced security and gives visibility into what is happening at the application layer. Read this white paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Effective and Secure User Account Provisioning by Hitachi ID Systems, Inc.

July 2010 - (Free Research)
Effective provisioning means not only working with an identity and access management provider and its product, but it is also about business process, effective communication and phased implementation. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Seven Things to Look for in a Colocation Provider by SAVVIS

January 2012 - (Free Research)
According to a recent study, the use of colocation and services is increasing dramatically, yet there are many differences between colocation providers which IT pros should be aware of. Access this resource to discover 7 things you should look for when selecting a colocation provider 
(WHITE PAPER) READ ABSTRACT |

The Truth about Agent Vs. Agentless Monitorinng: A Short Guide to Choosing the Right Solution by uptime software inc.

July 1967 - (Free Research)
When selecting an enterprise-level monitoring solution, one of the first decisions the IT department needs to make is whether to opt for an agent based, or agentless monitoring solution. This paper helps you arrive at a decision. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 473 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts