Site FindWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Site Find returned the following results.
RSS What is RSS?
Related Categories

 •   Backup Systems and Services
 •   Disaster Recovery
 •   Enterprise Data Protection and Privacy
 •   Storage Management
 •   Virtualization
 •   Business Process Management (BPM)
 •   Business Intelligence Solutions
 •   Data Center Management
 •   Social Networks and Community Management
 •   Disk-based Backup & Storage/ RAID

Related Searches
 •   Note Site
 •   Owning Site
 •   Proposals Site Find
 •   Site Delivery
 •   Site Demonstrations
 •   Site Designs
 •   Site Find Introduction
 •   Site Find Testing
 •   Site Managing
 •   Specialist Site
Advertisement

ALL RESULTS
1 - 25 of 451 | Next Page

Featured Sponsors

E-mail Recovery, Restoration, Search & Analysis by Ontrack® PowerControls™ by Kroll Ontrack.
Ontrack® PowerControls™ is a simple yet powerful tool for copying, searching, recovering and analyzing mailbox items directly from Microsoft Exchange Server more...
>> Discover more offerings from Ontrack® PowerControls™ by Kroll Ontrack.
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..
Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Online Dating: Keeping Your Members Safe from Online Scams and Predators by iovation, Inc.

June 09, 2009 - (Free Research)
This whitepaper will help you understand what new and innovative techniques can be used to protect the reputation of your business, keep your members in a safe and trusted environment, while keeping the fraudsters out. Device fingerprinting helps identify the bad guys so sites can eliminate their accounts from the network once and for all. 
(WHITE PAPER) READ ABSTRACT |

The Anatomy of a Cross-Site Scripting Campaign by Imperva

August 23, 2010 - (Free Research)
XSS attacks are not new. What makes this particular situation unique is the process the ADC used to uncover the attack. Read this paper to find out so much more about XSS attacks. 
(WHITE PAPER) READ ABSTRACT |

Architect Versatile, Efficient Remote Site IT with the Dell PowerEdge VRTX by Dell India

December 31, 2013 - (Free Research)
Explore this game-changing resource to find out how this integrated IT solution was designed so you can make the most out of your ROBO sites. 
(WHITE PAPER) READ ABSTRACT |

Secure Offsite Data Storage: It Keeps You Running by Iron Mountain

October 22, 2012 - (Free Research)
Access this article to learn an approach to ensure the "recovery" part of DR: Secure, off-site data storage. Read on to learn how to get started and find a business continuity checklist along with 8 criteria for reliable off-site storage. 
(TECHNICAL ARTICLE) READ ABSTRACT |

Build Effective and Highly Available Disaster Recovery Solutions using Microsoft Virtualization by Microsoft

November 24, 2009 - (Free Research)
Does your organization have a reliable and cost-effective site recovery system? This presentation transcript explores how site recovery tools along with virtualization enables IT pros to deliver secure application and data availability, implement site-wide disaster recovery and automate fail-over and fail back. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Geographic Factors for Data Center Site Selection by FORTRUST LLC

November 2008 - (Free Research)
This paper highlights the geographic advantages inherent in establishing data center operations in Colorado, addressing major events and probabilities of natural disasters. 
(WHITE PAPER) READ ABSTRACT |

Why Web Performance Matters: Is Your Site Driving Customers Away? by Compuware Corporation

April 2011 - (Free Research)
In this white paper, you’ll learn about the direct impact Web performance has on business results. And discover powerful tools for driving the superior customer experience, and business revenues, you demand from your Website. 
(WHITE PAPER) READ ABSTRACT |

Outbound Email And Data Loss Prevention In Today's Enterprise, 2009 by Proofpoint, Inc.

August 2009 - (Free Research)
The convenience and ubiquity of email as a business communications tool has exposed enterprises to a wide variety of legal, financial and regulatory risks associated with outbound email. This report summarizes the findings of Proofpoint's sixth annual survey of enterprise attitudes about outbound email, content security and data protection. 
(WHITE PAPER) READ ABSTRACT |

Alteryx helps leading restaurant chain, Chipotle, increase its ability to find, open and maintain its profitable stores by Alteryx, Inc.

January 2011 - (Free Research)
Chipotle needed a way to deploy more timely sales forecasting data and its complex site location selection model to its brokers. The solution integrates current data and allows user flexibility to update data and analyses using an optimized Alteryx application. Chipotle real estate managers can now spend more time on real estate transactions. 
(CASE STUDY) READ ABSTRACT |

Eradicate Cross-Site Scripting by Veracode, Inc.

February 2011 - (Free Research)
The rise of e-commerce has generated a concurrent surge of Internet crime into a multi-billion-a-year industry, as criminals follow the money, the countless potential online victims and the vulnerability of web applications to easy exploitation. 
(WHITE PAPER) READ ABSTRACT |

Your September Issue of Information Security Magazine– Readers’ Choice Awards by Information Security Magazine

September 2010 - (Free Research)
In this month’s issue we provide our 5th annual Readers’ Choice Awards for the best security products in the market. We’ve talked with over 1,500 Information Security readers to find what their favorite products are and why. Read through to see which ones take the gold. 
(EGUIDE) READ ABSTRACT |

Backup Perspectives: Mobile Data, Hot Sites & Vendor Management by SearchStorage.com

June 2012 - (Free Research)
This SearchDataBackup.com e-brief featuring backup expert Brien M. Posey covers how IT can protect mobile data, the pros and cons of managing your own recovery site and the most recent advances in the virtualization market. 
(EBRIEF) READ ABSTRACT |

Slipping Through The Cracks Of Web Services To Serve Malware by Trend Micro, Inc.

October 2010 - (Free Research)
Today's generation of cybercriminals continue to find more ways to abuse commonly used Web services for spamming and to spread malware. Leveraging the ever-growing number of Web 2.0 and computing platforms to facilitate operations, cybercriminals have moved away from simple and so much more. 
(WHITE PAPER) READ ABSTRACT |

Choosing the Right Enterprise Resource Planning (ERP) System: How to Avoid the 7 Fatal Flaws by CDC Software - Ross Enterprise

November 2008 - (Free Research)
This paper explains the importance of choosing the Right Enterprise Resource Planning (ERP) System to avoid the 7 Fatal Flaws. 
(WHITE PAPER) READ ABSTRACT |

eBook: Techfocus - Data Center Construction by APC by Schneider Electric

November 2009 - (Free Research)
The chapters in this Techfocus eBook will discuss the importance of site selection and planning, data center conceptualization and cost analysis, and negotiating with contractors. 
(EBOOK) READ ABSTRACT |

The Web Hacking Incidents Database 2009 Bi-Annual Report by Breach Security

August 2009 - (Free Research)
Criminals focus on exploiting web application vulnerabilities in order to plant malware and thus infect clients who visit websites. Read this report to learn more about the drivers behind web hacking, the vulnerabilities hackers exploit, and the types of organizations attacked most often. 
(WHITE PAPER) READ ABSTRACT |

Adding Business Value With Cross-Platform Solutions: Linux running on IBM Servers by IBM

October 2008 - (Free Research)
This IDC White Paper is based on research data collected at a dozen customer sites in the United States, Canada, and Europe, all with mixed server platforms, to find the technical and business outcomes from deploying cross-platform Linux solutions on IBM servers. This paper presents the key findings of a return on investment (ROI) analysis. 
(WHITE PAPER)

Enterprise Portal Rationalization: Using a Service-Oriented Architecture to Stop Web Asset Sprawl by Oracle Corporation

March 2009 - (Free Research)
This paper provides an overview of the problem of Web sprawl, and an account of the rationalization strategies organizations are adopting to gain the upper hand on sprawl. Adopting a service-oriented architecture based on integrated application platform infrastructure emerges as the key to rationalizing sprawl. 
(WHITE PAPER) READ ABSTRACT |

Configuring NetApp for SnapMirror – for VMware Site Recovery Manager by NetApp

April 2010 - (Free Research)
This presentation transcript features virtualization guru, Mike Laverick, as he explains how to setup a data replication tool that provides disaster recovery protection for business critical data. Find out to how carry out a test with this technology and VMware SRM together. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Security - Pix 500 Series Firewalls by Cisco Systems

The world-leading Cisco PIX Security Appliance Series provides robust, enterprise-class, integrated network security services including stateful inspection firewalling, protocol and application inspection, virtual private networking, in-line intrusion protection, and rich multimedia and voice security-in cost-effective, easy-to-deploy solutions. 
(HARDWARE PRODUCT)

The Total Economic Impact of VMware vCenter Site Recovery Manager by Dell and VMware

May 2013 - (Free Research)
Check out this informative paper to explore a DR solution that's built for today's virtualized IT. Find out the total economic impact of this market-leading DR management technology and discover how it can ensure simple and reliable disaster protection for all of your virtualized applications. Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

Making Strategic Use of Tape and Cloud Technologies for Offsite Data Protection by Iron Mountain

November 2012 - (Free Research)
This paper explains the necessary reassessment of the ways your company uses and stores data in order to create an effective storage strategy that encompasses your backup, recovery and archiving operations. Learn how to best make a new storage strategy and to explore a new idea: Optimizing off-site data with tape and cloud support. 
(WHITE PAPER) READ ABSTRACT |

FINRA: Compliance Guide Social Networks, Web 2.0 and Unified Communications by FaceTime Communications

September 2010 - (Free Research)
This whitepaper sets out some of the key rules, guidelines and associated risks for FINRA member firms and suggests ways that organisations can use technology to protect themselves and their RRs. In addition, it looks at some of the other issues that enterprises may encounter when enabling the new internet. 
(WHITE PAPER) READ ABSTRACT |

Lowering Risk by Applying Consistent Security Across All of Your Locations by Juniper Networks, Inc.

July 2009 - (Free Research)
Security in today's IT infrastructure presents challenges to all sorts of organizations, but especially to distributed enterprises. Branch offices and remote locations are often less secure than the headquarters or main data center location. Watch this webcast to learn how and why you should ensure that every location is properly secured. 
(WEBCAST) READ ABSTRACT |

SharePoint E-Zine Volume 9: Rediscovery, Research and Prediction in SharePoint Search by SearchWinIT

April 2009 - (Free Research)
In this month's issue of SharePoint eZine, you'll learn how indexing content creates a search environment that gives users information as they need it, how to maintain your SharePoint governance documents while keeping them current, and how setting guidelines for site provisioning gives flexibility for users and helps manage growth. 
(EZINE)

1 - 25 of 451 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts