Soc ServicesWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Soc Services returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Access Control
 •   Network Security
 •   Application Security
 •   Security Policies
 •   Security Monitoring
 •   Operations Planning
 •   Endpoint Security
 •   Unified Communications / Voice & Data Convergence
 •   Virtualization

Related Searches
 •   Contact Soc Services
 •   Create Soc
 •   Example Of Soc
 •   Infrastructure Soc Services
 •   Maintain Soc
 •   Server Soc Services
 •   Soc Activities
 •   Soc Computers
 •   Soc Scheduling
 •   Soc Services Faqs
Advertisement

ALL RESULTS
1 - 25 of 497 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Building a Successful Security Operations Center by ArcSight, an HP Company

December 01, 2009 - (Free Research)
Designing, building, and managing an internal security operations center can dramatically improve an organization's ability to rapidly recognize and respond to malicious information security events. This paper outlines industry best practices for building and maturing a security operations center (SOC). 
(WHITE PAPER) READ ABSTRACT |

SUN SPARC® ENTERPRISE T5440 SERVER ARCHITECTURE by Sun Microsystems, Inc.

October 01, 2008 - (Free Research)
Employing UltraSPARC® T2 Plus processors - an evolution of the industry's first massively threaded systems on a Chip (SoC) - the Sun SPARC® Enterprise T5440 server offers breakthrough performance and energy efficiency to drive Web 2.0 infrastructure and address other demanding datacenter challenges. 
(WHITE PAPER) READ ABSTRACT |

Creating an Effective Security Operations Function by RSA, The Security Division of EMC

October 2008 - (Free Research)
Read this white paper to understand all the activities and roles in a security operations function - your first step in making those operations more effective and efficient. 
(WHITE PAPER) READ ABSTRACT |

SOA and BPM: A Process Centric Approach - Part 1 Background and Basic by Oracle Corporation

June 2009 - (Free Research)
In a process centric approach to SOA and BPM, perspectives of strategy, systems, business and technology can be incorporated in order to achieve successful change in business processes - discussed here as Service-Oriented Computing (SOC) as a way of gaining a better view on SOA in relation to BPM. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Bridging the Gap: Security, Operations & Compliance by eIQnetworks

February 2009 - (Free Research)
Read this white paper to see why SecureVue delivers the most cost effective and comprehensive technical solution on the market today to manage security, operations and compliance requirements. 
(WHITE PAPER) READ ABSTRACT |

Case Study: ArcSight, Inc. by TechTarget

December 2007 - (Free Research)
ArcSight, Inc., a leading provider of security and compliance solutions, turned to TechTarget when it wanted to reach highly-qualified prospects to extend the scope of its brand to include network management solutions. 
(CASE STUDY)

SANS What Works in Intrusion Prevention and Detection by Sourcefire

July 1967 - (Free Research)
This white paper shows you how TransUnion was able to successfully implement an effective intrusion defense system (IDS) that helped them meet compliance requirements and secure their corporate environment. 
(WHITE PAPER) READ ABSTRACT |

Case Study: Curve by NEC Corporation

August 2009 - (Free Research)
Curve, a theater which opened in November 2008 in the UK, needed a highly flexible communications solution that could support both its current communications and customer interaction requirements. Download this case study to see how Curve partnered with NEC to deploy Unified Communications. 
(CASE STUDY) READ ABSTRACT |

Keep Cloud Compliant by SearchCompliance.com

September 2013 - (Free Research)
Access this expert handbook for key information on how to ensure the move to cloud still meets today's compliance and security guidelines. 
(EBOOK) READ ABSTRACT |

Success Story: University Improves Backup and Recovery by Ditching Tape by ExaGrid Systems, Inc.

May 2013 - (Free Research)
This two-page paper explores how UNI deployed an effective and affordable backup solution. Read on to discover the benefits they now enjoy. 
(CASE STUDY) READ ABSTRACT |

…Prevent Big Data from derailing your virtualization project by SearchDataCenter.com

March 2013 - (Free Research)
The March issue of the Modern Infrastructure E-Zine addresses the continued breakdown of both (1) IT silos and (2) any remaining divisions between IT and the business. Download your copy today for tips, advice, and news analysis on supporting the business and delivering superior services to users. 
(EZINE) READ ABSTRACT |

Citrix XenDesktop with FlexCast Card by Citrix

November 2013 - (Free Research)
This whitepaper provides a desktop virtualization solution checklist you can use to evaluate solutions and choose the best approach for your organization’s needs. 
(WHITE PAPER) READ ABSTRACT |

Seven Ways to Make the First Mile of Business Smarter by Kofax, Inc.

December 2013 - (Free Research)
Explore this game-changing white paper to uncover the seven ways to make the first mile of business interactions smarter. 
(WHITE PAPER) READ ABSTRACT |

NS Security with CSO Online by Citrix

August 2014 - (Free Research)
This webcast looks at threats to web applications and properties and gives tips on how organizations can secure web application properties. 
(WEBCAST) READ ABSTRACT |

Bringing Together ESB and Big Data by Talend

March 2013 - (Free Research)
This resource describes how enterprise service buses (ESBs) can drive the success of big data initiatives by integrating data from disparate systems securely and reliably. Inside, learn how ESBs can help you realize the full potential of big data and boost business performance. 
(WHITE PAPER) READ ABSTRACT |

Data Services: The Marriage of Data Integration and Application Integration by Talend

December 2012 - (Free Research)
Integration of systems and data is high on the agenda of most organizations. Unfortunately, in many organizations today a labyrinth of integration solutions has been developed. This white paper describes the importance of unification and centralization of integration. 
(WHITE PAPER) READ ABSTRACT |

A Powerful Defense Against Denial of Service Attacks by Citrix

December 2013 - (Free Research)
As cybercrime continues to grow, denial of service (DoS) attacks have become far more prevalent. This guide explores the current landscape of DoS attacks and what you can do to protect your network. 
(WHITE PAPER) READ ABSTRACT |

XenApp 6.x Planning Guide: Virtualization Best Practices by Citrix

June 2013 - (Free Research)
This informative guide provides best practices for virtualizing XenApp so that you can plan and deliver desktops services that empower your end users with the mobility they need. 
(WHITE PAPER) READ ABSTRACT |

Cancer Treatment Centers of America by Insight and HP

July 2013 - (Free Research)
Access this case study of Cancer Treatment Centers of America as they turned to a managed print services (MPS) system to deliver a reliable print infrastructure to support its exemplary patient care. 
(CASE STUDY) READ ABSTRACT |

Magic Quadrant for Worldwide Managed Print Services by Insight and HP

October 2013 - (Free Research)
This resource hashes out the strengths and cautions of 10 different managed print services (MPS) providers, separating the leaders from the niche players and everyone in between. 
(RESOURCE) READ ABSTRACT |

Point-to-Point Broadband Wireless for Service Providers: Backhaul traffic, remove network bottlenecks and extend service to previously inaccessible locations by Motorola, Inc.

May 2008 - (Free Research)
This white paper presents multiple approaches and technologies for point-to-point wireless and the advantages and challenges of each. Learn which approach is best for your organization. 
(WHITE PAPER) READ ABSTRACT |

Delivering enterprise information securely on Android, Apple iOS and Microsoft Windows tablets and smartphones by Citrix

August 2012 - (Free Research)
A recent report found that almost two-thirds of organizations were able to increase productivity because of flexibility with mobile devices in the workplace. But utilizing mobile devices can also make the enterprise more vulnerable to attacks. Access this exclusive resource to learn how to mitigate some of the risks associated with BYOD adoption. 
(WHITE PAPER) READ ABSTRACT |

Integrated vs. Unified: Five Reasons Why Contact Centers Must Get Unified by Aspect

August 2010 - (Free Research)
This paper presents the main differences between integrated and unified contact centers, and gives five reasons why it is imperative for contact centers to adapt a unified solution. Read on to learn how adopting such a solution can increase productivity, decrease costs, and enhance the customer experience, thereby increasing customer loyalty. 
(WHITE PAPER) READ ABSTRACT |

PacketTrap MSP 6.0 by Dell Software

August 2011 - (Free Research)
PacketTrap MSP addresses critical challenges service providers face with their customer's networks including: traffic analysis, application and VoIP monitoring, as well as virtualization and private/public cloud management. 
(TRIAL SOFTWARE) READ ABSTRACT |

PCI Compliance for IBM System i (AS/400) by PowerTech

November 2007 - (Free Research)
This whitepaper examines how the standard relates to the System i (AS/400). When applicable, specific operating systems commands and configuration settings are provided. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 497 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts