Solution Techniques RisksWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Solution Techniques Risks returned the following results.
RSS What is RSS?
Related Categories

 •   Treasury / Cash / Risk Management
 •   Data Security
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Business Intelligence Solutions
 •   Network Security
 •   Application Security
 •   Enterprise Data Protection and Privacy
 •   Security Monitoring
 •   Endpoint Security
 •   Virtualization

Related Searches
 •   Automated Solution Techniques
 •   Chart Solution
 •   Info Solution Techniques Risks
 •   Roi Solution Techniques Risks
 •   Solution Print
 •   Solution Supply
 •   Solution Techniques Attendance
 •   Solution Techniques Consulting
 •   Solution Techniques Risks Records
 •   Statements Solution
Advertisement

ALL RESULTS
1 - 25 of 466 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..
Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Being Agile in a non agile world by Ivar Jacobson Consulting

March 2008 - (Free Research)
Learn how to effectively combine agile development techniques with traditional SDLC and other software engineering techniques. Explore the basic concepts behind agile thinking and the three perspectives associated with this process. 
(WEBCAST) READ ABSTRACT |

Strategy Guide to Risk Mitigation for Midsize Businesses by HP & Intel®

June 2010 - (Free Research)
This strategy guide offers concrete risk mitigation techniques specifically designed for midsize organizations. Learn how to proactively manage physical and virtual systems and see the early signs of infrastructure trouble to avoid outages. 
(WHITE PAPER) READ ABSTRACT |

Counterparty Risk: Are We Leveraging Our Tools? by Sybase, an SAP company

February 2012 - (Free Research)
While current technologies and techniques allow for more sophisticated and effective approaches to counterparty risk management than those that fell short in 2008, there are still barriers to successful adoption that will require organizational changes. Read this white paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

Tips and Techniques for Building a Converged Data Center Presentation Transcript by Dell, Inc. and Intel®

September 2012 - (Free Research)
There are a variety of options when it comes to data center convergence. Finding a best-fit solution for your organization can be difficult. Learn more about how your business can optimize their virtualization process with an in-depth exploration of tips and techniques for building a converged data center. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Understanding Web-Based Crime-Fighting Techniques To Protect Your Critical Data by Imperva

June 2013 - (Free Research)
In this e-guide, brought to you by SearchCompliance.com, you will gain an understanding of the risks to your data and strategies to protect your systems within the limits of your resources. 
(EGUIDE) READ ABSTRACT |

Optim™ Data Privacy Solution by IBM

The Optim™ Data Privacy Solution de-identifies application data so that it can be safely used in testing or training environments. By substituting fictionalized yet realistic data for confidential information, Optim enables sites to test effectively while supporting privacy compliance initiatives. 
(SOFTWARE PRODUCT)

Reliability Analysis of the APC Symmetra MW Power System by APC by Schneider Electric

January 2010 - (Free Research)
MTechnology, Inc. (MTech) performed a quantitative reliability analysis of the APC Symmetra MW UPS. The study used techniques of Probabilistic Risk Assessment (PRA) to calculate the likelihood of over 680,000 potential failure modes. 
(WHITE PAPER) READ ABSTRACT |

Outbound Email And Data Loss Prevention In Today's Enterprise, 2009 by Proofpoint, Inc.

August 2009 - (Free Research)
The convenience and ubiquity of email as a business communications tool has exposed enterprises to a wide variety of legal, financial and regulatory risks associated with outbound email. This report summarizes the findings of Proofpoint's sixth annual survey of enterprise attitudes about outbound email, content security and data protection. 
(WHITE PAPER) READ ABSTRACT |

Malware Security Report: Protecting Your Business, Customers and Bottom Line by VeriSign Australia

August 2010 - (Free Research)
This white paper will help you understand the threats from Malware and how it can impact your online business. You’ll learn about criminals’ motivations for distributing malware through the web and how they infect web servers to make distribution possible, as well as techniques administrators can use to detect them. 
(WHITE PAPER) READ ABSTRACT |

Insider Edition: Antimalware Technologies and Techniques to the Rescue by SearchSecurity.com

March 2014 - (Free Research)
In this Insider Edition, we'll examine the recent advances in advanced malware detection and prevention as well as which ones are likely to bear fruit in your organization. 
(EZINE) READ ABSTRACT |

The Agile Business Analyst by VersionOne Inc.

September 2008 - (Free Research)
This white paper discusses the significant impact of agile development techniques on the business analyst community. Gain insight into the skills required by analysts for effective agile development, as well as the steps for a transition to agile... 
(WHITE PAPER) READ ABSTRACT |

March Issue of Information Security magazine: “Virtual Certainty: VMs introduce a new security dynamic” by Information Security Magazine

March 2011 - (Free Research)
This month’s Information Security Magazine Online cover story explores the need for sound security and risk management strategies around virtualization technology. 
(EZINE)

The Netweaver Upgrade: Ensuring Performance While Balancing Cost with Risk by HyPerformix

July 2008 - (Free Research)
This paper discusses critical factors every IT decision maker needs to know when upgrading to NetWeaver, to ensure system performance and availability, and to balance cost with the risks of downtime. 
(WHITE PAPER) READ ABSTRACT |

Surviving the Perfect Storm in the Food Industry by CDC Software - Ross Enterprise

April 2008 - (Free Research)
This paper presents an executive perspective on the underlying challenges in the food industry. 
(WHITE PAPER) READ ABSTRACT |

Reliability Analysis of the APC InfraStruXure Power System by APC by Schneider Electric

January 2010 - (Free Research)
The APC InfraStruXure product line offers an alternative architecture to the central UPS. This paper summarizes the key findings of MTechnology's quantitative risk assessment and discusses their implications for facility managers and designers. 
(WHITE PAPER) READ ABSTRACT |

Outbound Email and Data Loss Prevention in Today's Enterprise by Proofpoint, Inc.

May 2008 - (Free Research)
This white paper overviews a survey completed by Proofpoint and Forrester Consulting that analyzes the legal, financial, and regulatory risks associated with outbound email in large enterprises. 
(WHITE PAPER) READ ABSTRACT |

Management Excellence: Leveraging Technology and Techniques by Oracle Corporation UK Ltd

November 2008 - (Free Research)
One in a series of white papers about management excellence, this white paper describes the techniques and technologies that organizations should master on their way to management excellence. 
(WHITE PAPER) READ ABSTRACT |

Packaging tips to safeguard your physical records by Iron Mountain

March 2012 - (Free Research)
Read this white paper to learn proper techniques and best practices for packaging and storing your physical documents and information in cartons to avoid risk and records exposure. Find tips on what to look for in a quality carton, how to know when your carton is too old and needs to be replaced, and how to properly pack your carton. 
(DATA SHEET) READ ABSTRACT |

Five Myths of Agile Development by VersionOne Inc.

September 2008 - (Free Research)
In this white paper, you will gain insight into five myths commonly associated with agile development. Explore what agile development is in reality, what it is not, and the true benefits of transitioning to agile methods in your organization. 
(WHITE PAPER) READ ABSTRACT |

State of Agile Development Survey 2008 by VersionOne Inc.

September 2008 - (Free Research)
This white paper highlights the results of a third annual industry survey regarding the state of agile development. Gain insight into the status of organizations currently implementing or practicing agile methods. 
(DATA SHEET) READ ABSTRACT |

Five Ways to Prepare for SharePoint 2013: Choose Code-Free Customisation by Dell Software

August 2012 - (Free Research)
Access this helpful source to learn how to utilize upgradable tools and techniques to avoid the challenges of migrating custom code to PointShare 2013 
(WHITE PAPER) READ ABSTRACT |

Management Excellence: Leveraging Technology & Techniques by Oracle Corporation

November 2008 - (Free Research)
This white paper describes a set of six management processes that lead organizations to become smarter, more agile, and better aligned—the key attributes of management excellence. 
(WHITE PAPER) READ ABSTRACT |

Pod Slurping - An Easy Technique for Stealing Data by GFI Software

March 2008 - (Free Research)
In this white paper, we explore how the uncontrolled use of portable storage devices such as iPods, USB sticks, flash drives and PDAs, coupled with data theft techniques such as 'pod slurping', can lead to major security breaches. 
(WHITE PAPER) READ ABSTRACT |

8 Problems of Keyword Search in E-Discovery – A Guide for Fortune 1000 Companies by FTI Technology

November 2009 - (Free Research)
In this paper – first in a three part series - we will examine the difficulties of working with keywords during a matter, the many challenges associated with relying on keyword search, and the cost and risk associated with attempting to “guess” one’s way to a relevant document set. 
(WHITE PAPER) READ ABSTRACT |

Separate But Equal: Mitigating Risk of Web-Borne Malware Infections Through Separation by Thawte Inc.

January 2014 - (Free Research)
In this expert e-guide, Pete Lindstrom shares insight on Web-browser security methods that reduce or eliminate user involvement to more effectively prevent malware infections. 
(EGUIDE) READ ABSTRACT |

1 - 25 of 466 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts