Source President Electonic SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Source President Electonic Security returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Security Policies
 •   Virtualization
 •   Wireless Security
 •   Application Security
 •   Network Security
 •   Wireless Technologies and Mobile Computing
 •   Open Source
 •   Mobile Device Management
 •   Storage Management

Related Searches
 •   Charts Source President
 •   Hardware Source President Electonic
 •   Java Source
 •   Network Source
 •   Planner Source President
 •   Source Backups
 •   Source President Ecommerce
 •   Source President Electonic Info
 •   Source President Full
 •   Technologies Source President
Advertisement

ALL RESULTS
1 - 25 of 463 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

The Role of Open Source Data Integration - An Analyst White Paper, by Mark Madsen by Talend

January 28, 2009 - (Free Research)
This report by Mark Madsen will explain what data integration is, and especially the difference between Operational Data Integration and Analytic Data Integration. It highlights the benefits of open source for data integration, and provides a series of recommendations to make the integration job easier, repeatable and more productive. 
(ANALYST REPORT) READ ABSTRACT |

The reality behind the hype: Government cloud computing by ComputerWeekly.com

November 23, 2011 - (Free Research)
This article from Gartner offers advice to public sector organisations thinking of deploying cloud computing and assess the progress made by governments in their use of the cloud. 
(ANALYST BRIEF) READ ABSTRACT |

Gartner: Deriving value from Big Data for CRM by ComputerWeekly.com

May 20, 2013 - (Free Research)
Kimberly Collins, research vice-president of Gartner highlights the critical steps organisations should to take to integrate big data into Customer Relationship Management (CRM). 
(ESSENTIAL GUIDE) READ ABSTRACT |

Expert Tips for a New Era of Application Integration by TIBCO Software Inc.

March 25, 2013 - (Free Research)
The complexity of today's communications calls for new application integration strategies. In part one of this in-depth resource, Benoit Lheureux, a research vice president at Gartner, explains how master the five integration competencies will put you at a competitive advantage. 
(EGUIDE) READ ABSTRACT |

E-guide: 5 must-have integration competencies for competitive advantage by IBM

March 20, 2014 - (Free Research)
In this exclusive e-guide, explore the latest trends in application integration and learn why better collaboration is critical for a successful integration environment. Also, learn five key integration competencies that will give you a competitive advantage 
(EGUIDE) READ ABSTRACT |

Computer Weekly - 8 May 2012: The changing face of retail IT by ComputerWeekly.com

May 08, 2012 - (Free Research)
In this week’s Computer Weekly, we look at the IT challenges facing retailers, as consumers turn increasingly to web and mobile shopping channels. Oracle president Mark Hurd talks about how the supplier intends to simplify IT infrastructures. And new government CIO Andy Nelson discusses how he plans to transform Whitehall IT. Read the issue now. 
(EZINE)

Counterparty Risk: Are We Leveraging Our Tools? by Sybase, an SAP company

February 22, 2012 - (Free Research)
While current technologies and techniques allow for more sophisticated and effective approaches to counterparty risk management than those that fell short in 2008, there are still barriers to successful adoption that will require organizational changes. Read this white paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

Password Management Survey by RoboForm Enterprise

September 2008 - (Free Research)
This report shows how RoboForm Enterprise password management solution can increase corporate security, eliminate password related help desk calls, improve end user productivity, and decrease overall IT costs. 
(WHITE PAPER) READ ABSTRACT |

Password Management Survey by LEGACY - DO NOT USE - Siber Systems

September 2008 - (Free Research)
This report shows how RoboForm Enterprise password management solution, can increase corporate security, eliminate password related help desk calls, improve end user productivity, and decrease overall IT costs. 
(WHITE PAPER) READ ABSTRACT |

The Network Evolution University: Next Generation Networks by SearchNetworking.com

November 2011 - (Free Research)
In order to combat the ever-evolving challenges of today’s networks, it’s time to head back to school in our exclusive Network Evolution University – Featuring three distinct classes and nine progressive learning lessons that explore all there is to know about next generation networks and how to overcome the challenges they present. 
(VIRTUAL SEMINAR) READ ABSTRACT |

Enterprise Security Architecture by ComputerWeekly.com

March 2013 - (Free Research)
Mark Brown, Director for Advisory Risk & Information Security at Ernst & Young offers advice to security leaders on developing a robust Enterprise Security Architecture. 
(PRESENTATION) READ ABSTRACT |

Presentation Transcript: The Cybercrime War; When Are We Going to Win? by Dell SecureWorks UK

August 2011 - (Free Research)
Why are information security issues so persistent? Why does it feel like we win small battles, yet the war keeps escalating? What does the next 20 years look like? Erik Petersen, Vice President of Security and Risk Consulting at Dell SecureWorks discuss micro and macro-economic theory to grapple with the core questions of “why.” 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Building the Transparent Cloud by Intel

January 2012 - (Free Research)
Learn how Expedient Communications expanded from a managed service provider into cloud computing, with a focus on auditability and security. Gain insight into best practices for building private clouds and evaluating external cloud services from Alex Rodriguez, Expedient’s Vice President of Systems Engineering and Product Development. 
(CASE STUDY) READ ABSTRACT |

Top 10 Mobile Application Risks by Veracode, Inc.

May 2012 - (Free Research)
<p>In this presentation, Veracode’s Vice President of Security Research, Chris Eng, will outline the Top 10 Mobile Application Risks, designed to educate developers and security professionals about the mobile application behavior – both maliciously- designed or inadvertent – putting users at risk.</p> 
(WEBCAST) READ ABSTRACT |

Cloud Integration and Big Data: Expert Best Practices and Emerging Trends by Treasure Data (E-mail this company)

January 2014 - (Free Research)
In this expert e-guide, senior vice president at Cloud Technology Partners and cloud computing thought leader, David Linthicum, discusses three key topics: integration, the cloud and "big data." The discussion ranges from cloud integration to security issues in the cloud and the workings of Hadoop. 
(EGUIDE) READ ABSTRACT |

Mobility and Tablet Trends in Healthcare IT by Intel

June 2012 - (Free Research)
Caregivers want the devices they work with to function like the devices in their pockets. And this is steadily becoming a reality. View today’s brief video and join Motion Computing’s Vice President of Marketing, Mike Stinson as he talks about the latest health IT trends in tablets and other mobile devices. 
(WEBCAST) READ ABSTRACT |

IT Briefing - Desktop and Application Virtualization: Getting Started by Citrix

January 2009 - (Free Research)
In this document Barb Goldworm, President, Founder and Chief Analyst of Focus, explains the benefits for desktop and application virtualization. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Get the Coverity Scan 2010 Open Source Integrity Report featuring the Android Integrity Report by Coverity

January 2011 - (Free Research)
The results from the 2010 edition of the Coverity Scan Open Source Integrity Report detail the findings of analyzing more than 61 million lines of open source code from 291 popular and widely-used open source projects such as Android, Linux, Apache, Samba and PHP, among others. Read on to learn more about these results. 
(WHITE PAPER) READ ABSTRACT |

Vyatta Community Edition 4 - Open-Source Routing and Security by Vyatta Inc.

September 2008 - (Free Research)
Vyatta delivers complete, ready-to-deploy, open-source networking solutions that make it possible for anyone to own an enterprise-class router/firewall/VPN for a fraction of the cost of traditional closed-source, proprietary products. 
(TRIAL SOFTWARE) READ ABSTRACT |

A More Secure Front Door: SSO and Strong Authentication by Imprivata

February 2011 - (Free Research)
Times change. Sometimes they change even faster than we might expect, as recent developments in Strong Authentication have shown. Just a few years ago, the idea of requiring users to provide a second form of identity to gain access to IT resources was seen by many as only necessary for remote access security or top-secret jobs. 
(WHITE PAPER) READ ABSTRACT |

Seven Practical Steps for Federal Cyber Security and FISMA Compliance by Tripwire, Inc.

April 2009 - (Free Research)
This paper provides seven practical steps any information security organization can take to improve information system security and achieve compliance with relevant regulations, standards and internal security and operational policy. 
(WHITE PAPER) READ ABSTRACT |

2008 Verizon Business Data Breach Investigations Report by Verizon Business

June 2008 - (Free Research)
Check out this webcast to learn about the critical trends in data theft and learn about strategies for increasing your company's data security against internal and external attacks. 
(WEBCAST) READ ABSTRACT |

Computer Weekly – 26 February 2013: European Commission targets data security by ComputerWeekly.com

February 2013 - (Free Research)
In this week's Computer Weekly, we look at the new IT security proposals from the European Commission and ask whether the benefits will be worth it. We reveal the challenges of managing big data, with help from some industry analysts, and hear from the Open University CIO on IT tools that support learning. Read the issue now. 
(EZINE) READ ABSTRACT |

Computer Weekly - 17 April 2012: How to ensure smartphone security by ComputerWeekly.com

April 2012 - (Free Research)
This week’s Computer Weekly examines the growing threat from smartphones being targeted by hackers and viruses as the devices are increasingly used for work. Hospitality giant Mitchells & Butlers talks about its migration to the cloud and the CIO of Airbus discusses his IT priorities and how he spends €500m a year on IT. 
(EZINE) READ ABSTRACT |

Computer Weekly - 13 March 2012: The economics of private cloud by ComputerWeekly.com

March 2012 - (Free Research)
This week’s Computer Weekly kicks off our Buyer's Guide to private cloud. It also contains our RSA conference coverage of the latest IT security trends and the future for Microsoft's Trustworthy Computing initiative. And we discuss the role of apprenticeships in encouraging more young people to work in IT. 
(EZINE)

1 - 25 of 463 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts