Spreadsheet Data SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Spreadsheet Data Security returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Network Security
 •   Endpoint Security
 •   Wireless Security
 •   Application Security
 •   Security Monitoring
 •   Security Policies
 •   Business Intelligence Solutions
 •   Spreadsheets
 •   Storage Security

Related Searches
 •   Impact Of Spreadsheet Data Security
 •   Indian Spreadsheet Data Security
 •   Programming Spreadsheet Data Security
 •   Publishing Spreadsheet
 •   Regional Spreadsheet Data
 •   Research Spreadsheet Data Security
 •   Spreadsheet Audit
 •   Spreadsheet Data Security Site
 •   Spreadsheet Data Security Small
 •   Spreadsheet Minnesota
Advertisement

ALL RESULTS
1 - 25 of 473 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

How Time Warner Cable Increased Sales Using Location Intelligence by Pitney Bowes Group 1 Software

April 2008 - (Free Research)
Pitney Bowes MapInfo® location intelligence solutions enable Time Warner Cable to more quickly and accurately identify new customers and increase sales. 
(CASE STUDY) READ ABSTRACT |

Mobile, Social Engineering Top Data Security Management Concerns by Thawte Inc.

November 2013 - (Free Research)
This e-guide, from SearchCIO.com, explores how to set up the right policies in order to successfully eliminate mobile, social engineering and data security management concerns. 
(EGUIDE) READ ABSTRACT |

Best Practices for Improving Mobile Data Security by Thawte Inc.

July 2013 - (Free Research)
This expert guide from SearchConsumerization.com takes an in-depth look at mobile data security best practices, including creating a robust PIN or passcode, implementing anti-malware, understanding the top mobile risks and how to offset them, and much more. 
(EGUIDE) READ ABSTRACT |

CORE Security and the Payment Card Industry Data Security Standard by Core Security Technologies

October 2013 - (Free Research)
This informative resource explores a security testing method that ensures PCI DSS validation and compliance to keep payment cardholder data protected from cybercrime at all times. 
(WHITE PAPER) READ ABSTRACT |

Enterprise Services Architecture for Higher Education and Research: A Roadmap for Efficiency and Innovation by SAP America, Inc.

July 1967 - (Free Research)
Higher education relies on information technology to improve operational efficiency. Discover how enterprise Service Oriented Architecture (enterprise SOA) helps leverage the current IT assets to provide improved education and research at a lower cost. 
(WHITE PAPER) READ ABSTRACT |

ESG: Improving the Legal Discovery Process with More Efficient Information Management by EMC Corporation

March 2008 - (Free Research)
This paper examines how one solution provider, EMC, is helping customers address electronic discovery challenges by helping customers manage their information infrastructure more effectively. 
(WHITE PAPER) READ ABSTRACT |

Thawte in Education by Thawte Inc.

September 2013 - (Free Research)
Access this white paper to discover a number of trends accelerating the urgency of deploying SSL across distributed campuses and how this approach can ensure safety and security in higher educational networks. 
(WHITE PAPER) READ ABSTRACT |

Best Practices to Protect the Cardholder Data Environment and Achieve PCI Compliance by Rapid7

July 2012 - (Free Research)
Cyber-attacks that target customer and financial information are becoming more popular and businesses need to protect their data. Prevent attackers from taking advantage of the gaps in your security plan by creating a comprehensive information security policy. 
(WHITE PAPER) READ ABSTRACT |

Seagate NAS - What's Driving Data Security and Remote Access Inside by Seagate Technology

February 2014 - (Free Research)
Check out this brief, 1-page resource that delivers a NAS solution that provides simple, scalable and cost-effective ways to store and serve files securely over the network. 
(WHITE PAPER) READ ABSTRACT |

McAfee Total Protection for Secure Business by Insight

March 2010 - (Free Research)
McAfee solutions cover all the critical elements of security medium businesses need: desktop and server protection, data protection, email and web security, and compliance. Total Protection for Secure Business provides comprehensive protection against the most lethal threats and exploits - in one package, from one trusted and proven vendor. 
(WHITE PAPER) READ ABSTRACT |

Agentless Backup—Separating Myth from Reality by Asigra

June 2013 - (Free Research)
This white paper explores a backup solution that eliminates the requirement for locally installed agents, enabling substantial time and cost savings and simplified management. 
(WHITE PAPER) READ ABSTRACT |

Streamline Data Protection with Tivoli Storage Manager Operations Center by IBM

September 2013 - (Free Research)
This exclusive paper discusses a comprehensive data protection solution that enables at-a-glance monitoring and reporting, allowing admins to better utilize their resources. 
(WHITE PAPER) READ ABSTRACT |

How to Secure Your Microsoft SharePoint Products by Thawte Inc.

May 2013 - (Free Research)
This e-guide from our experts at searchEnterpriseDesktop.com will help you understand what it takes to make sure SharePoint is secure. Read on to discover a quick checklist you can use to keep security priorities in order. 
(EGUIDE) READ ABSTRACT |

SSL Certificate Management: Common Mistakes and How to Avoid Them by Thawte Inc.

February 2013 - (Free Research)
Explore the common challenges associated with manual SSL certificate management and uncover how you can avoid these costly mistakes. 
(EGUIDE) READ ABSTRACT |

Fast, Accurate Management Reporting: eight reasons why spreadsheets may be letting you down. by Indicee

April 2010 - (Free Research)
While spreadsheets are useful for one off analysis and modeling, they’re not ideal for repeatedly creating reports from large volumes of data. More users are now replacing their spreadsheet based systems with Indicee. By doing so they are improving the timeliness and reliability of their business information with a cost-effective alternative. 
(WHITE PAPER) READ ABSTRACT |

The Risks of Using Spreadsheets for Statistical Analysis by IBM

October 2011 - (Free Research)
This paper presents some points you should consider if you use, or plan to use, a spreadsheet to perform statistical analysis. It also describes an alternative that in many cases will be more suitable. 
(WHITE PAPER) READ ABSTRACT |

Controlling Microsoft Excel Chaos With Business Intelligence by Information Builders Inc. (E-mail this company)

August 2006 - (Free Research)
Enterprises can take control of the burgeoning number of unsanctioned spreadsheets by adopting a policy of centralized master spreadsheet generation. Learn how WebFOCUS creates fully summarized, organized, and styled Excel spreadsheets with complex formulas already in place, lowering the potential for keystroke and logic error. 
(WHITE PAPER) READ ABSTRACT |

Orange is the New Black by Innotas

November 2013 - (Free Research)
There's a reason those little boxes on your spreadsheets are called "cells."  In an age of over-crowded budgets and global competition, businesses need their IT organizations to do more than complete projects on time, on budget and with the required functionality. IT must become a true business partner. 
(WHITE PAPER) READ ABSTRACT |

Merging Backup and Disaster Recovery (DR) Processes by FalconStor Software

April 2011 - (Free Research)
This paper describes how continuous data protection (CDP) technology can bridge various DR methodologies to help organizations overcome the challenges of tape and achieve maximum benefits from their IT investments. 
(WHITE PAPER) READ ABSTRACT |

WAN-optimized Replication: Built into FalconStor Solutions by FalconStor Software

April 2011 - (Free Research)
Data replication has become part of the fabric of IT due to its multiple uses and benefits. However, data replication can quickly increase your bandwidth and storage costs. Read this white paper to learn how WAN optimization can help to solve these issues. 
(WHITE PAPER) READ ABSTRACT |

File-interface Deduplication System (FDS) Technical Whitepaper: Using FalconStor FDS as a Backup Target for Veritas NetBackup by FalconStor Software

April 2011 - (Free Research)
This document describes the basic concepts and integration guidelines for FalconStor FDS in a Veritas NetBackup environment. 
(WHITE PAPER) READ ABSTRACT |

Server Virtualization: A Game-Changer For SMB Customers by NETGEAR Inc.

November 2010 - (Free Research)
Server virtualization can address issues involving logistics and finances and also transform testing and development environments while radically changing business continuity and disaster recovery practices. Read this white paper to learn more about what server virtualization can do for you. 
(WHITE PAPER) READ ABSTRACT |

SPSS Statistics White Paper: The Risk of Using Spreadsheets for Statistical Analysis by IBM

July 2013 - (Free Research)
Spreadsheets are widely used for statistical analysis, but only up to a certain point. This paper presents some points you should consider if you use, or plan to use, a spreadsheet to perform statistical analysis. It also describes an alternative that in many cases will be more suitable. 
(WHITE PAPER) READ ABSTRACT |

Transforming Spreadsheets: Planning, Budgeting and Forecasting for Midsize Companies by IBM

February 2011 - (Free Research)
In “Transforming Spreadsheets: Planning, Budgeting and Forecasting for Midsize Companies” you’ll discover how to transform spreadsheet-only processes into an effective financial performance management solution with IBM Cognos Express.  
(WHITE PAPER) READ ABSTRACT |

The Windows Mobile Netbook for the Enterprise with Low TCO by Celio Corp / REDFLY Mobile Companion

August 2008 - (Free Research)
The Windows Mobile smartphone is easily deployed with a wide array of productivity tools allowing the mobile user to quickly respond to customer requests, stay up-to-date on the latest company information or access remote desktops. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 473 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts