Support Functions SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Support Functions Security returned the following results.
RSS What is RSS?
Related Categories

 •   Network Security
 •   Networks
 •   WAN/ LAN Solutions
 •   Data Security
 •   Security Policies
 •   Business Intelligence Solutions
 •   Network Management
 •   Enterprise Systems Management
 •   Enterprise Resource Planning (ERP)
 •   Business Process Management (BPM)

Related Searches
 •   Build Support Functions
 •   Corporation Support
 •   Own Support Functions Security
 •   Package Support Functions
 •   Prices Support Functions
 •   Suite Support Functions Security
 •   Support Conferences
 •   Support Functions Administration
 •   Support Functions Security Source
 •   Support Providers
Advertisement

ALL RESULTS
1 - 25 of 467 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Magic Quadrant for Client Management Tools by IBM

October 28, 2013 - (Free Research)
Client management tools manage configurations and support system administration tasks for client devices. Desktop support organizations often use them to automate traditionally manual system administration tasks and support functions. This Magic Quadrant breaks down the pros and cons of a number of today's client management tool vendors. 
(WHITE PAPER) READ ABSTRACT |

Network Boost: control all data in your network and accelerate your data exchanges by Orange Business Services

April 07, 2009 - (Free Research)
This quick Flash presentation gives us an overview of Network Boost, a turn-key networking solution that offers application acceleration tools that are focused on achieving performance objectives. 
(PRODUCT OVERVIEW) READ ABSTRACT |

Network Implications of Server Virtualization in the Data Center by Cisco Systems, Inc.

June 2008 - (Free Research)
Read this white paper and learn how Cisco Catalyst switches and Cisco MDS 9000 family storage area network (SAN) switches address new design requirements. 
(WHITE PAPER) READ ABSTRACT |

Process Automation for the Twenty-Ten Decade: The Automation of Business Technology by Network Automation, Inc

October 2010 - (Free Research)
This paper discusses the need for business process automation and how it can make your company vastly more efficient. Continue reading to learn how to stay ahead of the curve on process automation during the twenty-ten decade. 
(WHITE PAPER) READ ABSTRACT |

Multi Process HR Outsourcing for Large US Retailer by Wipro Technologies

January 2009 - (Free Research)
Learn from the success one of the largest U.S. retailers who implemented an integrated global HR outsourcing solution that combined process, technology, domain, and service delivery expertise. 
(WHITE PAPER) READ ABSTRACT |

Improving IT Economics and Gaining Business Value with CA Enterprise IT Management Software: An ROI Study by CA Technologies.

November 2008 - (Free Research)
This paper details a study that used standard IDC ROI methodology to calculate the costs of performing common IT administrative, operational, and support functions. With the recent dislocations in the world economy, the findings here can guide your company to increased productivity, cost savings, and revenue. 
(WHITE PAPER) READ ABSTRACT |

Chief Procurement Officer Study: Improving competitive advantage through procurement excellence by IBM

May 2013 - (Free Research)
Approached correctly, procurement can be essential for driving value and competitive advantage. This guide reveals the results of a survey of 1,128 chief procurement officers (CPOs) regarding the key strategies that separate high-performing procurement organizations from the pack. 
(WHITE PAPER) READ ABSTRACT |

Running IT as a Business: Seven Steps to Aligning IT with the Business by SAS

June 2011 - (Free Research)
This white paper outlines the 7 steps to aligning IT with the business. Find out what they are and how they can help your business provide customer-driven results. 
(WHITE PAPER) READ ABSTRACT |

Embedding Analytics into Processes by SAS

July 2010 - (Free Research)
In their latest book, Thomas Davenport, Jeanne Harris and Robert Morison show how companies apply analytics in their daily operations. We see examples of analytics at work within core processes in a variety of business areas. Read this white paper to learn how embedding analytics into your organization's processes can help you. 
(WHITE PAPER) READ ABSTRACT |

zCisco 1800 Series Integrated Services Routers: Cisco 1841 Router (Modular) by Cisco Systems, Inc.

The Cisco 1841 router offers embedded hardware-based encryption enabled by an optional Cisco IOS Software security image. 
(HARDWARE PRODUCT)

Cisco Catalyst 2950 Series Switches with Enhanced Image SW by Cisco Systems, Inc.

The Cisco Catalyst 2950 Series switches offer enhanced data security through a wide range of security features. 
(HARDWARE PRODUCT)

Gartner Magic Quadrant for Unified Threat Management by Sophos, Inc.

March 2012 - (Free Research)
Read an overview of the unified threat management market today and uncover an analysis of fourteen of the vendors on the market to get help finding your ideal UTM solution. 
(ANALYST REPORT) READ ABSTRACT |

Gartner's Magic Quadrant for Security Information and Event Management 2008 by RSA, The Security Division of EMC

October 2008 - (Free Research)
Read this report to learn how to find an optimal SIEM solution that will support the real-time log collection, is scalable, easy to deploy and will be easy to support and maintain. 
(WHITE PAPER) READ ABSTRACT |

Best Practices in Creating a Strategic Finance Function by SAP America, Inc.

January 2009 - (Free Research)
the following article will share the results of SAP research as well as APQC's Open Standards Benchmarking Collaborative (OSBC) research. The OSBC research is the first global set of common standards for business processes and data, giving organizations an independent, authoritative resource for evaluating and improving business practices. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 21 January 2014: The IT risks facing Universal Credit by ComputerWeekly.com

January 2014 - (Free Research)
In this week's Computer Weekly, we examine the ongoing IT risks facing the UK government's highest-profile IT project – the troubled Universal Credit programme. We talk to IT leaders to find out their spending priorities for 2014. And we find out about the latest best practice in improving datacenter performance. Read the issue now. 
(EZINE) READ ABSTRACT |

Long-Term Data Protection and Retention: Finding the Correct Balance by Quantum Corporation

March 2009 - (Free Research)
Tape remains the most cost effective, energy efficient and reliable program technology for storing large amounts of inactive, off-line or near-line data while complimenting disk-based data protection and retention solutions. Read this paper and find out why. 
(WHITE PAPER) READ ABSTRACT |

AirMagnet WiFi Analyzer by AirMagnet

August 2011 - (Free Research)
AirMagnet WiFi Analyzer is the industry "de-facto" tool for mobile auditing and troubleshooting enterprise 802.11a/b/g/n networks. AirMagnet WiFi Analyzer solves end user WLAN issues while automatically detecting security threats and other wireless network vulnerabilities. 
(TRIAL SOFTWARE) READ ABSTRACT |

The Digital Enterprise by ComputerWeekly.com

March 2014 - (Free Research)
Not every business is a digital business, but every business must become digital, writes Karl-Heinz Streibich in this book extract. 
(BOOK) READ ABSTRACT |

BIG-IP Application Security Manager™ by F5 Networks

The BIG-IP Application Security Manager delivers the industry’s foremost comprehensive application delivery security solution with the option to deliver both application delivery and security together. The ASM provides application layer protection from targeted and generalized application attacks to ensure that applications are always available. 
(HARDWARE PRODUCT)

The Business Case for Enterprise Disaster Recovery Planning: Calculating the Cost of Downtime by Iron Mountain

September 2008 - (Free Research)
Given the enormous long-term costs and implications of a systems interruption, companies need to carefully define and implement plans to mitigate losses. This paper arms you with how to build a strong business case for a recovery plan. 
(WHITE PAPER) READ ABSTRACT |

Cisco 2800 Series by Cisco Systems, Inc.

The Cisco 2800 Series features the ability to deliver multiple high-quality simultaneous services at wire speed up to multiple T1/E1/xDSL connections. 
(HARDWARE PRODUCT)

5 Steps to Reducing Downtime: Best Practices for Windows Server Application High Availability by Marathon Technologies

September 2009 - (Free Research)
This white paper discusses five steps for protecting Windows Server applications from downtime, offering established best practices to reduce potential single points of failure and ensure rapid recovery or continued operations in the event of failure. 
(WHITE PAPER) READ ABSTRACT |

Session Border Controllers: Addressing Tomorrow's Requirements by Metaswitch Networks

September 2011 - (Free Research)
This white paper discusses how IP-based service innovation will impact and shape the future of session border controllers. 
(WHITE PAPER) READ ABSTRACT |

IBM Tivoli Endpoint Manager: Unified Lifecycle Management for Distributed Endpoints by IBM

March 2014 - (Free Research)
Explore this menu interface that provides a high-level overview, product demonstration, expert interviews, and resource links for a top vendor's endpoint manager solution. View now to see what unified endpoint management can deliver to your organization. 
(DEMO) READ ABSTRACT |

Cisco ScanSafe and AVC Support Cloud Intelligent Network by Cisco Systems, Inc.

July 2012 - (Free Research)
This case study showcases how, in just two years, Cisco was able to move their enterprise resource planning (ERP), sales force management (SFA) and customer relationship management (CRM) applications to a private cloud. Along with leveraging public cloud software as a service, Cisco significantly reduced TCO and boosted their agility. 
(CASE STUDY) READ ABSTRACT |

1 - 25 of 467 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts